Link Control Protocols White Papers

(View All Report Types)
The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

CW ANZ: Fix the weak links
sponsored by TechTarget ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jul 2018

TechTarget ComputerWeekly.com

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

DataOps: The Missing Link in Your Industrial Data Architecture
sponsored by HighByte
WHITE PAPER: How can your business simplify data contextualization to maximize the value of your technology investments? By leveraging DataOps to define standard models and establish and manage integrations, operational teams can provide data to the systems and business users who are requesting it in a more efficient and managed way. Read on to learn more.
Posted: 26 Oct 2023 | Published: 26 Oct 2023

TOPICS:  .NET
HighByte

Regaining Control With A Connectivity Cloud
sponsored by Cloudflare
FORRESTER RESEARCH REPORT: Businesses are struggling to manage the growing complexity of IT and security responsibilities. A connectivity cloud solution could help regain control by providing secure, performant connectivity across on-premises, cloud, and web environments. Read the full Forrester Research report to learn more.
Posted: 13 Jul 2024 | Published: 13 Jul 2024

Cloudflare

Understanding Gmail And Yahoo’s New Standards For Senders
sponsored by Sinch
WHITE PAPER: Gmail and Yahoo are changing email-sending requirements in 2024. Learn how to ensure your domain settings, unsubscribe links, and spam rates align with the new protocols to avoid getting blocked from major inboxes. Access the guide to understand the remediation steps.
Posted: 29 May 2024 | Published: 29 May 2024

TOPICS:  .NET
Sinch

NVMe promises blisteringly fast flash performance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this guide we look at the architectural issues blocking agreement on NVMe, the fundamentals that underlie NVMe and its blistering performance, the key NVMe product deployments available, and ask what will become of the storage features associated with the storage controller.
Posted: 08 Feb 2021 | Published: 10 Apr 2018

TechTarget ComputerWeekly.com

Remote Connectivity: The Crucial Link For Healthcare Digitalization
sponsored by TeamViewer
WHITE PAPER: Remote connectivity is crucial for healthcare digitalization, enabling remote patient monitoring, secure access, and instant IT support. Discover how a secure remote connectivity platform can help your organization improve operational efficiency and patient outcomes. Read the full white paper.
Posted: 10 Oct 2024 | Published: 10 Oct 2024

TeamViewer

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: Download this report and learn the risks associated with privileged access, and explains how solutions from One Identity mitigate those risks with granular access control and accountability.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  Access Control
One Identity

Unveiling the True Potential of Identity: Strengthening Security through Complementary Practices
sponsored by One Identity
EBOOK: Download this report and learn why, in today's evolving threat landscape, a complimentary approach to identity governance and Privileged Access Management is vital for organizations seeking to maintain a secure and compliant environment.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  Access Control
One Identity

Privileged Access Management
sponsored by One Identity
ANALYST REPORT: Read this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  Access Control
One Identity

Connectivity Cloud: A Way To Take Back IT And Security Control
sponsored by Cloudflare
WHITE PAPER: Organizations are losing control over their IT and security as their technology environment becomes more complex. Learn how a "connectivity cloud" can help regain control by providing seamless, secure, and performant connectivity across any network, cloud, or user. Read the full white paper to discover the benefits.
Posted: 13 Jul 2024 | Published: 13 Jul 2024

Cloudflare

Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

Zero Trust Lateral Access Control
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW: Secure your network by controlling lateral access with zero trust identity. Learn how Zentera's CoIP Platform enables targeted lateral access controls to defend against advanced threats inside your network. Read the solution brief to discover this elegant zero trust approach.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Software Development Kit (SDK) U.Trust SDK
sponsored by Utimaco
BLOG: The utrust SDK is a professional development environment that enables custom firmware extensions for Utimaco's hardware security modules. It provides full control, efficient development, and qualified support to create tailored security solutions. Read the full details in this blog article.
Posted: 17 Jul 2024 | Published: 17 Jul 2024

Utimaco

Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019

TechTarget ComputerWeekly.com

How to Implement an OSS Governance Program
sponsored by Anaconda
WHITE PAPER: Just like all software, open-source carries risk, and many data science teams still lack security protocols. For some, there simply aren’t security protocols or governance tools for open-source software (OSS). Read on to learn about 6 steps you can take to build an OSS governance program that works for data science and set your team up for success.
Posted: 10 Jul 2023 | Published: 11 Jul 2023

TOPICS:  .NET
Anaconda

Zero trust: Taking back control of IT security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
Posted: 08 Feb 2021 | Published: 18 Jan 2021

TechTarget ComputerWeekly.com

Top Five Reasons to Convert Your AWS DirectConnect to a Multicloud On-Ramp
sponsored by Apcela
BLOG: This blog post outlines why you should convert the access circuits that enable AWS DirectConnect into a multicloud link instead of a single purpose connection and leveraging existing SD-WAN. Read on to uncover 5 reasons you should convert your AWS DirectConnect to a multicloud on-ramp.
Posted: 21 Jun 2022 | Published: 22 Jun 2022

TOPICS:  .NET
Apcela

Infographic: 6 file transfer best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.
Posted: 05 May 2022 | Published: 05 May 2022

TechTarget ComputerWeekly.com

Navigating Network Failover
sponsored by Ericsson
PRODUCT OVERVIEW: Having a strategy in place for WAN failover can help mitigate risks by providing automatic, seamless transitions to backup connectivity when the primary link fails. Read on here to discover how to navigate network failover with 5G and LTE, as well as assistance from Cradlepoint.
Posted: 26 Mar 2024 | Published: 26 Mar 2024

TOPICS:  .NET
Ericsson

NVMe flash storage 101
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
Posted: 08 Feb 2021 | Published: 31 Mar 2017

TechTarget ComputerWeekly.com

8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com 
EGUIDE: Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023

TechTarget ComputerWeekly.com 

Modernize your VDI with Omnissa Horizon
sponsored by Omnissa
PRODUCT OVERVIEW: Are you ready to revolutionize your virtual desktop and apps infrastructure? With Omnissa Horizon, you can streamline app management, optimize desktop provisioning, and enhance security - all from a single, easy-to-use platform. Read the full product overview now to learn how you can streamline and secure your virtualization journey.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

TOPICS:  .NET
All resources sponsored by Omnissa

Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019

TechTarget ComputerWeekly.com

Mastering Cilium for Kubernetes Compliance
sponsored by Cisco
EBOOK: Cilium simplifies Kubernetes compliance with advanced networking, security, and observability features. Learn how Cilium addresses NIST 800-53 and 800-190 controls for access control, auditing, and incident response in this white paper.
Posted: 07 Dec 2024 | Published: 07 Dec 2024

Cisco