QA Staff White Papers

(View All Report Types)
Scalable Data Quality: A Seven Step Plan for Any Size Organization
sponsored by Melissa
WHITE PAPER: No matter the size of your business, data quality is an absolute requirement for success. Learn the seven steps you need to develop a plan for data quality - one that scales to your growing business needs.
Posted: 07 Jun 2007 | Published: 01 Jun 2007

Melissa

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Managing Storage: Trends, Challenges, and Options
sponsored by EMC Corporation
WHITE PAPER: With the explosion of data, storage environments are becoming more complex. Poorly designed storage infrastructures are putting companies at risk. Download this study to learn how storage managers built stronger storage management teams and environments.
Posted: 31 Jul 2006 | Published: 01 Jul 2006

EMC Corporation

Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER: The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008

ISC2

7 Types of Hard CISSP Exam Questions and How to Approach Them
sponsored by Global Knowledge
WHITE PAPER: Learn about the seven types of hard questions you are likely to see on the CISSP examination and the best approaches for solving them.
Posted: 03 Apr 2006 | Published: 01 Mar 2006

Global Knowledge

The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008

ISC2

Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server
sponsored by Veritas
WHITE PAPER: Learn about a comprehensive technology for customers that want quick recovery and off-host backup support. Eliminate backup windows, reduce the performance load on application servers, and quickly bring applications back online after data c...
Posted: 19 Nov 2007 | Published: 01 Mar 2007

Veritas

The Buyer’s Guide For AI & Cloud Skills Development
sponsored by QA
BUYER'S GUIDE: In this buyer's guide, you'll discover how to find the right technology skills development software to upskill your team for cloud and AI. You'll also learn about key features, the buying process, and how to narrow down your vendor decision. Read on now to uncover the best fit for your organization.
Posted: 06 Sep 2024 | Published: 12 Sep 2024

QA

Mobile application platforms: Essential guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: One of the mantras of modern enterprise application development is that business applications should be as easy to use as mass market consumer applications. Increasingly apps must be one step ahead of the user, pulling in context-specific information and providing a seamless user experience.
Posted: 08 Feb 2021 | Published: 21 Nov 2016

TechTarget ComputerWeekly.com

Sharpen your DevOps edge
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, find out why the DevOps culture is taking root across the region, the common pain points of organisations as they embrace a DevOps mindset and what it takes to be successful in the DevOps journey.
Posted: 08 Feb 2021 | Published: 21 Dec 2018

TechTarget ComputerWeekly.com

Solving the 3 Most Impactful AD and Entra ID Group Management Challenges
sponsored by One Identity
WHITE PAPER: This white paper explores the top 3 challenges of managing Active Directory and Entra ID groups. Learn how to implement a group management lifecycle to improve security and mitigate these risks. Read the full white paper to learn more.
Posted: 29 Oct 2024 | Published: 29 Oct 2024

One Identity

Computer Weekly – 4 September 2018: Power Play – how GE builds digital into its products
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we speak to Bill Ruh, the head of GE Digital about how the business has changed to focus on customer outcomes following a change in senior leadership. The company is exploring new industries to take its Predix platform such the hospitality sector. We also look at the problems of implementing SAP S/4 Hana.
Posted: 08 Feb 2021 | Published: 31 Aug 2018

TechTarget ComputerWeekly.com

A Look at the Future of Data Center Monitoring
sponsored by Colt Data Centre Services
EGUIDE: This expert eGuide breaks down some of the benefits that using a KPI to measure your data center workload balance, what business relevant aspects to measure, as well as generating periodic reports that show KPI data overtime. Also, review examples of how KPIs can measure your data centers IT infrastructure, transactions and efficiency.
Posted: 08 Feb 2021 | Published: 09 Sep 2016

Colt Data Centre Services

Improve security and compliance
sponsored by Red Hat
EBOOK: Secure your Linux environment with Red Hat's effective approach to vulnerability identification, remediation, and compliance management. Learn best practices and explore integrated tools like Insights and Satellite. Read the full e-book to boost your security and compliance.
Posted: 05 Nov 2024 | Published: 06 Nov 2024

Red Hat

Getting a handle on AIOps and self-healing systems
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Reducing effort, reacting faster, preventing problems and improving understanding of the IT environment are the key benefits of AIOps, identified by analyst Forrester. To achieve these goals AIOPs platforms are increasingly making use of predictive analytics and automation to offer IT operations a level of self-healing.
Posted: 08 Feb 2021 | Published: 10 Dec 2019

TechTarget ComputerWeekly.com

Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018

TechTarget ComputerWeekly.com

DevSecOps delivers better business
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.
Posted: 08 Feb 2021 | Published: 29 Jan 2019

TechTarget ComputerWeekly.com

The 17th State of Agile Report
sponsored by Digital.ai
RESEARCH CONTENT: Small organizations continue to report that Agile is a powerful productivity framework showing obvious benefits; larger companies, however, are seeing substantive barriers to organization-wide adoption. Explore research on the State of Agile in 2023 to better understand how to leverage and empower Agile as a medium-sized or large business.
Posted: 19 Jan 2024 | Published: 20 Jan 2024

