International Standards Organization White Papers

(View All Report Types)
Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success
sponsored by Tripwire, Inc.
WHITE PAPER: As businesses have instituted internal, industry, and government mandated regulatory compliance, the need for audit data to prove conformity has also become a necessity. Read this white paper to learn how configuration audit and control provides a single, independent source for enforcing and reporting on a change policy across an organization.
Posted: 14 Oct 2008 | Published: 14 Oct 2008

Tripwire, Inc.

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Increase Your Team’s Productivity With An Internal Developer Portal
sponsored by Red Hat
WHITE PAPER: Internal developer portals streamline application development by centralizing resources and enhancing collaboration. Red Hat Developer Hub, based on Backstage, addresses complexity and productivity challenges. It offers a unified environment for managing the development lifecycle. Read this white paper to boost your team's efficiency.
Posted: 25 Feb 2025 | Published: 26 Feb 2025

Red Hat

How generative AI is driving fintech innovation
sponsored by AWS & NVIDIA
PRODUCT OVERVIEW: Download the solution brief to explore key trends shaping the fintech landscape and the role of generative AI, challenges faced in data management and compliance, how GenAI can improve customer experiences and fraud prevention, and much more.
Posted: 26 Feb 2025 | Published: 26 Feb 2025

AWS & NVIDIA

Sustainable Devices for Positive Impact
sponsored by Dell Technologies and Intel
EGUIDE: Download this eGuide and learn how Dell and Intel help organizations be more sustainable.
Posted: 10 May 2023 | Published: 10 May 2023

Dell Technologies and Intel

Gamma International: The Macedonia files
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

Organizations Largely Unprepared for the Advent of 90-Day TLS Certificates
sponsored by CyberArk
RESEARCH CONTENT: CyberArk surveyed 800 security leaders to gauge their readiness for a 90-day TLS certificate standard, and uncovered their greatest management challenges and concerns about how this bold browser move could break businesses. Continue on to unlock the 20-page report.
Posted: 27 Dec 2024 | Published: 27 Dec 2024

TOPICS:  .NET
CyberArk

Setting the new standard in Audio Network Security
sponsored by Shure Inc
INFOGRAPHIC: As conferencing endpoints become more prevalent, safeguarding your network against unauthorized access and data privacy breaches is crucial. Learn how to implement rigorous security practices throughout your organization by reading this white paper.
Posted: 23 Oct 2024 | Published: 23 Oct 2024

Shure Inc

Driving Standardization Across Cloud with Enterprise Linux
sponsored by Red Hat
ANALYST REPORT: Standardizing on enterprise Linux can help organizations build stable cloud foundations to support AI and future workloads. This analyst report explores how an open hybrid cloud approach with enterprise Linux can enable application portability, consistent management, and access to partner ecosystems. Read the full report to learn more.
Posted: 05 Nov 2024 | Published: 06 Nov 2024

Red Hat

Guide to safeguarding payroll data in internationally expanding organisations (IN)
sponsored by ADP
RESEARCH CONTENT: Despite the increasing cyber-attacks and data insecurity trends, only 52% of today’s companies report that they’ve developed a playbook and a contingency plan across their geographies. This is concerning, especially for payroll teams. Browse this report to learn more.
Posted: 15 Feb 2024 | Published: 25 Jan 2024

TOPICS:  .NET
ADP

Improve IT Efficiency With A Standardized OS
sponsored by Red Hat
EBOOK: Are your teams struggling with managing diverse IT infrastructure? If so, you’re not alone, faced with the challenge of integrating legacy IT systems with new technologies. However, a standardized operating environment (SOE) on Red Hat Enterprise Linux can alleviate this burden. Read this e-book now to learn how.
Posted: 15 Mar 2025 | Published: 15 Mar 2025

TOPICS:  .NET
Red Hat

Use Standardization To Reduce IT Complexity And Accelerate Innovation
sponsored by Red Hat
WHITE PAPER: IT complexity often can’t be avoided as cyber-attack trends evolve and burgeoning data volumes show no signs of slowing down. Operating system (OS) standardization can significantly reduce this complexity, though, enabling heightened security and reduced technical debt. Read on now to learn more.
Posted: 15 Mar 2025 | Published: 15 Mar 2025

TOPICS:  .NET
Red Hat

Guide to safeguarding payroll data in internationally expanding organisations (AU)
sponsored by ADP
RESEARCH CONTENT: Despite the increasing cyber-attacks and data insecurity trends, only 52% of today’s companies report that they’ve developed a playbook and a contingency plan across their geographies. This is concerning, especially for payroll teams. Browse this report to learn more.
Posted: 24 Jan 2024 | Published: 25 Jan 2024

TOPICS:  .NET
ADP

Guide to safeguarding payroll data in internationally expanding organisations (PH)
sponsored by ADP
RESEARCH CONTENT: Despite the increasing cyber-attacks and data insecurity trends, only 52% of today’s companies report that they’ve developed a playbook and a contingency plan across their geographies. This is concerning, especially for payroll teams. Browse this report to learn more.
Posted: 07 Feb 2024 | Published: 07 Feb 2024

