SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER:
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
The great IAM - time to modernise?
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?
Posted: 08 Feb 2021 | Published: 05 Apr 2019
|
|
|
DataOps: The Missing Link in Your Industrial Data Architecture
sponsored by HighByte
WHITE PAPER:
How can your business simplify data contextualization to maximize the value of your technology investments? By leveraging DataOps to define standard models and establish and manage integrations, operational teams can provide data to the systems and business users who are requesting it in a more efficient and managed way. Read on to learn more.
Posted: 26 Oct 2023 | Published: 26 Oct 2023
|
|
|
Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019
|
|
|
Kubernetes Traffic Engineering for Network Engineers: Cilium Best Practices
sponsored by Cisco
EBOOK:
Traffic engineering in Kubernetes optimizes network performance, security, and costs. This paper explores using Cilium, a leading cloud-native networking solution, for advanced traffic routing in Kubernetes. Learn techniques for managing traffic flows. Discover how to build a resilient, high-performance Kubernetes network.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
Powerful, Application-aware Investigation Tools.
sponsored by Endace
DATA SHEET:
When you’re investigating a security incident, you want to eliminate any guesswork. EndaceVision, a browser-based investigation GUI, can help you do so. Learn all about the product in this data sheet.
Posted: 28 Mar 2023 | Published: 28 Mar 2023
|
|
|
Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018
|
|
|
An OT - Cyber Physical Security Journey eBook for the US Federal Government
sponsored by Merlin International
EBOOK:
Discover how to secure your federal government's OT and cyber-physical systems with a comprehensive security journey. Learn the critical steps, from asset visibility to continuous monitoring, to reduce your attack surface. Download the eBook to get started.
Posted: 18 Dec 2024 | Published: 19 Dec 2024
|
|
|
Cloudflare Security Brief
sponsored by Cloudflare
EBOOK:
Take a deep look at the most important trends shaping the cyber threat landscape today: AI, vulnerability exploitation, DDoS attacks, phishing, and Zero Trust. Based on the extensive data from Cloudflare’s cloud network, this security brief highlights key trends. Access the brief to learn more.
Posted: 19 Sep 2024 | Published: 19 Sep 2024
|
|
|
Bonding, slicing, and zero trust in a 5G world
sponsored by Ericsson
WHITE PAPER:
As enterprise networks evolve with 5G and hybrid work, SD-WAN must adapt to increase resiliency, security, and simplicity. Discover how modern SD-WAN solutions can optimize cellular connectivity, leverage zero trust principles, and integrate with SASE to enhance network performance. Read the white paper to learn more.
Posted: 18 Dec 2024 | Published: 19 Dec 2024
|
|
|
Simplify desktop management and reduce costs by up to 40%
sponsored by DellEMC and Intel®
EGUIDE:
This white paper goes over what organizations have to gain - and lose - from virtual desktop technology.
Posted: 08 Feb 2021 | Published: 27 Dec 2012
|
|
|
8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023
|
|
|
Mastering Cilium for Kubernetes Compliance
sponsored by Cisco
EBOOK:
Cilium simplifies Kubernetes compliance with advanced networking, security, and observability features. Learn how Cilium addresses NIST 800-53 and 800-190 controls for access control, auditing, and incident response in this white paper.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018
|
|
|
How to Defend Against Look-Alike Domain Threats
sponsored by Fortra
WHITE PAPER:
This playbook breaks down the domain lifecycle, how look-alike domains are used to enable cyberthreats, and best practices for collecting, curating, and mitigating domain threats. Read the full guide to learn how to defend your organization against look-alike domain attacks.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
CVE-2021-2035 and RDBMS Scheduler Security
sponsored by Spinnaker Support
RESEARCH CONTENT:
This white paper analyzes CVE-2021-2035 in Oracle Database's Scheduler. It discusses the attack surface, needed privileges, and defense strategies like limiting scheduler access, setting up SQLNet, and encrypting credentials. Discover how to protect your Oracle Database by reading the complete paper.
Posted: 04 Jun 2024 | Published: 04 Jun 2024
|
|
|
How To Combat Modern Cyber Threats
sponsored by Dell Technologies and Intel
EBOOK:
Cyberattacks are inevitable and are growing in volume and sophistication. Endpoint devices, networks and cloud environments have become key targets. This e-book offers IT and security decision-makers guidance on the elements needed for the most effective endpoint defense amidst this evolving threat landscape.
Posted: 18 Nov 2024 | Published: 18 Nov 2024
|
|
|
How To Combat Modern Cyber Threats
sponsored by Dell Technologies and Intel
EBOOK:
Cyberattacks are inevitable and are growing in volume and sophistication. Endpoint devices, networks and cloud environments have become key targets. This e-book offers IT and security decision-makers guidance on the elements needed for the most effective endpoint defense amidst this evolving threat landscape.
Posted: 18 Nov 2024 | Published: 18 Nov 2024
|
|
|
2024 Comcast Business Cybersecurity Threat Report
sponsored by Comcast Business
RESEARCH CONTENT:
Combining publicly available data with the 29 billion cybersecurity events Comcast Business detected across their base of security customers in 2023, this report provides a wide-angle view of the global threat landscape. Read now to learn more.
Posted: 19 Nov 2024 | Published: 19 Nov 2024
|
|
|
Essential Guide: Securing hybrid IT infrastructure
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
Posted: 08 Feb 2021 | Published: 16 Nov 2017
|
|
|
Using digital twins to cut costs and improve safety at Shell
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.
Posted: 08 Feb 2021 | Published: 10 Nov 2020
|
|
|
Compliance with EU DORA
sponsored by DigiCert
PRODUCT OVERVIEW:
The EU's Digital Operational Resilience Act (DORA) aims to rationalise information and communication technology risk management across the financial system. With fines for non-compliance, your company must create a plan to close any gaps. Download this product overview to learn how DigiCert ONE helps organisations comply with DORA.
Posted: 16 Dec 2024 | Published: 16 Dec 2024
|
|
|
Turning Local Government Cybersecurity Challenges into Opportunities
sponsored by Schneider Electric
WHITE PAPER:
In this eBook, discover the top three cybersecurity challenges of state and local government and learn how their IT departments can benefit from a partner who can break down these barriers and turn cybersecurity challenges into opportunities.
Posted: 27 Feb 2024 | Published: 27 Feb 2024
|
|
|
10 Essential Use Cases for Attack Surface Management
sponsored by Palo Alto Networks
EBOOK:
Discover 10 essential use cases for attack surface management to secure your complex, evolving attack surface. Learn how Cortex Xpanse can help you prevent ransomware, eliminate shadow IT, respond to zero-days, and more. Read the full e-book to take a proactive approach to attack surface management.
Posted: 11 Dec 2024 | Published: 11 Dec 2024
|
|
|
CDN Buyer’s Guide
sponsored by Fastly
BUYER'S GUIDE:
Many CDNs offer the same types of services, but they're not all the same. This Buyer’s Guide can help you distinguish the best from the rest. Download it now to explore the key factors to consider when selecting a CDN, essential questions to ask to ensure you get the most out of your CDN, and more.
Posted: 03 Oct 2024 | Published: 03 Oct 2024
|
|
|
A network automation roadmap to reap tech's best benefits
sponsored by TechTarget Networking
EBOOK:
A network automation roadmap can help guide organizations through the Wild West of modern networking in order to reap benefits that automation can bring to employees, customers and partners. Reducing labor-intensive tasks does entail changing a network engineer's work, though.
Posted: 09 Sep 2021 | Published: 06 Sep 2021
|
|