Micro Electro-mechanical Devices White Papers

(View All Report Types)
CW Europe – June-August 2019: Why are Dutch companies slow to take up the advantages of IoT?
sponsored by TechTarget ComputerWeekly.com
EZINE: Rapid adoption of the latest technologies is not only being encouraged by governments, but driven by them. Being the first country to set up the ideal environment for a new technology has huge economic advantages.
Posted: 08 Feb 2021 | Published: 13 Jun 2019

TechTarget ComputerWeekly.com

All-Flash: The Essential Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This guide offers a comprehensive survey of the all-flash array market. We look at all-flash products from the big six storage vendors and the startups and specialists. Plus, we give the lowdown on all-flash vs hybrid flash arrays and all-flash vs server-side PCIe SSD.
Posted: 08 Feb 2021 | Published: 19 Aug 2016

TechTarget ComputerWeekly.com

Don’t Risk IT! NAC’s Critical Role in Mitigating Network Risk
sponsored by Portnox
WHITE PAPER: As cyber threats evolve, Network Access Control (NAC) is crucial for mitigating network risks. This white paper explores the threat landscape, the proliferation of connected devices, and how NAC can address challenges like visibility, compliance, and zero trust security. Learn more by reading the full white paper.
Posted: 08 Feb 2025 | Published: 08 Feb 2025

Portnox

Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.
Posted: 08 Feb 2021 | Published: 24 May 2019

TechTarget ComputerWeekly.com

Make the switch from Citrix to Omnissa Horizon
sponsored by TD Synnex
EGUIDE: As organizations strive to support a distributed workforce, IT leaders are increasingly turning to virtualization solutions to create secure, scalable infrastructures that empower employees to work from anywhere. However, many IT leaders report frustration with legacy systems that fail to deliver effective solutions for today's remote workforce.
Posted: 11 Mar 2025 | Published: 11 Mar 2025

TD Synnex

Atlassian Cloud Data Protection
sponsored by Atlassian
EBOOK: In most industries, the most important asset to an organization is data. The problem is that data is becoming more challenging to protect and secure, and this is no different in the cloud. If your data isn’t protected correctly, the cost of a breach can take down an entire organization. So, what are the challenges? Read on to find out more.
Posted: 22 Aug 2023 | Published: 22 Aug 2023

TOPICS:  .NET
Atlassian

A Practical Guide to Zero Trust Implementation in Multicloud Environments
sponsored by Connections
EBOOK: Explore a practical guide to implementing a Zero Trust architecture in multicloud environments. Learn how to progress your Zero Trust maturity, select the right technologies, and work with a trusted partner. Read the full e-book to secure your modern IT ecosystem.
Posted: 19 Sep 2024 | Published: 20 Sep 2024

Connections

Why zero trust is IT security's best hope
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.
Posted: 08 Feb 2021 | Published: 21 Feb 2020

TechTarget ComputerWeekly.com

MicroScope – February 2020: The power to transform
sponsored by MicroScope
EZINE: In this issue, MicroScope asks experts what to expect in 2020, and the channel shares why change is necessary to thrive in different business environments
Posted: 08 Feb 2021 | Published: 03 Feb 2020

MicroScope

NVMe flash storage 101
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
Posted: 08 Feb 2021 | Published: 31 Mar 2017

TechTarget ComputerWeekly.com

Software Firewalls
sponsored by Palo Alto Networks
EBOOK: In this free Software Firewalls for dummies e-book, discover everything you need to know about today’s demands for software firewalls and zero trust, and find out the 10 essential questions you need to ask your software firewall vendor.
Posted: 08 Apr 2024 | Published: 09 Apr 2024

TOPICS:  .NET
Palo Alto Networks

Trust no one: Why zero trust security is taking the world by storm
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.
Posted: 18 Feb 2022 | Published: 18 Feb 2022

