Lotus Notes Engineers White Papers

(View All Report Types)
Relational Modeling with UML
sponsored by IBM Software Group
WHITE PAPER: This white paper explains the basic concepts behind relational modeling, how it applies to databases and how it is implemented using UML.
Posted: 20 Jun 2007 | Published: 01 Jan 2003

IBM Software Group

7 Types of Hard CISSP Exam Questions and How to Approach Them
sponsored by Global Knowledge
WHITE PAPER: Learn about the seven types of hard questions you are likely to see on the CISSP examination and the best approaches for solving them.
Posted: 03 Apr 2006 | Published: 01 Mar 2006

Global Knowledge

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER: The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008

ISC2

Managing Storage: Trends, Challenges, and Options
sponsored by EMC Corporation
WHITE PAPER: With the explosion of data, storage environments are becoming more complex. Poorly designed storage infrastructures are putting companies at risk. Download this study to learn how storage managers built stronger storage management teams and environments.
Posted: 31 Jul 2006 | Published: 01 Jul 2006

EMC Corporation

Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server
sponsored by Veritas
WHITE PAPER: Learn about a comprehensive technology for customers that want quick recovery and off-host backup support. Eliminate backup windows, reduce the performance load on application servers, and quickly bring applications back online after data c...
Posted: 19 Nov 2007 | Published: 01 Mar 2007

Veritas

The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008

ISC2

State of Analytics Engineering 2024
sponsored by dbt Labs, Inc.
RESEARCH CONTENT: This research report from dbt Labs examines the complex landscape faced by data professionals and their organizations. Key findings include the importance of data quality, the rise of AI in data teams, and the challenges of maintaining data ownership and stakeholder literacy. Read on to learn more about the state of analytics engineering.
Posted: 18 Jun 2024 | Published: 18 Jun 2024

dbt Labs, Inc.

Observability engineering
sponsored by Honeycomb
EBOOK: Observability is critical for managing today's software.This O'Reilly e-book presents 321 pages of expert insights on the state of observability engineering, giving you the information you need to understand the most prevalent trends and strategies. Read on to learn more.
Posted: 17 Sep 2024 | Published: 17 Sep 2024

Honeycomb

Kubernetes Traffic Engineering for Network Engineers: Cilium Best Practices
sponsored by Cisco
EBOOK: Traffic engineering in Kubernetes optimizes network performance, security, and costs. This paper explores using Cilium, a leading cloud-native networking solution, for advanced traffic routing in Kubernetes. Learn techniques for managing traffic flows. Discover how to build a resilient, high-performance Kubernetes network.
Posted: 07 Dec 2024 | Published: 07 Dec 2024

Cisco

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

CI/CD Metrics for Platform Engineers
sponsored by CircleCI
EBOOK: This eBook explores the most meaningful engineering metrics for platform teams, including velocity, morale, and business metrics. Learn how to use these metrics to improve your team's performance and deliver quality software faster. Download the eBook to discover proven strategies for optimizing your CI/CD pipeline.
Posted: 20 Sep 2024 | Published: 20 Sep 2024

CircleCI

Index Engines’ CyberSense Validated 99.99% Effective In Detecting Ransomware Corruption
sponsored by Index Engines
ESG TECHNICAL VALIDATION REPORT: This Enterprise Strategy Group technical analysis validates that Index Engines' CyberSense AI-powered data analysis can detect ransomware corruption in backups with 99.99% accuracy. The report concludes it is an effective solution for organizations seeking to improve ransomware detection. Read the ESG report to learn more.
Posted: 03 Oct 2024 | Published: 03 Oct 2024

Index Engines

Improve cyber resiliency and protect data from cyber ransomware threats by using an isolated vault, AI-based ML analytics software, and more
sponsored by Index Engines
WHITE PAPER: Improve cyber resilience and protect data from ransomware threats with Dell PowerProtect Cyber Recovery's isolated vault, AI-based analytics, and recovery capabilities. Download this white paper to learn how you can strengthen your data protection strategy.
Posted: 31 Oct 2024 | Published: 01 Nov 2024

Index Engines

Bolster your data protection plan with a fast-acting, more robust cyber recovery solution
sponsored by Index Engines
WHITE PAPER: Dell PowerProtect Cyber Recovery offers physical isolation and deep ransomware scanning. It can provide fast recovery with options to restore data to production or recovery environments. Read the full white paper to learn how Dell's solution could bolster your data protection plan.
Posted: 31 Oct 2024 | Published: 01 Nov 2024

Index Engines

IDC: Business Value of Google Cloud VMware Engine Report
sponsored by Google
WHITE PAPER: Digital business leaders are relying more heavily on multicloud environments to meet the requirements of specific workloads with the best choice of infrastructure and cloud services. However, managing disparate environments adds complexity, which can be difficult for many workloads.
Posted: 29 May 2024 | Published: 29 May 2024

TOPICS:  Cloud Computing
Google

Think Big, Start Small, Scale Fast: The Data Engineering Workbook
sponsored by HighByte
EBOOK: In this interactive workbook, you’ll discover 10 steps accompanied by some brief questions that are designed to help industrial leaders learn how they can leverage data engineering strategies to get the most out of their data. Read on to learn how you can unlock hidden business value.
Posted: 19 Dec 2023 | Published: 20 Dec 2023

