Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER:
Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER:
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019
|
|
|
Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022
|
|
|
Keeping Legacy Applications up-to-date with AI
sponsored by Reply
CASE STUDY:
AI agents can help maintain complex legacy systems by simplifying knowledge transfer, automating tasks, and reducing the need for manual coding. Learn how this major car manufacturer leveraged AI to modernize their legacy applications. Read the full white paper.
Posted: 30 Jul 2024 | Published: 30 Jul 2024
|
|
|
Transforming Manufacturing with SASE
sponsored by Cato Networks
WHITE PAPER:
Discover how Secure Access Service Edge (SASE) can transform manufacturing by streamlining IT, enhancing security, and enabling secure global connectivity. Learn how leading manufacturers overcame challenges with SASE in this informative white paper.
Posted: 19 Aug 2024 | Published: 20 Aug 2024
|
|
|
Transforming Manufacturing for the Digital Age
sponsored by Zebra Technologies
EBOOK:
Dive into a five-step guide to transform your manufacturing operations with smart, tech-forward strategies that modernize processes and reduce costs.
Posted: 26 Apr 2024 | Published: 27 Apr 2024
|
|
|
How Edge Computing is Enabling the Future of Manufacturing
sponsored by Schneider Electric
RESEARCH CONTENT:
As edge computing and its applications continually evolve, ITDMs expect edge computing to transform the manufacturing industry in several ways. Access this research content to gain deeper insights into how manufacturers are leveraging edge computing to better prepare for the future.
Posted: 18 Oct 2023 | Published: 18 Oct 2023
|
|
|
A Computer Weekly Buyer's Guide to Containers and Microservices
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this 13-page buyer's guide, Computer Weekly looks at how the architectures are configured, the suppliers building them – and the benefits to the organisation using them.
Posted: 08 Feb 2021 | Published: 14 Mar 2016
|
|
|
The UK manufacturing sector needs a digital upgrade
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the UK manufacturing sector is lagging behind on digital technology – we examine the challenges for the industry in becoming a global leader. Our buyer's guide looks at enterprise social media and collaboration tools. And we find out how data science is helping to boost cyber security strategies. Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Jul 2019
|
|
|
Innovation Awards APAC 2023 - Project of the Year: Mondelez International
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Mondelez operates a large supply chain and manufacturing footprint to produce well-known snacks such as Cadbury chocolates and Oreo biscuits. In this e-guide, read how Mondelez tapped low-code/no-code development, drones and other emerging technologies, to deliver productivity gains, better employee experience and higher production yields.
Posted: 19 May 2023 | Published: 19 May 2023
|
|
|
Business Applications of Artificial Intelligence and Machine Learning
sponsored by TierPoint
WHITE PAPER:
Navigating the complex landscape of artificial intelligence (AI) and machine learning (ML) adoption can be a daunting task, often leaving companies uncertain about the right starting point. Look no further than this white paper, which dissects 9 top business applications of AI, specific uses by industry, and more.
Posted: 28 Feb 2024 | Published: 28 Feb 2024
|
|
|
The Future of Manufacturing with Generative AI
sponsored by Amazon Web Services
EBOOK:
Discover how Amazon Web Services (AWS) can help your industrial organization harness the transformative power of generative artificial intelligence (AI)
Posted: 10 Jul 2024 | Published: 10 Jul 2024
|
|
|
What CFOs Can Learn From Lean Manufacturing
sponsored by Sage Software
EGUIDE:
Leaders in a company's manufacturing organization wish their CFO understood one thing: Traditional accounting does not tell the whole story. In this expert guide, explore what you can learn from lean manufacturing and how one vendor is bringing accountants into the fold with their partner program.
Posted: 08 Feb 2021 | Published: 20 Jan 2017
|
|
|
6 user authentication types to secure networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.