TOPICS:  .NET
Digital.ai

A New Approach to Enterprise Application Testing in Retail
sponsored by Keysight
WHITE PAPER: In this 16-page white paper, find out how off-the-shelf automated testing can help retailers unlock more robust systems, enhance productivity – and more.
Posted: 04 Oct 2024 | Published: 04 Oct 2024

All resources sponsored by Keysight

CrowdStrike outage explained: What happened and what can we learn?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A botched content update released by CrowdStrike in July 2024 led to a massive IT outage affecting about 8.5 million Windows systems worldwide. In this e-guide, learn more about how the outage occurred, its impact on organisations around the globe, and what you can do to mitigate the risks of similar incidents in future.
Posted: 04 Aug 2024 | Published: 05 Aug 2024

TechTarget ComputerWeekly.com

6 Core Principles for Establishing DevOps Security at Scale
sponsored by CyberArk
EBOOK: Disjointed DevOps security systems and practices can slow down CI/CD pipelines, frustrate developers, and lead to risky workarounds. You and other security leaders know that DevOps needs a new approach to security. This eBook details 6 guiding principles for enabling DevOps security at scale. Download the DevOps security eBook here.
Posted: 09 Feb 2023 | Published: 10 Feb 2023

TOPICS:  .NET
CyberArk

Get a Fresh Start with SAP S/4HANA Greenfield Transformation
sponsored by Basis Technologies
EBOOK: Considering a Greenfield transformation to SAP S/4HANA? This guide covers the core motivations, challenges, and best practices to ensure your critical project runs smoothly. Read the full e-book to learn more.
Posted: 10 Jul 2024 | Published: 11 Jul 2024

Basis Technologies

Application security: best practices and risks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 08 Feb 2021 | Published: 21 Oct 2019

TechTarget ComputerWeekly.com

Computer Weekly – 8 August 2017: Formula 1 goes digital
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Formula 1 chief Ross Brawn is turning to digitization to enhance the fan experience of Grand Prix racing. We also learn how virtual reality is being used to deliver healthcare services. And our experts examine the ethical concerns around artificial intelligence. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Aug 2017

TechTarget ComputerWeekly.com

Security Threats for Apps “In the Wild”
sponsored by Digital.ai
EBOOK: Download this study to learn how security professionals can safeguard their apps and users from malicious activities by illuminating and quantifying the threats to applications in the wild.
Posted: 29 Aug 2023 | Published: 29 Aug 2023

TOPICS:  .NET
Digital.ai

A Computer Weekly e-Guide to CRM
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We take a look at the fundamental do's and don'ts of Customer Relationship Management. Including examples of how companies are utilizing it to their advantage and how to avoid making mistakes in the world of building bridges with your customers.
Posted: 08 Feb 2021 | Published: 10 Dec 2020

TechTarget ComputerWeekly.com

Disaster recovery and business continuity: Essential guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.
Posted: 08 Feb 2021 | Published: 31 Oct 2016

TechTarget ComputerWeekly.com

The state of application modernization 2024
sponsored by Red Hat
EBOOK: This in-depth e-book explores how organizations are approaching application modernization. Key findings include positive attitudes, continued progress, and the growing use of AI to support modernization efforts. Read on to learn more about the strategies and challenges companies are facing on their modernization journeys.
Posted: 19 Sep 2024 | Published: 23 Sep 2024

Red Hat

Computer Weekly – 8 November 2022: How the US-China chip war will affect IT leaders
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.
Posted: 04 Nov 2022 | Published: 08 Nov 2022

TechTarget ComputerWeekly.com

MicroScope – January 2023: Channel themes for 2023
sponsored by MicroScope
EZINE: In this month's ezine, we provide a guide to the main areas of focus for the channel in the year ahead and look at what makes a good partner incentive programme.
Posted: 09 Jan 2023 | Published: 09 Jan 2023

MicroScope

VoIP has never lost its voice: How to get the most out of your business communications
sponsored by TechTarget ComputerWeekly.com
EBOOK: In today's comms world, and especially with regard to hybrid working, a communications identity has now become a unified calling and collaboration endpoint, one which is part of a suite of business services spanning voice, security and network-as-a-service solutions to power the mobile workforce.
Posted: 06 Jul 2022 | Published: 06 Jul 2022

TechTarget ComputerWeekly.com

The 2024 Block Data Storage Buyer's Guide
sponsored by StorPool
BUYER'S GUIDE: How can you ensure you select the most appropriate block storage software or system for your business’ unique needs? Look no further than this Block Storage Buyer's Guide. Download a copy to solve 8 common block storage challenges, to evaluate block storage options, and more.
Posted: 10 Jul 2024 | Published: 10 Jul 2024

TOPICS:  .NET
StorPool