TOPICS:  .NET
HighByte

It Leaders Are Considering A New Support And Services Model
sponsored by Rimini Street
RESEARCH CONTENT: CIOs and CTOs face challenges with their IT support, noting issues like poor accountability and expertise. They're exploring a shift to a single provider for support and managed services. Discover their priorities and the advantages of this IT model in the full report.
Posted: 16 Aug 2024 | Published: 16 Aug 2024

Rimini Street

AI tools for software developers: Part One
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?
Posted: 08 Feb 2021 | Published: 11 Jun 2019

TechTarget ComputerWeekly.com

HighByte Intelligence Hub version 3.2: A complete UNS and data engineering toolset
sponsored by HighByte
WHITE PAPER: In this white paper, you’ll discover a software solution designed to provide organizations will all the necessary components to build and manage a Unified Namespace (UNS). Read on to learn how you can maximize the value and accessibility of your industrial data.
Posted: 22 Dec 2023 | Published: 22 Dec 2023

TOPICS:  .NET
HighByte

Computer Weekly - 29 October 2019: IR35 reforms - the difficult decisions facing IT contractors
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.
Posted: 08 Feb 2021 | Published: 29 Oct 2019

TechTarget ComputerWeekly.com

Don’t Let Your Culture Eat Revenue: Building an Intent-Driven Revenue Engine
sponsored by Informa TechTarget
EBOOK: Discover how to transform your revenue process by shifting focus from MQLs to buying group insights and intent signals. Learn to identify overlooked and hidden opportunities to increase sales efficiency and generate more revenue. Read the e-book to learn more.
Posted: 02 Dec 2024 | Published: 03 Dec 2024

Informa TechTarget

Architectural Design Decisions Directly Impact IT Agility For Pure Storage Flasharray And Flashblade Users
sponsored by Pure Storage
WHITE PAPER: Across the enterprise storage ecosystem, all-flash arrays (AFAs) have grown in popularity. Yet, this IDC white paper notes, "not all AFAs are created equally"; the architecture of an AFA will determine its usability, manageability and sustainability, impacting IT agility. For a deep dive into AFA obstacles and opportunities, continue on.
Posted: 04 Apr 2024 | Published: 05 Apr 2024

TOPICS:  .NET
Pure Storage

2024 Assessment Report
sponsored by Bitdefender
RESEARCH CONTENT: Cybersecurity threats are evolving, with AI-powered attacks and cloud security challenges at the forefront. This report examines the state of cloud security, the impact of AI, and the need for proactive, multilayered defense strategies. Download the report to gain insights into navigating these new cybersecurity frontiers.
Posted: 04 Jul 2024 | Published: 04 Jul 2024

Bitdefender

Secure Email - Market Quadrant 2024
sponsored by Fortra
ANALYST REPORT: The Radicati Secure Email Market Quadrant 2024 evaluates leading vendors in the secure email market, including Proofpoint, Mimecast, Symantec, Cisco, and more. Learn how these vendors protect against email threats like phishing, BEC, and malware. Read the full report for a comprehensive analysis.
Posted: 07 Dec 2024 | Published: 07 Dec 2024

Fortra

A guide to continuous software delivery
sponsored by TechTarget ComputerWeekly.com
EBOOK: Software empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.
Posted: 30 Aug 2022 | Published: 30 Aug 2022

TechTarget ComputerWeekly.com

CW APAC: Tech career guide – women in IT
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on tech careers for women in the Asia-Pacific region, Computer Weekly looks at what can be done to attract more women into software development.
Posted: 13 Dec 2022 | Published: 15 Dec 2022

TechTarget ComputerWeekly.com

From Legacy to Leading: Transform Your Business with AWS and Deloitte
sponsored by AWS - Deloitte
EBOOK: Discover how Deloitte's hybrid solutions and industry expertise can help you transform your business with AWS. Learn about application modernization, migration, and quality engineering services that deliver sustainable business goals. Read the e-book to start your transformation.
Posted: 10 Dec 2024 | Published: 10 Dec 2024

AWS - Deloitte

Why Businesses can’t Afford to Ignore Tax Transformation
sponsored by Thomson Reuters
WHITE PAPER: This white paper explores how embedded tax automation can aid these teams today and into the future. Read the white paper to view 6 ways tax automation and ERP integration can transform your tax department, to see the current attitude towards AI, and to review the results of this study in greater detail.
Posted: 27 Nov 2024 | Published: 27 Nov 2024

All resources sponsored by Thomson Reuters

Put AI To Work For People Leverage The Power of Artificial Intelligence to Transform Business
sponsored by ServiceNow
ANALYST REPORT: Discover how generative AI can transform your business processes. Learn to leverage AI for faster summarization, personalization, and better decision-making. Explore the benefits and best practices for implementing AI solutions. Read the full Analyst Report.
Posted: 23 Aug 2024 | Published: 23 Aug 2024

ServiceNow

Identity Fabrics: Analysis and overview
sponsored by One Identity
ANALYST REPORT: This Leadership Compass evaluates solutions that can serve as a foundation for building modern Identity Fabrics. It examines the market, product functionality, vendor positions, and innovative approaches. Download the report to learn about the leading solutions for delivering integrated identity services.
Posted: 29 Oct 2024 | Published: 29 Oct 2024

One Identity