Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019
|
|
|
IoT Testing - The Big Challenge: Why, What and How
sponsored by Qualitest Group
WHITE PAPER:
Explore the key challenges of IoT testing, including interoperability, security, and performance. Discover best practices for driving efficiency through risk-based analysis, test-driven development, and service virtualization. Read the full white paper to learn how to ensure successful IoT deployments.
Posted: 25 Feb 2025 | Published: 25 Feb 2025
|
|
|
CDO and CIO Best Practices for Driving AI Readiness
sponsored by Informatica
WHITE PAPER:
Achieving AI readiness involves strong data management, governance policies, and strategic investments. Data leaders face challenges in quality, integration, and compliance with GenAI. This white paper offers expert insights on AI fluency, cultural shifts, and board expectations, providing practical strategies for responsible AI implementation.
Posted: 20 Mar 2025 | Published: 20 Mar 2025
|
|
|
Unlocking Enterprise AI: Opportunities And Strategies
sponsored by DataBricks
RESEARCH CONTENT:
Companies have been quick to adopt GenAI, but they’re still struggling to productionize and scale. That’s one of the findings in this Economist Impact study from a global survey of 1,100 technical executives, data engineers, data scientists and architects. Access the full report now to unlock more insights.
Posted: 27 Nov 2024 | Published: 21 Feb 2025
|
|
|
Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Aug 2020
|
|
|
Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 06 May 2021 | Published: 06 May 2021
|
|
|
Infographic: Zoom vs Teams vs Cisco
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
While all video conferencing tools perform broadly similar tasks, there are certain differences between products and providers.Here we examine the Cisco, Microsoft, and Zoom platforms, highlight the unique features of each product, and explain how the products differ from one another.
Posted: 17 Jun 2021 | Published: 17 Jun 2021
|
|
|
Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019
|
|
|
10 Best Practices For Msps Supporting High-Performing Hybrid Workplaces
sponsored by NCP Engineering Inc
WHITE PAPER:
This white paper outlines 10 best practices for MSPs supporting hybrid workplaces, including multi-tenancy solutions, "Always On" connectivity, MFA strategies, and centralized management. Learn how the right VPN can enhance security, improve efficiency, and provide seamless access. Discover strategic benefits for your MSP business.
Posted: 20 Mar 2025 | Published: 20 Mar 2025
|
|
|
Top 10 ASEAN IT stories of 2020
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The booming digital economies of Southeast Asia showed much resilience in 2020, from tapping open source, data analytics and DevOps, to fending off cyber criminals who came knocking on their doors, all in the midst of an unprecedented pandemic. Here are Computer Weekly's top 10 ASEAN IT stories of 2020:
Posted: 08 Feb 2021 | Published: 11 Jan 2021
|
|
|
Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Dec 2020
|
|
|
Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018
|
|
|
Bastille Threat Research: Insider Threat
sponsored by Bastille
WHITE PAPER:
Insider threats can exploit wireless devices to infiltrate corporate networks. This white paper explores real-world case studies and best practices to secure your wireless environment and mitigate insider risks. Read the full white paper to learn how to protect your organization.
Posted: 19 Feb 2025 | Published: 20 Feb 2025
|
|
|
Fortifying Business in the Digital Age
sponsored by FCN
EBOOK:
Discover how FCN and Dell Technologies collaborate to fortify businesses against evolving cyber threats. This comprehensive guide explores innovative cybersecurity solutions, from network security to cloud services, empowering secure digital transformation. Read the full e-book to strengthen your organization's security posture.
Posted: 12 Nov 2024 | Published: 13 Nov 2024
|
|
|
CW Middle East - January-March 2021: $60m venture capital fund targets 120 startups
sponsored by TechTarget ComputerWeekly.com
EZINE:
Countries in the Middle East see technology as an industry of the future and are investing heavily in the sector as part of their economic diversification plans. Read in this issue how the latest development will see a $60m venture capital fund, based in Bahrain, invest in 120 early-stage startups across the Middle East region.
Posted: 08 Feb 2021 | Published: 14 Jan 2021
|
|
|
Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022
|
|
|
Our Security, Delivered Your Way
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER:
Download this portfolio to learn more about WatchGuard's managed security service solutions, which give MSPs peace of mind through better endpoint management and comprehensive protection across your entire service ecosystem.
Posted: 23 Jul 2021 | Published: 23 Jul 2021
|
|
|
Asynchronous Telemedicine Guide + COVID-19: The Largest Case Study on Async
sponsored by Fabric Health
EBOOK:
Discover the power of asynchronous care, the most efficient care delivery method. Based on over 15 years of experience in async, this comprehensive 29-page resource includes everything you need to know to implement an effective virtual-first strategy that enhances provider capacity, expands patient access, and offers a consumer-grade experience.
Posted: 29 Aug 2024 | Published: 29 Aug 2024
|
|
|
CW APAC – October 2020: Trend Watch: Storage
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, Computer Weekly takes a peek at future storage technologies, such as helium and DNA, and offers some valuable tips on how to keep cloud storage costs under control. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Oct 2020
|
|
|
Computer Weekly – 19 July 2016
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.
Posted: 08 Feb 2021 | Published: 19 Jul 2016
|
|
|
2024-25 Dcig Top 5 Enterprise Multi-Site File Collaboration Ctera Solution Profile
sponsored by CTERA
ANALYST REPORT:
This analyst report examines top enterprise file collaboration solutions, highlighting key features like multi-cloud support, security, and technical support. Learn how CTERA's solutions can improve productivity, reduce costs, and mitigate risks for your distributed workforce. Read the full report to discover why CTERA made DCIG's Top 5.
Posted: 28 Oct 2024 | Published: 28 Oct 2024
|
|
|
Idc Marketscape: Worldwide Commercial Content Delivery Network Services 2022 Vendor Assessment
sponsored by Fastly
ANALYST REPORT:
The commercial content delivery network (CDN) market is a mature market that carries a substantial portion of the world's internet traffic. Read this IDC report to fully understand the CDN market and the ingredients that drive growth and differentiation in this marketplace amongst CDN services and providers.
Posted: 20 May 2022 | Published: 20 May 2022
|
|
|
Proactive Security: Software vulnerability management and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
Posted: 08 Feb 2021 | Published: 17 May 2019
|
|
|
Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019
|
|
|
Top IT Predictions in APAC in 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.
Posted: 19 Dec 2022 | Published: 20 Dec 2022
|
|