Posted: 15 Mar 2023 | Published: 16 Mar 2023
|
|
|
CW Innovation Awards: Sime Darby ups ante in service management
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this case study, learn how Sime Darby Industrial's inService Suite has returned more than 100,000 hours to the company in a digitisation initiative that has improved efficiency and customer engagement.
Posted: 10 May 2021 | Published: 10 May 2021
|
|
|
Computer Weekly – 31 July 2018: Learning digital government lessons from Estonia
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at one of the world's most digitally advanced nations, Estonia, and ask what the UK government can learn. We talk to Airbus about how aircraft manufacturers are prioritising cyber security. And we examine how AI and robots will augment – not replace – human productivity. Read the issue now.
Posted: 08 Feb 2021 | Published: 27 Jul 2018
|
|
|
Illuminate Your Application Security
sponsored by Contrast Security
PRODUCT OVERVIEW:
As the threat landscape evolves, security must move with the network perimeter. This product overview reveals how Contrast Security's Security Observability solution provides real-time insights to help you secure applications, prioritize vulnerabilities, and respond to incidents more efficiently. Read the full overview to learn more.
Posted: 18 Dec 2024 | Published: 18 Dec 2024
|
|
|
Illuminate Your Application Security
sponsored by Contrast Security
PRODUCT OVERVIEW:
As the threat landscape evolves, security must move with the network perimeter. This product overview reveals how Contrast Security's Security Observability solution provides real-time insights to help you secure applications, prioritize vulnerabilities, and respond to incidents more efficiently. Read the full overview to learn more.
Posted: 11 Sep 2024 | Published: 11 Sep 2024
|
|
|
How to apply lean manufacturing to data management
sponsored by HighByte
EBOOK:
The volume, velocity and variety of raw industrial data are ever increasing, making it difficult to work with. Fortunately, manufacturers already have the framework they need to streamline data production and preparation. Read on to learn how you can enable your organization with lean data.
Posted: 08 Sep 2022 | Published: 08 Sep 2022
|
|
|
Case Study: How Airbus handles IoT network traffic in manufacturing
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The internet of things is set to power the fourth industrial revolution, providing data to optimise manufacturing. Airbus is starting to put sensors in aircraft assembly
Posted: 08 Feb 2021 | Published: 09 May 2019
|
|
|
Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018
|
|
|
Infographic: Which 5G applications will transform your business?
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The UK's operators have started work on their 5G network roll-outs, but what are the applications that are most likely to gain enterprise traction for the new standard?
Posted: 08 Feb 2021 | Published: 14 Aug 2019
|
|
|
Transform your Applications
sponsored by Red Hat
WHITE PAPER:
Azure Red Hat OpenShift provides a unified, cloud-based application platform to modernize apps, build cloud-native services, and accelerate innovation. Unlock new business possibilities with expert-managed hybrid cloud services. Read the full white paper to learn more.
Posted: 13 Jun 2024 | Published: 13 Jun 2024
|
|
|
State of Application Security 2024
sponsored by Cloudflare
EBOOK:
Today’s security practitioners and team leaders are responsible for protecting sensitive customer data and staying vigilant against a wide range of web app attacks and API abuse. Download the State of Application Security in 2024 to discover strategies for securing your web apps and APIs.
Posted: 13 Sep 2024 | Published: 14 Sep 2024
|
|
|
CW EMEA – February 2023: Kyiv is ready for anything
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this issue of CW EMEA, the CIO at Kyiv City Council explains how its IT team has kept services running for residents amid relentless bombing by Russia. We also look at the Netherlands’ plans to regulate AI to reduce bias, how highly accurate time protocols ensure fair trading, and the use of tech in agriculture in Denmark. Read the issue now.
Posted: 02 Feb 2023 | Published: 09 Feb 2023
|
|
|
Focus: Application Virtualisation
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide focuses on application virtualisation and how big companies are finding various ways to stop applications adversely affecting each other.
Posted: 08 Feb 2021 | Published: 13 Oct 2017
|
|