High Speed Token Ring White Papers

(View All Report Types)
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Router Essentials
sponsored by Global Knowledge
WHITE PAPER: Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Motorola's Wireless Broadband Indoor/Outdoor Solution
sponsored by Motorola Solutions
WHITE PAPER: With a Wi-Fi network, businesses can increase the efficiency of their mobile employees resulting in increased ROI and greater profitability. This document highlights two specific indoor/outdoor Wi-Fi network configurations based on Motorola's MOTOMESH Duo product solution.
Posted: 28 Apr 2009 | Published: 02 Apr 2009

Motorola Solutions

Emerging Multicast VPN Applications
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
Posted: 25 Nov 2008 | Published: 25 Nov 2008

Juniper Networks, Inc.

CW APAC - December 2020: Trend Watch on cloud infrastructure
sponsored by TechTarget ComputerWeekly.com
EZINE: The rise of 5G is driving telcos to embrace cloud-native and software-defined architectures. In this handbook focused on cloud infrastructure in the Asia-Pacific region, Computer Weekly looks at the slow and steady path businesses are taking to cloud-based radio access networks.
Posted: 08 Feb 2021 | Published: 17 Dec 2020

TechTarget ComputerWeekly.com

Infographic: Hybrid network vs. Hybrid network infrastructure
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Hybrid networks and hybrid network infrastructure blend different kinds of equipment, geographic locations, network ownership and technology disciplines. In this infographic, we highlight the main differences between the two models.
Posted: 02 Mar 2022 | Published: 02 Mar 2022

TechTarget ComputerWeekly.com

L’Oréal: Launching Gen AI as a Service in 3 months with Cloud Run and LangChain
sponsored by Google
CASE STUDY: L'Oréal leveraged Google Cloud Run and LangChain to develop GenAI as a Service, a set of secure, scalable generative AI APIs. This enabled the cosmetics giant to quickly empower its 90,000 employees with generative AI capabilities while ensuring data security. Read the full case study to learn more.
Posted: 03 Nov 2024 | Published: 04 Nov 2024

Google

Practical Zero Trust Implementing Protections for High-Value Data
sponsored by Zentera Systems Inc.
EBOOK: This e-book offers a model for implementing a Zero Trust security strategy to protect high-value data. Learn to apply Zero Trust principles like segmentation, identity-based access, and continuous monitoring to secure sensitive information. Download the e-book for practical examples and a software-based approach to Zero Trust.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

The changing mobile platform landscape
sponsored by TechTarget ComputerWeekly.com
EGUIDE: So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.
Posted: 08 Feb 2021 | Published: 18 Jan 2019

TechTarget ComputerWeekly.com

Hyperconverged Reference Architecture
sponsored by Panduit
EBOOK: In this e-book, explore Panduit’s proposals of foundational reference architecture utilizing a Dell Technologies configuration and validated Panduit physical infrastructure components.
Posted: 21 Apr 2023 | Published: 21 Apr 2023

TOPICS:  .NET
Panduit

CW APAC, March 2022: Trend Watch: Storage management
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how open source is shaping data storage management and this year’s emerging cloud supplier trends.
Posted: 17 Mar 2022 | Published: 17 Mar 2022

TechTarget ComputerWeekly.com

2024 Talkdesk Bank And Credit Union Contact Center Benchmark Report
sponsored by Talkdesk
RESEARCH CONTENT: The contact center has become one of the most important factors when it comes to customer retention in the banking sector. But it’s more than just achieving daily KPI’s, it’s about optimizing your services by focusing on the metrics that truly matter. Read on to learn about the five most important performance metrics for the call center.
Posted: 19 Jun 2024 | Published: 19 Jun 2024

TOPICS:  .NET
Talkdesk

IAM: Managing identity remains key to cyber security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
Posted: 08 Feb 2021 | Published: 29 Aug 2019

TechTarget ComputerWeekly.com

The LLM Mesh: A Practical Guide to Using Generative AI in the Enterprise
sponsored by Dataiku
EBOOK: This data, from a 2024 Dataiku and Cognizant survey of 200 senior analytics and IT leaders, highlights that GenAI is a top priority at the highest level — nearly three-quarters of respondents (73%) will spend over $500,000 on the tech in the next 12 months.
Posted: 30 Aug 2024 | Published: 30 Aug 2024

Dataiku

Computer Weekly - 29 October 2019: IR35 reforms - the difficult decisions facing IT contractors
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.
Posted: 08 Feb 2021 | Published: 29 Oct 2019

TechTarget ComputerWeekly.com

2024 Threat Hunter Perspectives: Insights From The Front Lines
sponsored by OpenText
RESEARCH CONTENT: Insights from cybersecurity experts on the evolving threat landscape. Discover the latest adversary tactics, nation-state collaborations, and timing factors that enterprises must prepare for in 2024. Download the white paper to strengthen your security posture.
Posted: 09 Oct 2024 | Published: 09 Oct 2024

