Terminal Emulation Protocols White Papers

(View All Report Types)
Secure Optimized Data Protection for Remote Offices
sponsored by Symantec Corporation
WHITE PAPER: Learn how to protect remote office data while simplifying backup and recovery tasks. Be better prepared for and recover more easily from equipment failure, virus attack or accidental loss of vital files.
Posted: 24 Apr 2006 | Published: 01 Feb 2006

Symantec Corporation

7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Mobile Payments Using Host Card Emulation with NFC
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 08 Feb 2021 | Published: 11 May 2018

TechTarget ComputerWeekly.com

CW Nordics - May-July 2021: Denmark takes a top-down approach to gender equality in tech entrepreneurship
sponsored by TechTarget ComputerWeekly.com
EZINE: Tech Nordic Advocates has adopted a new approach to closing the gender gap in Danish technology startups, looking to emulate Canada's top-down approach.
Posted: 17 May 2021 | Published: 27 May 2021

TechTarget ComputerWeekly.com

BadUSB 2.0: Exploring USB man-in-the-middle attacks
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
Posted: 08 Feb 2021 | Published: 30 Aug 2016

TechTarget ComputerWeekly.com

Bitdefender Offensive Services: Red Teaming
sponsored by Bitdefender
PRODUCT OVERVIEW: Every new technology introduced to your organization adds further complexity to the attack surface. Bitdefender offers customized Red Team Exercises that simulate real-life threat actors to identify vulnerabilities so that your security teams can resolve them before real hackers can exploit them. Read on to learn more.
Posted: 13 Feb 2024 | Published: 13 Feb 2024

TOPICS:  .NET
Bitdefender

Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

Computer Weekly – 8 August 2017: Formula 1 goes digital
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Formula 1 chief Ross Brawn is turning to digitization to enhance the fan experience of Grand Prix racing. We also learn how virtual reality is being used to deliver healthcare services. And our experts examine the ethical concerns around artificial intelligence. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Aug 2017

TechTarget ComputerWeekly.com

Google Workspace CMMC Level 2 Conguration Guide
sponsored by Google Workspace
EBOOK: This guide provides instructions for configuring Google Workspace to meet CMMC Level 2 requirements. It covers security controls, implementation steps, and best practices for protecting CUI in cloud environments. Learn to leverage Google Workspace features to enhance cybersecurity and achieve compliance. Read the full eBook for guidance.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

Google Workspace

A GUIDE TO January 2025 Migrating from Citrix to Azure Virtual Desktop with Nerdio
sponsored by Nerdio
EBOOK: This guide outlines migrating from Citrix to Azure Virtual Desktop with Nerdio, covering licensing differences, architectural comparisons, image management, and connectivity options. Learn to streamline your migration, reduce costs, and leverage Azure's cloud infrastructure. Read the full ebook for a comprehensive roadmap.
Posted: 03 Mar 2025 | Published: 04 Mar 2025

Nerdio

Attack Surface Management
sponsored by Palo Alto Networks
EBOOK: With more cloud environments and digital assets in play than ever before, the enterprise attack surface has become increasingly complex and difficult to manage. This Attack Surface Management (ASM) for Dummies, e-book presents a coherent overview of ASM. Download now to unlock the extensive e-book and all the insights contained within it.
Posted: 07 Apr 2023 | Published: 08 Apr 2023

TOPICS:  .NET
Palo Alto Networks

Threat Intelligence Report 2024
sponsored by Nokia
ANALYST REPORT: Nokia's 2024 Threat Intelligence Report shows a 166% rise in DDoS traffic and growing AI-driven complexity. The telecom sector faces threats like ransomware and data theft. Quantum computing poses future risks, while generative AI offers opportunities and challenges for security. Read the report for insights on protecting critical infrastructure.
Posted: 28 Mar 2025 | Published: 28 Mar 2025

Nokia

A Computer Weekly buyer's guide to perimeterless network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 08 Feb 2021 | Published: 05 Feb 2019

TechTarget ComputerWeekly.com

Energy Optimized and Scalable Breakout Architecture for your Data Centers
sponsored by Panduit
WHITE PAPER: This white paper examines how breakout architectures in data centers can cut power consumption by up to 54.5% compared to traditional Top-of-Rack setups. Testing by Cisco, Panduit, and Keysight shows energy savings with 400G switches using optical breakouts. Discover best practices for sustainable, scalable network infrastructure.
Posted: 17 Mar 2025 | Published: 18 Mar 2025

