Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016
|
|
|
Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017
|
|
|
How a Rideshare Giant Balances SMS Toll Fraud Security with Great User Experience
sponsored by Arkose Labs
CASE STUDY:
This case study explores how a major rideshare company combated SMS toll fraud while preserving a smooth customer experience. By partnering with Arkose Labs, the company saved $2.5M annually, blocked 99.5% of low-risk traffic without friction, and gained deeper visibility into user traffic. Read the full case study to learn more.
Posted: 16 Jul 2024 | Published: 16 Jul 2024
|
|
|
Boost Hybrid Cloud Security And Consistency
sponsored by Red Hat
PRODUCT OVERVIEW:
Organizations leveraging hybrid clouds for flexibility and innovation face security and consistency issues. Discover how Red Hat on Google Cloud boosts hybrid cloud security and consistency in this white paper.
Posted: 03 May 2024 | Published: 04 May 2024
|
|
|
Unified Management of VMs and Containers: Boosting Operational Efficiency and Scalability
sponsored by Red Hat
ESG SHOWCASE:
To ensure improved agility, scalability, and efficiency across their organizations, business leaders have started to modernize their application portfolios. However, many run into issues during the process. So, how can you make the journey more efficient for all involved? Access this report to learn more.
Posted: 04 Sep 2024 | Published: 05 Sep 2024
|
|
|
Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016
|
|
|
7 Compelling Reasons Why Analysts Recommend SASE
sponsored by Windstream Communications
EBOOK:
In order to keep up with the evolving security landscape, analysts recommend SASE for its convergence of networking and security, gradual migration path, and ability to future-proof businesses. Access the e-book to discover more.
Posted: 04 Oct 2024 | Published: 04 Oct 2024
|
|
|
Why Passkeys Improve User Security & How To Implement Them
sponsored by FusionAuth
WHITE PAPER:
Passkeys offer a secure alternative to traditional passwords, reducing vulnerability to phishing and social engineering attacks. This white paper explores how passkeys work, their benefits over passwords, and best practices for implementation. Learn how passkeys can enhance security and user experience. Stay ahead in authentication technology.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
7 Compelling Reasons Why Analysts Recommend SASE
sponsored by Cato Networks
WHITE PAPER:
Why do analysts recommend leveraging SASE? In this white paper, explore 7 reasons why and unlock insights from Gartner, Forrester and more.
Posted: 12 Dec 2023 | Published: 12 Dec 2023
|
|
|
How Revenue Cycle Management Is Optimized by Robotic Process Automation
sponsored by XtelligentMedia Healthcare
EGUIDE:
Robotic process automation (RPA) saves practices money and time by automating manual, repetitive tasks within revenue cycle management.
Posted: 13 May 2024 | Published: 13 May 2024
|
|
|
How Revenue Cycle Management Is Optimized by Robotic Process Automation
sponsored by XtelligentMedia Healthcare
EGUIDE:
Robotic process automation (RPA) saves practices money and time by automating manual, repetitive tasks within revenue cycle management.
Posted: 14 Aug 2024 | Published: 14 Aug 2024
|
|
|
Proactive Security Stories
sponsored by NetSPI
EBOOK:
This e-book shares stories from NetSPI's security experts, highlighting critical vulnerabilities and unique security approaches. From exposing healthcare application source code to bypassing voice biometrics, these tales show the impact of expert penetration testing across industries. Read to gain insights into cutting-edge security practices.
Posted: 01 Mar 2025 | Published: 01 Mar 2025
|
|
|
A Primer for External Attack Surface Management (EASM)
sponsored by Outpost24
WHITE PAPER:
This white paper explores External Attack Surface Management (EASM), a crucial cybersecurity component. It covers EASM's importance, key features, and how it differs from traditional vulnerability scanners. Learn about asset discovery, automated security analysis, and risk-based prioritization to enhance your cyber risk management strategy.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
Digital secure remote payment: How Apple Pay can change the future of remote payments
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
Posted: 08 Feb 2021 | Published: 27 Mar 2018
|
|
|
Top 3 Risks For DIY Auth In Regulated Industries
sponsored by FusionAuth
WHITE PAPER:
This white paper examines the challenges of managing in-house authentication, particularly for regulated industries. It covers compliance, security, and the advantages of outsourcing. Discover how to select the right vendor and ensure a smooth transition. Read the full paper for insights on securing your organization's digital future.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
Computer Weekly – 4 September 2018: Power Play – how GE builds digital into its products
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we speak to Bill Ruh, the head of GE Digital about how the business has changed to focus on customer outcomes following a change in senior leadership. The company is exploring new industries to take its Predix platform such the hospitality sector. We also look at the problems of implementing SAP S/4 Hana.
Posted: 08 Feb 2021 | Published: 31 Aug 2018
|
|
|
Exabeam Support for the NYDFS Cybersecurity Regulation (23 NYCRR 500)
sponsored by Exabeam
PRODUCT OVERVIEW:
The NYDFS Cybersecurity Regulation requires financial institutions to protect information systems and non-public data. This document explains how Exabeam's platform supports compliance through monitoring, threat detection, and reporting. Read the full Product Overview to see how Exabeam enhances your cybersecurity program.
Posted: 26 Mar 2025 | Published: 26 Mar 2025
|
|
|
Outlining 11 typical types of medical mistakes and patient harms
sponsored by XtelligentMedia Healthcare
EGUIDE:
Understanding the most common types of medical errors might help tailor patient safety best practices.
Posted: 24 Oct 2024 | Published: 25 Oct 2024
|
|
|
The ultimate SASE buying guide key considerations for today’s buying teams
sponsored by Windstream Enterprise
EBOOK:
This detailed SASE buying guide outlines key considerations for today's buying teams, including SASE components, market trends, benefits and the purchasing process. Learn how SASE can secure your network and workforce. Read the full guide.
Posted: 27 Jun 2024 | Published: 01 Jul 2024
|
|
|
Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022
|
|
|
Digital Transformation & Care Enablement
sponsored by Fabric Health
WHITE PAPER:
Solving healthcare's biggest challenges—including patient access and provider shortages—requires a comprehensive, virtual-first approach to care. Download Fabric's end-to-end Care Enablement Guide for a unique perspective on a unified virtual-first approach to healthcare transformation.
Posted: 26 Aug 2024 | Published: 15 Aug 2024
|
|
|
How to End EMR Testing Headaches with Non-Invasive Test Automation
sponsored by Keysight
EBOOK:
Explore how non-invasive test automation can solve EMR testing challenges and improve patient data security. Learn how Eggplant's AI-powered solution enables secure, end-to-end testing without accessing source code. Read the eBook to discover how to end EMR testing headaches.
Posted: 10 Feb 2025 | Published: 11 Feb 2025
|
All resources sponsored by Keysight
|
|
Cloudflare Security Brief
sponsored by Cloudflare
EBOOK:
Take a deep look at the most important trends shaping the cyber threat landscape today: AI, vulnerability exploitation, DDoS attacks, phishing, and Zero Trust. Based on the extensive data from Cloudflare’s cloud network, this security brief highlights key trends. Access the brief to learn more.
Posted: 19 Sep 2024 | Published: 19 Sep 2024
|
|
|
Network Threat Trends Research Report
sponsored by Palo Alto Networks
RESEARCH CONTENT:
Understanding threat actors’ preferred methods and malware families can give you insights into how to set up your defenses and best protect your organization. In this report, explore current trends in malware and the evolving threat landscape with exhaustive research from the Palo Alto Networks Unit 42 research team.
Posted: 27 Dec 2024 | Published: 28 Dec 2024
|
|
|
Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Dec 2020
|
|