Technical and Office Protocols White Papers

(View All Report Types)
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Router Essentials
sponsored by Global Knowledge
WHITE PAPER: Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Benefits of Partnering with a Nurse-First Triage Organization
sponsored by Conduit
WHITE PAPER: A nurse triage line offers timely advice and lowers healthcare costs. Example: Mark sprains his ankle, calls the nurse line, and is advised home care, skipping the ER. Triage lines may reduce ER visits by 90%, increasing satisfaction. Gain 5 benefits of partnering with a nurse-first triage organization in this indispensable paper.
Posted: 10 Feb 2024 | Published: 10 Feb 2024

TOPICS:  .NET
Conduit

Unlocking Enterprise AI: Opportunities And Strategies
sponsored by DataBricks
RESEARCH CONTENT: Companies have been quick to adopt GenAI, but they’re still struggling to productionize and scale. That’s one of the findings in this Economist Impact study from a global survey of 1,100 technical executives, data engineers, data scientists and architects. Access the full report now to unlock more insights.
Posted: 27 Nov 2024 | Published: 27 Nov 2024

TOPICS:  .NET
DataBricks

Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Aug 2020

TechTarget ComputerWeekly.com

Infographic: Zoom vs Teams vs Cisco
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While all video conferencing tools perform broadly similar tasks, there are certain differences between products and providers.Here we examine the Cisco, Microsoft, and Zoom platforms, highlight the unique features of each product, and explain how the products differ from one another.
Posted: 17 Jun 2021 | Published: 17 Jun 2021

TechTarget ComputerWeekly.com

Tackling the Challenges of Flexible Work Models: How to Enable Business Growth with DEX Solutions
sponsored by HP
WEBCAST: Explore how to enable business growth with digital employee experience (DEX) solutions that address the challenges of flexible work models. Download the video to learn more.
Posted: 11 Dec 2024 | Premiered: Dec 7, 2024

All resources sponsored by HP

Connecting Business Growth to the Digital Employee Experience
sponsored by HP
ANALYST REPORT: Flexible work models are evolving, but IT leaders face challenges like security and employee productivity. This analyst brief explores how organizations can invest in technologies and support to improve the digital employee experience and drive business growth. Read the full report to learn more.
Posted: 06 Dec 2024 | Published: 07 Dec 2024

All resources sponsored by HP

Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019

TechTarget ComputerWeekly.com

Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

Top 10 ASEAN IT stories of 2020
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The booming digital economies of Southeast Asia showed much resilience in 2020, from tapping open source, data analytics and DevOps, to fending off cyber criminals who came knocking on their doors, all in the midst of an unprecedented pandemic. Here are Computer Weekly's top 10 ASEAN IT stories of 2020:
Posted: 08 Feb 2021 | Published: 11 Jan 2021

TechTarget ComputerWeekly.com

Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Dec 2020

TechTarget ComputerWeekly.com

Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018

TOPICS:  Telephones | VoIP
TechTarget ComputerWeekly.com

Fortifying Business in the Digital Age
sponsored by FCN
EBOOK: Discover how FCN and Dell Technologies collaborate to fortify businesses against evolving cyber threats. This comprehensive guide explores innovative cybersecurity solutions, from network security to cloud services, empowering secure digital transformation. Read the full e-book to strengthen your organization's security posture.
Posted: 12 Nov 2024 | Published: 13 Nov 2024

FCN

Recommended Inventory for Data Center Scope 3 GHG Emissions Reporting
sponsored by Schneider Electric
WHITE PAPER: In this paper, find out everything you need to know about Scope 3 emissions, and explore an inventory of 9 emissions source categories and their data center-specific subcategories for accounting and reporting.
Posted: 16 May 2024 | Published: 16 May 2024

TOPICS:  .NET
Schneider Electric

How to Implement an OSS Governance Program
sponsored by Anaconda
WHITE PAPER: Just like all software, open-source carries risk, and many data science teams still lack security protocols. For some, there simply aren’t security protocols or governance tools for open-source software (OSS). Read on to learn about 6 steps you can take to build an OSS governance program that works for data science and set your team up for success.
Posted: 10 Jul 2023 | Published: 11 Jul 2023

TOPICS:  .NET
Anaconda

CW Middle East - January-March 2021: $60m venture capital fund targets 120 startups
sponsored by TechTarget ComputerWeekly.com
EZINE: Countries in the Middle East see technology as an industry of the future and are investing heavily in the sector as part of their economic diversification plans. Read in this issue how the latest development will see a $60m venture capital fund, based in Bahrain, invest in 120 early-stage startups across the Middle East region.
Posted: 08 Feb 2021 | Published: 14 Jan 2021

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

Recommended Inventory for Data Center Scope 3 GHG Emissions Reporting
sponsored by Schneider Electric
WHITE PAPER: In this paper, explore the FAQs of Scope 3 emissions and discover the inventory of 9 emissions source categories and their data center-specific subcategories for accounting and reporting.
Posted: 19 Mar 2024 | Published: 19 Mar 2024

TOPICS:  .NET
Schneider Electric

Our Security, Delivered Your Way
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Download this portfolio to learn more about WatchGuard's managed security service solutions, which give MSPs peace of mind through better endpoint management and comprehensive protection across your entire service ecosystem.
Posted: 23 Jul 2021 | Published: 23 Jul 2021

WatchGuard Technologies, Inc.

Specsavers x TeamViewer
sponsored by TeamViewer
CASE STUDY: Specsavers, the world's largest privately owned optical group, needs to defend its position and provide affordable, quality care to patients and customers. To do this, every aspect of the business must run smoothly, including its IT desk and support. Discover how TeamViewer Tensor makes it all possible in this case study.
Posted: 21 Mar 2024 | Published: 21 Mar 2024

TOPICS:  .NET
TeamViewer

Data Modeling Guidebook
sponsored by HighByte
EBOOK: Digital transformation is providing an unprecedented amount of predictive insights, but making the best use of this data can be daunting. Check out HighByte’s e-book to gain a better understanding of how data modeling works, what it looks like, how it works with existing standards, and to gather tips on how to establish a data modeling strategy.
Posted: 04 Apr 2022 | Published: 04 Apr 2022

TOPICS:  .NET
HighByte

Asynchronous Telemedicine Guide + COVID-19: The Largest Case Study on Async
sponsored by Fabric Health
EBOOK: Discover the power of asynchronous care, the most efficient care delivery method. Based on over 15 years of experience in async, this comprehensive 29-page resource includes everything you need to know to implement an effective virtual-first strategy that enhances provider capacity, expands patient access, and offers a consumer-grade experience.
Posted: 29 Aug 2024 | Published: 29 Aug 2024

Fabric Health

CW APAC – October 2020: Trend Watch: Storage
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly takes a peek at future storage technologies, such as helium and DNA, and offers some valuable tips on how to keep cloud storage costs under control. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Oct 2020

TechTarget ComputerWeekly.com

Computer Weekly – 19 July 2016
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.
Posted: 08 Feb 2021 | Published: 19 Jul 2016

TechTarget ComputerWeekly.com

Infinidat InfiniBox/InfiniGuard Solution Profile
sponsored by Infinidat
ANALYST REPORT: Backup targets are crucial to enterprise cybersecurity, as hackers often target them to disable recovery options. This analyst report examines key features of cyber-secure backup targets, like data immutability, encryption, and high availability. Read on now to discover how you can secure your backup infrastructure.
Posted: 15 Nov 2024 | Published: 18 Nov 2024

Infinidat