Software Publishers White Papers

(View All Report Types)
Leading the Way in Managed Services
sponsored by Zenith Infotech
WHITE PAPER: Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
Posted: 20 Jun 2008 | Published: 01 Jul 2008

Zenith Infotech

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Publishing Test
sponsored by Lead Approval II Test Org
ANALYST BRIEF: Publishing Test
Posted: 08 Nov 2018 | Published: 08 Nov 2018

TOPICS:  .NET
All resources sponsored by Lead Approval II Test Org

CW@50 - What was making the news in May
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
Posted: 08 Feb 2021 | Published: 09 May 2016

TechTarget ComputerWeekly.com

CW@50: What was making the news in June
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
Posted: 08 Feb 2021 | Published: 03 Jun 2016

TechTarget ComputerWeekly.com

Computer Weekly@50: What was happening in July
sponsored by TechTarget ComputerWeekly.com
EBOOK: The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant news published in the month of July over the past five decades.
Posted: 08 Feb 2021 | Published: 19 Jul 2016

TechTarget ComputerWeekly.com

CW@50: What was happening in IT in August over the years
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant articles published in the month of August over the past five decades.
Posted: 08 Feb 2021 | Published: 03 Aug 2016

TechTarget ComputerWeekly.com

Software Firewalls
sponsored by Palo Alto Networks
EBOOK: In this free Software Firewalls for dummies e-book, discover everything you need to know about today’s demands for software firewalls and zero trust, and find out the 10 essential questions you need to ask your software firewall vendor.
Posted: 08 Apr 2024 | Published: 09 Apr 2024

TOPICS:  .NET
Palo Alto Networks

How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

Fintech: Meet ten financial services disruptors - Part One
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we meet ten up-and-coming financial services disruptors and discuss what the driving force behind their success is. These were interviews published on the Computer Weekly blog: Fintech Makes the World go Around.
Posted: 08 Feb 2021 | Published: 01 May 2019

TechTarget ComputerWeekly.com

Securing your software supply chain
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
Posted: 15 May 2023 | Published: 15 May 2023

TechTarget ComputerWeekly.com

Catalent Case Study
sponsored by HighByte
CASE STUDY: Catalent, a leading CDMO, used HighByte Intelligence Hub to integrate bioreactor and lab data across 50+ sites, enabling data contextualization and publishing for analytics, remote monitoring, and customer insights. This saved hundreds of hours and created a scalable data architecture. Discover more in the full case study.
Posted: 19 Jul 2024 | Published: 04 Sep 2024

HighByte

Software-defined Architecture Can Aid Your Business and The Big Value in Software-defined Storage
sponsored by IBM
EGUIDE: A software-defined architecture can provide your enterprise with an empowered storage environment, protection against data loss, simple system management and low up-front cost. Access this expert Eguide that gives an in-depth look at software-defined architecture. And read on to discover the big value in software-defined storage.
Posted: 08 Feb 2021 | Published: 21 Jul 2016

IBM

Enterprise software licence management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we shine the light on the world of enterprise software licenses. We discover how the pendulum of power is swinging towards to the consumer and why many CIOs are prepared to walk away and re-implement a system using another provider's software rather than put up with aggressive licensing stances.
Posted: 08 Feb 2021 | Published: 16 May 2018

TechTarget ComputerWeekly.com

Proactive Security: Software vulnerability management and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
Posted: 08 Feb 2021 | Published: 17 May 2019

TechTarget ComputerWeekly.com

Fintech: Meet ten financial services disruptors - Part One
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we meet ten up-and-coming financial services disruptors. This series of interviews were originally published on the Computer Weekly blog: Fintech Makes the World go Around.
Posted: 08 Feb 2021 | Published: 07 May 2019

TechTarget ComputerWeekly.com

Fintech : Meet ten financial services disruptors - Part Two
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Whether it's the insurance sector, lending or full service banking there are a number of companies, often still in their early stages, disrupting the financial services sector. But who are these companies, where do they come from, and what drives them? In this e-guide, the second in a series, we meet another ten of them.
Posted: 08 Feb 2021 | Published: 15 Nov 2019

TechTarget ComputerWeekly.com

Identity Security for Software Development
sponsored by CyberArk
EBOOK: Whether you’re just starting your coding journey or a seasoned veteran, this e-book serves as a comprehensive resource for those who want to develop a deep understanding of secure coding principles and best practices. Read the O’Reilly e-book to understand today’s identity security and secure development essentials.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

CyberArk

Infographic: How organizations are using generative AI in Asia-Pacific
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Enterprise Strategy Group (ESG), an IT analyst firm owned by Computer Weekly publisher TechTarget, has published research about generative AI (GenAI) enterprise use cases that shows the concept ranking higher than sustainability and cloud migration as a strategic priority for enterprise IT globally.
Posted: 04 Oct 2023 | Published: 05 Oct 2023

TechTarget ComputerWeekly.com

A guide to continuous software delivery
sponsored by TechTarget ComputerWeekly.com
EBOOK: Software empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.
Posted: 30 Aug 2022 | Published: 30 Aug 2022

TechTarget ComputerWeekly.com

Escode Special Edition Software Escrow
sponsored by NCC Group
EBOOK: Software escrow is a critical tool to mitigate risks from vendor failure or disruption. This e-book explains how escrow works, the benefits, and how to choose the right escrow agreement and verification level for your needs. Read the full e-book to learn how to protect your software investments.
Posted: 12 Dec 2024 | Published: 12 Dec 2024

NCC Group

Your Guide to Workforce Management Software Selection
sponsored by PDP-Software
EGUIDE: Workforce management software is what enables your business to keep pace with the rapidly changing trends in both labor and the market. Read on to learn about the current state of workforce management software and what you can expect from the technology's near future.
Posted: 08 Feb 2021 | Published: 10 Nov 2016

PDP-Software

A Holistic Approach to Software Vulnerability Protection
sponsored by Spinnaker Support
PRODUCT OVERVIEW: Spinnaker Shield provides a robust defense for Oracle, SAP, and JD Edwards applications. Offering expert guidance, customized security assessments, and proactive vulnerability management, it bolsters your security stance. Discover how Spinnaker secures critical systems in our full overview.
Posted: 16 May 2024 | Published: 16 May 2024

TOPICS:  .NET
Spinnaker Support

Collaboration software in the era of Gen-Z
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, learn how Microsoft is dominating the Software-as-a-Service space thanks to its strength in collaboration software and how the new generation of collaboration software could be stoking communication overload. Also, check out our chart comparing Slack, Microsoft Teams and Spark.
Posted: 08 Feb 2021 | Published: 31 Aug 2018

TechTarget ComputerWeekly.com

Buyer's guide to backup and recovery software
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.
Posted: 14 Jul 2022 | Published: 14 Jul 2022

TechTarget ComputerWeekly.com

Data discovery: how to pick the right software
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this guide, we break down data discovery software by defining the categories, explaining the features and revealing the benefits. We also highlight the major players and products in an effort to inform buying decisions.
Posted: 08 Feb 2021 | Published: 20 Nov 2019

TechTarget ComputerWeekly.com

Software-defined storage: What it is and variants available
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Software-defined storage is available in numerous variants. It is usually cheaper, flexible to deploy and brings storage efficiencies, but there are pitfalls in complexity, management and performance. In this article, we look at the definition of software-defined storage and the key variants we find in the marketplace.
Posted: 19 Jun 2023 | Published: 19 Jun 2023

TechTarget ComputerWeekly.com