MPEG-1 Audio Layer-3 White Papers

(View All Report Types)
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017

TechTarget ComputerWeekly.com

Why the Zero-Click Attack on Outlook Is a Game-Changer for Email Security
sponsored by Checkpoint Software Technologies
WHITE PAPER: In March, Microsoft disclosed the CVE-2023- 23307 vulnerability, a threat impacting Outlook with a 9.8 CVSS Rating. Download this white paper to see how Checkpoint’s Harmony Email & Collaboration (HEC) API can prevent malicious emails from reaching the inbox.
Posted: 10 May 2024 | Published: 10 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

UCaaS Buyers’ Checklist
sponsored by 8x8
PRODUCT OVERVIEW: The best unified communications as a service (UCaaS) tools offer a range of transformative capabilities, from personalized meeting rooms to built-in security and encryption. Use this checklist to benchmark the most important features against your organization’s UCaaS requirements.
Posted: 31 May 2024 | Published: 31 May 2024

TOPICS:  .NET
8x8

Backup deduplication: a complete guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.
Posted: 08 Feb 2021 | Published: 24 Jan 2020

TechTarget ComputerWeekly.com

Enhancing Teams with Enterprise-Grade Telephony
sponsored by Vodafone
EBOOK: Your business depends on a robust communications experience to drive innovation, and phone calls are at the heart of that experience. That means having the utmost quality in telephony becomes imperative for optimal performance. This eBook explores what to look for in the best telephony solutions. Read the eBook.
Posted: 02 Feb 2024 | Published: 03 Feb 2024

TOPICS:  .NET
Vodafone

Ultimate IoT implementation guide for businesses
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT administrators and CIOs considering an internet of things (IoT) deployment must have a thorough understanding of what the IoT is, how it operates, its uses, requirements, tradeoffs and how to implement IoT devices and infrastructures. In this e-guide, learn the requirements and use best practices for a successful deployment.
Posted: 22 Jun 2022 | Published: 22 Jun 2022

TechTarget ComputerWeekly.com

Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018

TOPICS:  Telephones | VoIP
TechTarget ComputerWeekly.com

Case Study: Southern Water's centralised data team geared for silo busting
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Southern Water has centralised its data specialists and overhauled its data management and business intelligence technology to support business decision-making at scale
Posted: 08 Feb 2021 | Published: 09 May 2019

TechTarget ComputerWeekly.com

Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

Key Compliance Considerations Shift to Cloud Voice
sponsored by Theta Lake
WHITE PAPER: The shift to cloud-based voice platforms is transforming communication and collaboration in businesses worldwide. Download this white paper to unlock key compliance considerations to prepare for the shift to cloud voice.
Posted: 19 Jun 2024 | Published: 19 Jun 2024

TOPICS:  .NET
Theta Lake

Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette
sponsored by Cisco
RESEARCH CONTENT: The 2024 "Cyber Threat Trends Report" by Cisco analyzes the threats crowding the cyber landscape, including information stealers, Trojans and ransomware. It also provides insights on how DNS security can help defend your organization against those growing threats. Read the 18-page report to unlock the full insights.
Posted: 07 Sep 2024 | Published: 12 Sep 2024

Cisco

20 Ways to Increase Your Data Lake ROI
sponsored by Qlik
EBOOK: In this e-book, you'll discover how to accelerate your data lake ROI with real-time data pipeline automation, automated data transformation, and a smart data catalog for trusted, governed data. Read the full white paper now to learn more.
Posted: 13 Aug 2024 | Published: 27 Aug 2024

Qlik

Automating Data Lake Pipelines For AI
sponsored by Qlik
EBOOK: Automating data lake pipelines can help deliver accurate, model-ready data for AI initiatives faster. In this e-book, you'll learn how to build AI-enabled pipelines that automate ingestion, quality checks, processing, and storage optimization. Read on now to discover key considerations and steps for success.
Posted: 13 Dec 2024 | Published: 09 Aug 2024

Qlik

Automating Data Lake Pipelines For AI
sponsored by Qlik
EBOOK: Automating data lake pipelines can help deliver accurate, model-ready data for AI initiatives faster. In this e-book, you'll learn how to build AI-enabled pipelines that automate ingestion, quality checks, processing, and storage optimization. Read on now to discover key considerations and steps for success.
Posted: 30 Jul 2024 | Published: 09 Aug 2024