TOPICS:  .NET
ADP

Guide to safeguarding payroll data in internationally expanding organisations (HK)
sponsored by ADP
RESEARCH CONTENT: Despite the increasing cyber-attacks and data insecurity trends, only 52% of today’s companies report that they’ve developed a playbook and a contingency plan across their geographies. This is concerning, especially for payroll teams. Browse this report to learn more.
Posted: 24 Jan 2024 | Published: 24 Jan 2024

TOPICS:  .NET
ADP

Guide to safeguarding payroll data in internationally expanding organisations (SG)
sponsored by ADP
RESEARCH CONTENT: Despite the increasing cyber-attacks and data insecurity trends, only 52% of today’s companies report that they’ve developed a playbook and a contingency plan across their geographies. This is concerning, especially for payroll teams. Browse this report to learn more.
Posted: 07 Feb 2024 | Published: 07 Feb 2024

TOPICS:  .NET
ADP

Understanding Gmail And Yahoo’s New Standards For Senders
sponsored by Sinch
WHITE PAPER: Gmail and Yahoo are changing email-sending requirements in 2024. Learn how to ensure your domain settings, unsubscribe links, and spam rates align with the new protocols to avoid getting blocked from major inboxes. Access the guide to understand the remediation steps.
Posted: 29 May 2024 | Published: 29 May 2024

TOPICS:  .NET
Sinch

Audi Revolutionizes Internal Documentation with RAG-based AI Chatbot
sponsored by Reply
CASE STUDY: Audi streamlined their internal documentation with a RAG-based AI chatbot, improving knowledge management, security, and insights. Learn how this innovative solution from Storm Reply can enhance your organization's productivity and decision-making in this Case Study.
Posted: 30 Jul 2024 | Published: 30 Jul 2024

Reply

A world of complex challenges for global organizations
sponsored by Oracle
WHITE PAPER: Continuous Transaction Controls (CTC) and e-invoicing mandates are transforming tax compliance. Organizations face challenges as governments enforce real-time reporting with specific rules. Automation is key to managing complexities, improving efficiency, and ensuring compliance. Discover how integrated tax solutions streamline compliance.
Posted: 27 Mar 2025 | Published: 27 Mar 2025

Oracle

Computer Weekly – 12 February 2019: The Met Office storms ahead on data analytics
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, find out how the Met Office takes 2TB of weather data every hour and turns it into useful business insight. We examine whether Amazon's presence in the retail market is putting off other retailers from using its public cloud services. And we look at the new 802.11ax wireless networking standard. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Feb 2019

TechTarget ComputerWeekly.com

International Justice Mission secures remote field devices with Tanium
sponsored by Tanium
CASE STUDY: Secure endpoint devices make it possible for nonprofit International Justice Mission to provide its social-justice services. In this case study, learn how the nonprofit ensures its laptops and other endpoint devices are protected.
Posted: 23 Jan 2024 | Published: 23 Jan 2024

TOPICS:  .NET
Tanium

CW EMEA - January 2023: Protecting the privacy of schoolchildren
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
Posted: 11 Jan 2023 | Published: 12 Jan 2023

TechTarget ComputerWeekly.com

Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

The Business Value of Standardizing on Red Hat Enterprise Linux
sponsored by Red Hat
ANALYST REPORT: This analyst report is designed to help your business get started with your open source journey by putting context behind the business value of standardizing on Red Hat Enterprise Linux (RHEL). Read on now to discover key challenges and opportunities and learn how you can unlock the quantified benefits of RHEL.
Posted: 15 Mar 2025 | Published: 15 Mar 2025

TOPICS:  .NET
Red Hat

Set the Standards, Stay Ahead: Introducing SmartBear API Hub
sponsored by SmartBear Software
WEBCAST: As API complexity grows, teams need unified solutions for governance, security, and visibility. SmartBear API Hub integrates design, testing, and governance to streamline API delivery, enhancing security and adoption. It reduces development time, boosts discoverability, and enforces compliance. See how API Hub can transform your API lifecycle.
Posted: 26 Mar 2025 | Premiered: Mar 26, 2025

SmartBear Software

Extend AI across your organization
sponsored by Hewlett Packard Enterprise
WHITE PAPER: AI is everywhere. To boost productivity and innovation, your business needs to be ready to operationalize AI beyond initial development and deployment. HPE has the technology, software, and services to help you extend AI across your organization with confidence. Discover how HPE can help you in this report.
Posted: 19 Feb 2025 | Published: 19 Feb 2025

Hewlett Packard Enterprise

Guidelines For Secure Development And Deployment Of AI Systems
sponsored by Kaspersky
PRODUCT OVERVIEW: This document explores cybersecurity risks in AI systems, covering threat modeling, infrastructure security, data protection, and defense against ML-specific attacks. It offers practical recommendations for organizations implementing AI solutions. Read the datasheet to establish effective security controls throughout your AI system lifecycle.
Posted: 29 Mar 2025 | Published: 29 Mar 2025

Kaspersky