TechTarget ComputerWeekly.com

Zero Trust in the 5G Era
sponsored by Ericsson
WHITE PAPER: This white paper offers a guide for CISOs on implementing a zero-trust security framework in the 5G era. It explores how organizations can use ZT principles to secure their digital footprint while maintaining business agility. Read the full paper to discover key ZT capabilities, use cases, and a roadmap for successful implementation.
Posted: 21 Feb 2025 | Published: 21 Feb 2025

Ericsson

A Computer Weekly buyer's guide to edge datacentres
sponsored by TechTarget ComputerWeekly.com
EBOOK: Edge datacentres seem set for a post-pandemic resurgence. In this 17-page buyer's guide, Computer Weekly looks at what makes them such an appealing option, the role infrastructure as code has to play and what's driving company adoption.
Posted: 12 May 2022 | Published: 12 May 2022

TechTarget ComputerWeekly.com

Seven Strategies to Jumpstart Your Network Security Transformation
sponsored by Netskope
WHITE PAPER: This white paper outlines seven strategies for network security transformation: assessing posture, aligning security and networking teams, securing web traffic, modernizing connectivity, enhancing remote access, achieving operational excellence, and optimizing SASE architecture. Learn to balance security and performance in your network journey.
Posted: 27 Feb 2025 | Published: 28 Feb 2025

Netskope

Digital Remote Monitoring and Onsite Services’ Impact on Edge Computing and Data Centers
sponsored by Schneider Electric
WHITE PAPER: Digital remote monitoring services can reduce data center downtime, operations overhead, and improve sustainability through features like real-time monitoring, predictive analytics, and automated field service dispatch. Review this white paper to learn how these services can enhance your data center operations.
Posted: 20 Feb 2025 | Published: 20 Feb 2025

Schneider Electric

The Healthcare CISO’s Medical IoT Security Guide
sponsored by Palo Alto Networks
EBOOK: Over the past few years, the healthcare industry has seen a surge in the use of connected medical devices. However, the more devices a healthcare organization deploys and connects, the bigger their attack surface becomes, putting confidential health data at risk. Read on to learn how to overcome the risk exposure of medical IoT devices.
Posted: 08 Nov 2023 | Published: 08 Nov 2023

TOPICS:  .NET
Palo Alto Networks

Privileged Access Management
sponsored by One Identity
ANALYST REPORT: Read this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  Access Control
One Identity

MicroScope: Grasp the social networking opportunity
sponsored by MicroScope
EZINE: An issue looking at the issues around social media, the growth in unclouding and some security industry predictions for the year ahead.
Posted: 08 Feb 2021 | Published: 02 Jan 2018

MicroScope

SASE Enables Zero-Trust Networking, Improves Business Agility, Reduces Costs And Streamlines Digital Transformations
sponsored by Verizon
ANALYST REPORT: To reduce networking costs, to secure their remote workforce, to enable more flexible networking: These are a few of the many rewards that have driven organizations to journey to SASE. In this S&P Global report, discover lessons that can guide your business through the shift to SASE.
Posted: 23 Aug 2023 | Published: 23 Aug 2023

TOPICS:  .NET
Verizon

Computer Weekly – 20 October 2020: Why is IBM splitting in two and what does it mean for CIOs?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.
Posted: 08 Feb 2021 | Published: 20 Oct 2020

TechTarget ComputerWeekly.com

How to prepare your network for IoT data challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide outlines how business requirements will affect your IoT network build, takes a deep dive into specific IoT network architecture and explores IoT topology options.
Posted: 08 Feb 2021 | Published: 03 Oct 2019

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to blockchain technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 08 Feb 2021 | Published: 16 Oct 2019

TechTarget ComputerWeekly.com

Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

Top 10 cloud stories 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While cloud has established itself as the preferred way for many enterprises to consume IT resources, organisations in some vertical markets have taken markedly longer to come round to its charms. With this as a backdrop, Computer Weekly takes a look at the top 10 cloud stories of 2018.
Posted: 08 Feb 2021 | Published: 03 Jan 2019

TechTarget ComputerWeekly.com