Panduit

CHAPTER 13: IT Troubleshooting
sponsored by McGraw Hill
BOOK: Download this sample chapter from ITF+ CompTIA IT Fundamentals to learn how to approach IT problems using a standard troubleshooting method, how to troubleshoot common computer problems and more.
Posted: 08 Feb 2021 | Published: 12 Jan 2021

McGraw Hill

Fortinet Unified Secure Access Service Edge
sponsored by Fortinet, Inc.
ANALYST REPORT: Fortinet SASE Solution Earns AAA Rating. CyberRatings.org thoroughly tested FortiSASE to determine how it handled TLS/SSL 1.2 and 1.3 cipher suites, how it defended against 205 exploits and 7,140 malware samples, and whether any of 1,124 evasions could bypass its protection. Read the full report to get all the details.
Posted: 18 Dec 2024 | Published: 04 Dec 2024

TOPICS:  .NET
Fortinet, Inc.

Zscaler Zero Trust Exchange
sponsored by Zscaler
RESEARCH CONTENT: CyberRatings.org evaluated Zscaler Zero Trust Exchange using their SSE Threat Protection Methodology v2.1. The product excelled in handling TLS/SSL cipher suites, blocking exploits and malware, and resisting evasion techniques. Performance metrics for HTTP/HTTPS capacity and file downloads were assessed. Read the report for detailed results.
Posted: 04 Mar 2025 | Published: 04 Mar 2025

Zscaler

2024 Cyber Security Report
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT: In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.
Posted: 03 May 2024 | Published: 04 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

A Computer Weekly e-guide on Network Visibility, Performance and Monitoring
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.
Posted: 06 Jul 2021 | Published: 06 Jul 2021

TechTarget ComputerWeekly.com

Navigating Cost and Contractual Concerns in Network Monitoring and Managed Services
sponsored by LogicVein
WHITE PAPER: Understand the cost structures, contract flexibility, and data management provisions when selecting network monitoring and managed services. Learn from real-world lessons by industry leaders to ensure your organization's infrastructure aligns with financial and operational goals. Read the full white paper to make informed decisions.
Posted: 23 Aug 2024 | Published: 23 Aug 2024

All resources sponsored by LogicVein

Meeting ambitious production goals
sponsored by Siemens
WHITE PAPER: Striving for faster, less expensive manufacturing, many manufacturers have adopted a configurable, out-of-the-box manufacturing execution system (MES). For a 15-page guide to such an MES, tap into this Siemens e-book.
Posted: 04 Jul 2024 | Published: 04 Jul 2024

TOPICS:  .NET
Siemens

Is AI coming for YOUR job? (Spoiler alert: No!)
sponsored by Oversight Systems
WHITE PAPER: While AI and automation can seem like scary, job-stealing technology, some organizations, and financial teams are finding that it’s the exact opposite. However, most companies aren’t completely convinced. Browse this white paper to learn more.
Posted: 15 Aug 2023 | Published: 15 Aug 2023

TOPICS:  .NET
Oversight Systems

9 essential elements of network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
Posted: 08 Feb 2021 | Published: 08 May 2020

TechTarget ComputerWeekly.com

Powerful, Application-aware Investigation Tools.
sponsored by Endace
DATA SHEET: When you’re investigating a security incident, you want to eliminate any guesswork. EndaceVision, a browser-based investigation GUI, can help you do so. Learn all about the product in this data sheet.
Posted: 28 Mar 2023 | Published: 28 Mar 2023

TOPICS:  .NET
Endace

Network Scorecard For The Netskope NewEdge SASE Cloud
sponsored by Netskope
WHITE PAPER: The network perimeter now extends everywhere, requiring security to move with it. This report evaluates Netskope's NewEdge SASE cloud solution, covering its infrastructure, global footprint, and performance. Results show Netskope meets expectations with no weaknesses. Read the report to learn how Netskope secures remote access and builds trust.
Posted: 26 Nov 2024 | Published: 27 Nov 2024

Netskope

DataOps: The Missing Link in Your Industrial Data Architecture
sponsored by HighByte
WHITE PAPER: How can your business simplify data contextualization to maximize the value of your technology investments? By leveraging DataOps to define standard models and establish and manage integrations, operational teams can provide data to the systems and business users who are requesting it in a more efficient and managed way. Read on to learn more.
Posted: 26 Oct 2023 | Published: 26 Oct 2023

TOPICS:  .NET
HighByte