OpenText

5 Common Audit Processes You Can Automate in One Week
sponsored by Alteryx
EBOOK: In this e-book, find out how to stop paying fines, fees, and the price of human error — while also enjoying faster results and scaling up more easily — by automating t5 key processes. Get your copy and empower your own analysts to blast through repetitive processes so they can deliver on time and in compliance.
Posted: 26 Jul 2024 | Published: 26 Jul 2024

Alteryx

5 Common Audit Processes You Can Automate in a Week
sponsored by Alteryx
EBOOK: McKinsey reports that 60% of the audit process can be partly or fully automated, reducing error rates (up to 16%) and saving analysts 26 hours per week. In this e-book, learn how to avoid fines, fees, and human error while achieving faster, scalable results by automating 5 key processes.
Posted: 22 Oct 2024 | Published: 22 Oct 2024

Alteryx

Computer Weekly – 16 May 2023: Microsoft and Google go into battle for enterprise AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as developments in generative AI accelerate, Microsoft and Google have each unveiled plans around enterprise applications. Nobody doubts the importance of digital transformation – but experts say it won't work without cultural change as well. Read the issue now.
Posted: 12 May 2023 | Published: 16 May 2023

TechTarget ComputerWeekly.com

Computer Weekly buyer's guide to mobile app development
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
Posted: 08 Feb 2021 | Published: 27 Feb 2018

TechTarget ComputerWeekly.com

2 types of endpoint encryption to protect data
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
Posted: 04 May 2022 | Published: 04 May 2022

TechTarget ComputerWeekly.com

2024 Talkdesk global contact center KPI benchmarking report
sponsored by Talkdesk
RESEARCH CONTENT: Today’s organizations are constantly looking for new ways that they can enhance their contact center processes in order to make operations more efficient. To do so, many have turned to generative AI and other automation tools. However, does this technology actually live up to the hype? Dig into this report.
Posted: 12 Jun 2024 | Published: 12 Jun 2024

TOPICS:  .NET
Talkdesk

CW APAC - November 2019: Expert advice on container security
sponsored by TechTarget ComputerWeekly.com
EZINE: For all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Nov 2019

TechTarget ComputerWeekly.com

Generative AI in the Enterprise with AMD Accelerators
sponsored by Dell Technologies & AMD
WHITE PAPER: How can you ensure your organization is leveraging GenAI to the best of its abilities. This design guide describes the architecture and design of the Dell Validated Design for Generative AI with AMD accelerators. Read now to learn more. Dell PowerEdge server with AMD Instinct™ Accelerators.
Posted: 13 Nov 2024 | Published: 13 Nov 2024

Dell Technologies & AMD

The Big Book of Genai 5 Ways to Leverage Your data to build Production-Quality GenAl Applications
sponsored by DataBricks
EBOOK: This 118-page e-book is a thorough guide to deploying GenAI applications. It details the entire GenAI process, from using foundation models to custom model pretraining and fine-tuning. Access the full e-book now to learn how you can unlock the potential of GenAI for your organization.
Posted: 07 May 2024 | Published: 07 May 2024

TOPICS:  .NET
DataBricks

Financial Planning's Transitional Phase: What to Expect
sponsored by Centage
EGUIDE: CFOs are transitioning away from spreadsheets to budgeting, planning and forecasting (BP&F) software. Change is difficult, but necessary to success. Learn why Hames Corp. CFO Max Rule considers himself a "change agent" and what that means, and discover the importance of BP&F software for streamlining business processes.
Posted: 08 Feb 2021 | Published: 29 Sep 2016

Centage

A Computer Weekly buyer's guide to perimeterless network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 08 Feb 2021 | Published: 05 Feb 2019

TechTarget ComputerWeekly.com

Customer Experience Intelligence Report IN
sponsored by ServiceNow
RESEARCH CONTENT: 66% of customers consider taking their business elsewhere when an issue is not resolved within 3 days. This can be problematic, given the average of 3.9 days for companies to resolve a problem, and tends to lead to customers switching brands. So, what can organisations do to improve their customer service? Browse this report to learn more.
Posted: 26 Sep 2024 | Published: 26 Sep 2024

ServiceNow

Panzura Detect and Rescue
sponsored by Panzura
WHITE PAPER: According to McKinsey, ransomware costs are projected to reach a staggering $265 billion by 2031. This white paper will show you how Panzura Detect compliments the robust passive protections inherent in Panzura CloudFS. Read on to learn more.
Posted: 04 Apr 2024 | Published: 05 Apr 2024

TOPICS:  .NET
Panzura