Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016
|
|
|
Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017
|
|
|
How a Rideshare Giant Balances SMS Toll Fraud Security with Great User Experience
sponsored by Arkose Labs
CASE STUDY:
This case study explores how a major rideshare company combated SMS toll fraud while preserving a smooth customer experience. By partnering with Arkose Labs, the company saved $2.5M annually, blocked 99.5% of low-risk traffic without friction, and gained deeper visibility into user traffic. Read the full case study to learn more.
Posted: 16 Jul 2024 | Published: 16 Jul 2024
|
|
|
Boost Hybrid Cloud Security And Consistency
sponsored by Red Hat
PRODUCT OVERVIEW:
Organizations leveraging hybrid clouds for flexibility and innovation face security and consistency issues. Discover how Red Hat on Google Cloud boosts hybrid cloud security and consistency in this white paper.
Posted: 03 May 2024 | Published: 04 May 2024
|
|
|
Strengthen Data Pipeline Orchestration.
sponsored by BMC Software
WHITE PAPER:
Orchestrate data pipelines with Control-M's file transfer capabilities. Securely manage external file transfers, ensure compliance, and provide a seamless user experience. Learn how Control-M can streamline your data workflows in this white paper.
Posted: 04 Dec 2024 | Published: 09 Dec 2024
|
|
|
Preventing Domain Impersonation: How to Stop Look-Alike Domains and Spoofing
sponsored by Fortra
WHITE PAPER:
Domain impersonation is a growing threat for organizations, with cybercriminals using look-alike domains and email spoofing to steal data and damage reputations. Learn how to effectively monitor, detect, and mitigate domain impersonation risks in this White Paper.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
7 Compelling Reasons Why Analysts Recommend SASE
sponsored by Windstream Communications
EBOOK:
In order to keep up with the evolving security landscape, analysts recommend SASE for its convergence of networking and security, gradual migration path, and ability to future-proof businesses. Access the e-book to discover more.
Posted: 04 Oct 2024 | Published: 04 Oct 2024
|
|
|
Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016
|
|
|
7 Compelling Reasons Why Analysts Recommend SASE
sponsored by Cato Networks
WHITE PAPER:
Why do analysts recommend leveraging SASE? In this white paper, explore 7 reasons why and unlock insights from Gartner, Forrester and more.
Posted: 12 Dec 2023 | Published: 12 Dec 2023
|
|
|
How to Defend Against Look-Alike Domain Threats
sponsored by Fortra
WHITE PAPER:
This playbook breaks down the domain lifecycle, how look-alike domains are used to enable cyberthreats, and best practices for collecting, curating, and mitigating domain threats. Read the full guide to learn how to defend your organization against look-alike domain attacks.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
How Revenue Cycle Management Is Optimized by Robotic Process Automation
sponsored by XtelligentMedia Healthcare
EGUIDE:
Robotic process automation (RPA) saves practices money and time by automating manual, repetitive tasks within revenue cycle management.
Posted: 13 May 2024 | Published: 13 May 2024
|
|
|
How Revenue Cycle Management Is Optimized by Robotic Process Automation
sponsored by XtelligentMedia Healthcare
EGUIDE:
Robotic process automation (RPA) saves practices money and time by automating manual, repetitive tasks within revenue cycle management.
Posted: 14 Aug 2024 | Published: 14 Aug 2024
|
|
|
Passwordless Authentication for Consumers: Securing Fast Business Online
sponsored by One Identity
ANALYST REPORT:
This Leadership Compass provides an in-depth overview of the passwordless authentication market, analyzing the leading vendors and their solutions. It covers key capabilities, delivery models, and market trends to help organizations select the best passwordless authentication solution for their needs. Read the full report to learn more.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
How Passkeys Work
sponsored by Okta
WHITE PAPER:
Passkeys are a new FIDO-based authentication standard that enables faster, easier, and more secure sign-up and sign-in experiences. This white paper explains how passkeys work, the technical flows involved, and implementation considerations for developers. Read the full white paper to learn more.
Posted: 10 Jul 2024 | Published: 11 Jul 2024
|
|
|
Passwordless Authentication for Enterprises
sponsored by One Identity
ANALYST REPORT:
This Leadership Compass from KuppingerCole evaluates passwordless authentication solutions for enterprises, covering market analysis, vendor assessments, and key features. Download the report to learn how you can secure remote access and build user trust with passwordless authentication.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
Digital secure remote payment: How Apple Pay can change the future of remote payments
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
Posted: 08 Feb 2021 | Published: 27 Mar 2018
|
|
|
Simplify Complexity with BMC Helix Enterprise Service Management
sponsored by BMC Software
WHITE PAPER:
Enterprise service management (ESM) extends IT service management best practices to non-IT lines of business. BMC Helix ESM simplifies complexity with intelligent automation, AI/ML, and unified DevOps tooling. Learn how to fuel employee productivity and deliver elevated experiences across your organization. Read the white paper.
Posted: 04 Dec 2024 | Published: 04 Dec 2024
|
|
|
Computer Weekly – 4 September 2018: Power Play – how GE builds digital into its products
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we speak to Bill Ruh, the head of GE Digital about how the business has changed to focus on customer outcomes following a change in senior leadership. The company is exploring new industries to take its Predix platform such the hospitality sector. We also look at the problems of implementing SAP S/4 Hana.
Posted: 08 Feb 2021 | Published: 31 Aug 2018
|
|
|
Passkeys Primer
sponsored by Okta
WHITE PAPER:
Synced passkeys are a significant step towards a passwordless world, offering increased security and convenience over traditional passwords. Learn how passkeys work and explore different implementation approaches in this comprehensive white paper.
Posted: 10 Jul 2024 | Published: 11 Jul 2024
|
|
|
Outlining 11 typical types of medical mistakes and patient harms
sponsored by XtelligentMedia Healthcare
EGUIDE:
Understanding the most common types of medical errors might help tailor patient safety best practices.
Posted: 24 Oct 2024 | Published: 25 Oct 2024
|
|
|
The ultimate SASE buying guide key considerations for today’s buying teams
sponsored by Windstream Enterprise
EBOOK:
This detailed SASE buying guide outlines key considerations for today's buying teams, including SASE components, market trends, benefits and the purchasing process. Learn how SASE can secure your network and workforce. Read the full guide.
Posted: 27 Jun 2024 | Published: 01 Jul 2024
|
|
|
Digital Transformation & Care Enablement
sponsored by Fabric Health
WHITE PAPER:
Solving healthcare's biggest challenges—including patient access and provider shortages—requires a comprehensive, virtual-first approach to care. Download Fabric's end-to-end Care Enablement Guide for a unique perspective on a unified virtual-first approach to healthcare transformation.
Posted: 26 Aug 2024 | Published: 15 Aug 2024
|
|
|
Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022
|
|
|
The Patient Access Maturity Matrix: Key Drivers for Efficient Operations
sponsored by Relatient
EBOOK:
Healthcare organizations must ensure patient access despite barriers such as manual processes and staffing issues. Enhance operational maturity and patient experience with smart scheduling and communication tools. Explore the e-book for strategies to improve access and outcomes.
Posted: 06 Jun 2024 | Published: 06 Jun 2024
|
|
|
Cloudflare Security Brief
sponsored by Cloudflare
EBOOK:
Take a deep look at the most important trends shaping the cyber threat landscape today: AI, vulnerability exploitation, DDoS attacks, phishing, and Zero Trust. Based on the extensive data from Cloudflare’s cloud network, this security brief highlights key trends. Access the brief to learn more.
Posted: 19 Sep 2024 | Published: 19 Sep 2024
|
|