Qlik

9 IBM Cloud Paks for app modernization and cloud efforts
sponsored by TechTarget ComputerWeekly.com
EGUIDE: It takes time, money and labour to modernize applications and workflows to use cloud environments. IBM brings a new dimension to cloud adoption with highly integrated solution stacks that can provide a range of typical workflows for business users. In this e-guide, learn how IBM Cloud Paks can help ease some challenges of application modernization.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

A Computer Weekly Buyer's Guide to Wireless Networks
sponsored by TechTarget ComputerWeekly.com
EBOOK: Mobile devices are increasing the pressure on wireless networks. In this 13-page buyer's guide, learn about the latest developments in wireless networks, the challenges of wireless local area networking, and how to deploy the 802.11ac Wave 2 wireless standard.
Posted: 08 Feb 2021 | Published: 10 Aug 2017

TechTarget ComputerWeekly.com

Five Key Orchestration Capabilities to Achieve AI Value at Enterprise Scale
sponsored by IBM
ANALYST REPORT: To gain value from GenAI, organizations need a strategic, organization-wide approach to AI. This requires significant investment in time and resources, as well as the right tools. Read this analyst report now to learn about five key orchestration capabilities that can help organizations achieve this goal.
Posted: 13 Nov 2024 | Published: 13 Nov 2024

IBM

Securing Against Generative AI-powered Security Events
sponsored by CyberArk & AWS
ESG SHOWCASE: As AI threats evolve, organizations must adopt security measures against phishing, malware, data breaches, and social manipulation. This ESG Showcase demonstrates how AWS partners use AWS services to create secure, AI-powered solutions against these cyber risks. Learn how to secure your cloud and boost AI innovation confidently in the full report.
Posted: 28 Nov 2024 | Published: 28 Nov 2024

CyberArk & AWS

The LLM Mesh: A Practical Guide to Using Generative AI in the Enterprise
sponsored by Dataiku
EBOOK: This data, from a 2024 Dataiku and Cognizant survey of 200 senior analytics and IT leaders, highlights that GenAI is a top priority at the highest level — nearly three-quarters of respondents (73%) will spend over $500,000 on the tech in the next 12 months.
Posted: 30 Aug 2024 | Published: 30 Aug 2024

Dataiku

Scaling B2B Demand for Authentic Connections
sponsored by BrightTALK by TechTarget
BRIGHTTALK: In this eBook, learn how to effectively reach and convert targets at scale. Download your copy to explore new perspectives and methodologies on how to balance the crucial and competing needs for scale and depth of connections with your audience.
Posted: 02 Jun 2021 | Published: 02 Jun 2021

TOPICS:  .NET
BrightTALK by TechTarget

Unified Communications Buyers’ Guide
sponsored by 8x8
EBOOK: In this e-book, explore the key themes and concepts organizations should consider when selecting Unified Communications as a Service (UCaaS) technology.
Posted: 30 May 2024 | Published: 30 May 2024

TOPICS:  .NET
8x8

Firewall Buyers Guide
sponsored by Palo Alto Networks
BUYER'S GUIDE: As network perimeters have evolved, firewalls have too. So, what constitutes a modern firewall? This buyer’s guide maps out 15 non-negotiable capabilities. Keep reading to access those insights and more.
Posted: 04 Apr 2024 | Published: 04 Apr 2024

TOPICS:  .NET
Palo Alto Networks

The Bot Ecosystem: Understanding And Mitigating Automated Threats
sponsored by Arkose Labs
EBOOK: As automated bot attacks escalate, securing digital experiences is critical. This e-book explores the bot ecosystem, attack vectors, and limitations of traditional mitigation. Learn a modern, layered approach to detect, classify, and respond to advanced threats while enhancing user trust. Read the full e-book.
Posted: 16 Jul 2024 | Published: 16 Jul 2024

Arkose Labs

AI in Cybersecurity: Friend or Foe?
sponsored by Deep Instinct
RESEARCH CONTENT: Cybersecurity experts battle AI threats like deepfakes. Many use outdated EDR tools, but prevention strategies are emerging. This report explores predictive prevention for pre-emptive defense. Discover how to preempt evolving cyber risks in the full report.
Posted: 12 Jul 2024 | Published: 12 Jul 2024

Deep Instinct

In-Building Wireless Solution Guide
sponsored by Panduit
PRODUCT OVERVIEW: Wireless connectivity continues to make meaningful penetration into networks, unlocking performance and transforming the way your people work.Dive into this Panduit solution guide for an overview of in-building wireless solutions, including:Panduit Fault Managed Power SystemThe SmartZone Uninterruptible Power SupplyThe SmartZone G5 iPDUs
Posted: 06 Nov 2023 | Published: 07 Nov 2023

TOPICS:  .NET
Panduit