Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
Motorola's Wireless Broadband Indoor/Outdoor Solution
sponsored by Motorola Solutions
WHITE PAPER:
With a Wi-Fi network, businesses can increase the efficiency of their mobile employees resulting in increased ROI and greater profitability. This document highlights two specific indoor/outdoor Wi-Fi network configurations based on Motorola's MOTOMESH Duo product solution.
Posted: 28 Apr 2009 | Published: 02 Apr 2009
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Emerging Multicast VPN Applications
sponsored by Juniper Networks, Inc.
WHITE PAPER:
This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
Posted: 25 Nov 2008 | Published: 25 Nov 2008
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022
|
|
|
Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019
|
|
|
How Can Internet Hijacking be Prevented or Mitigated?
sponsored by Dimension Data
EGUIDE:
In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.
Posted: 08 Feb 2021 | Published: 21 Sep 2016
|
|
|
Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018
|
|
|
Securing the Industrial Internet of Things
sponsored by PC Connection
INFOGRAPHIC:
Securing the Industrial Internet of Things (IIoT) is critical as cybersecurity threats rise. Understand the IIoT threat landscape and learn how to assess OT and IIoT security with a 3-step approach. Download this infographic to discover best practices for minimizing risk and maximizing the returns of IIoT.
Posted: 19 Sep 2024 | Published: 20 Sep 2024
|
All resources sponsored by PC Connection
|
|
The Internet Outage Survival Guide: Unpacking common outages types and how they impact your business
sponsored by Cisco ThousandEyes
EBOOK:
Today, business rely on the Internet more than ever. Yet, the Internet is as unpredictable as it is critical. It's a "best-effort" collection of networks connecting a myriad of providers, and at its very core, the Internet is vulnerable to outages. In this e-book, learn how you can mitigate the risk of an Internet outage.
Posted: 08 Feb 2021 | Published: 15 Jan 2021
|
|
|
Ultimate IoT implementation guide for businesses
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
IT administrators and CIOs considering an internet of things (IoT) deployment must have a thorough understanding of what the IoT is, how it operates, its uses, requirements, tradeoffs and how to implement IoT devices and infrastructures. In this e-guide, learn the requirements and use best practices for a successful deployment.
Posted: 22 Jun 2022 | Published: 22 Jun 2022
|
|
|
Royal Holloway: Attack mapping for the internet of things
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.
Posted: 13 May 2022 | Published: 13 May 2022
|
|
|
Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017
|
|
|
CW EMEA – February 2023: Kyiv is ready for anything
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this issue of CW EMEA, the CIO at Kyiv City Council explains how its IT team has kept services running for residents amid relentless bombing by Russia. We also look at the Netherlands’ plans to regulate AI to reduce bias, how highly accurate time protocols ensure fair trading, and the use of tech in agriculture in Denmark. Read the issue now.
Posted: 02 Feb 2023 | Published: 09 Feb 2023
|
|
|
Raspberry PI with Java: programming the internet of things
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
Posted: 08 Feb 2021 | Published: 27 Sep 2016
|
|
|
Zero Trust for Supply Chain Collaboration
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW:
Zero Trust security can help secure supply chain collaboration and data exchange, even with untrusted partners. Learn how Zentera's software-defined solution enables fine-grained access controls and protects against data leaks. Read the full solution brief to discover more.
Posted: 13 Sep 2024 | Published: 13 Sep 2024
|
|
|
Computer Weekly – 21 August 2018: Delivering the potential of the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we hear from early adopters of internet of things technologies about how to deliver on the potential of IoT. We examine strategies for combining hyper-converged infrastructure and cloud storage to best effect. And we find out how the UK government intends to use data to improve Britain's railways. Read the issue now.
Posted: 08 Feb 2021 | Published: 17 Aug 2018
|
|
|
CW APAC: Trend Watch - Internet of Things
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, Computer Weekly looks at how APAC firms are putting the internet of things to good use in an increasingly connected world, yet technology integration and security concerns are holding back widespread adoption.
Posted: 08 Feb 2021 | Published: 15 Aug 2019
|
|
|
Computer Weekly – 4 February 2020: Ethics and the internet – how to build a web we can trust
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Feb 2020
|
|
|
CW Europe – June-August 2019: Why are Dutch companies slow to take up the advantages of IoT?
sponsored by TechTarget ComputerWeekly.com
EZINE:
Rapid adoption of the latest technologies is not only being encouraged by governments, but driven by them. Being the first country to set up the ideal environment for a new technology has huge economic advantages.
Posted: 08 Feb 2021 | Published: 13 Jun 2019
|
|
|
Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
Posted: 23 Jun 2022 | Published: 23 Jun 2022
|
|
|
Computer Weekly – 15 October 2019: Securing the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Oct 2019
|
|
|
How to enhance your network for the future
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
Posted: 08 Feb 2021 | Published: 15 Aug 2016
|
|
|
CW APAC - February 2022: Trend Watch - enterprise 5G
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, focused on enterprise 5G in the Asia-Pacific region, Computer Weekly looks at what the technology means for enterprises across the region.
Posted: 18 Feb 2022 | Published: 18 Feb 2022
|
|
|
The Cloud Connectivity Cookbook
sponsored by Aryaka
EBOOK:
As enterprises move to the cloud, network connectivity is critical for consistent application performance. This e-book explores the importance of multi-cloud networking, best practices for selecting the right cloud service provider, and how Aryaka's Unified SASE can deliver optimized connectivity. Read the full e-book to learn more.
Posted: 02 Oct 2024 | Published: 02 Oct 2024
|
|
|
Computer Weekly – 25 June 2019: Saving bees with the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how internet of things technologies and "smart hives" are helping bee conservation. We examine Facebook's new digital currency, Libra, and analyse its pros and cons. And we look at how IT leaders are rising to the challenge of delivering ethics and sustainability in tech. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Jun 2019
|
|
|
Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018
|
|
|
Computer Weekly - 14 December 2021: The rules for a safer internet
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
Posted: 12 Dec 2021 | Published: 14 Dec 2021
|
|
|
CW Europe – September-November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.
Posted: 08 Feb 2021 | Published: 07 Sep 2017
|
|