Terminal Emulation Protocols White Papers

(View All Report Types)
Secure Optimized Data Protection for Remote Offices
sponsored by Symantec Corporation
WHITE PAPER: Learn how to protect remote office data while simplifying backup and recovery tasks. Be better prepared for and recover more easily from equipment failure, virus attack or accidental loss of vital files.
Posted: 24 Apr 2006 | Published: 01 Feb 2006

Symantec Corporation

7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Mobile Payments Using Host Card Emulation with NFC
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 08 Feb 2021 | Published: 11 May 2018

TechTarget ComputerWeekly.com

CW Nordics - May-July 2021: Denmark takes a top-down approach to gender equality in tech entrepreneurship
sponsored by TechTarget ComputerWeekly.com
EZINE: Tech Nordic Advocates has adopted a new approach to closing the gender gap in Danish technology startups, looking to emulate Canada's top-down approach.
Posted: 17 May 2021 | Published: 27 May 2021

TechTarget ComputerWeekly.com

BadUSB 2.0: Exploring USB man-in-the-middle attacks
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
Posted: 08 Feb 2021 | Published: 30 Aug 2016

TechTarget ComputerWeekly.com

Bitdefender Offensive Services: Red Teaming
sponsored by Bitdefender
PRODUCT OVERVIEW: Every new technology introduced to your organization adds further complexity to the attack surface. Bitdefender offers customized Red Team Exercises that simulate real-life threat actors to identify vulnerabilities so that your security teams can resolve them before real hackers can exploit them. Read on to learn more.
Posted: 13 Feb 2024 | Published: 13 Feb 2024

TOPICS:  .NET
Bitdefender

Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

AI Agents: The Right Approach and How to Build Them
sponsored by AWS & Keepler
ESG SHOWCASE: Generative AI enables AI agents to automate complex processes, enhance decision-making, and unlock growth opportunities. This white paper explores AI agents' potential, adoption challenges, and a proven approach to building successful AI agents with AWS and Keepler. Read the full ESG Showcase to learn more.
Posted: 13 Nov 2024 | Published: 13 Nov 2024

AWS & Keepler

Computer Weekly – 8 August 2017: Formula 1 goes digital
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Formula 1 chief Ross Brawn is turning to digitization to enhance the fan experience of Grand Prix racing. We also learn how virtual reality is being used to deliver healthcare services. And our experts examine the ethical concerns around artificial intelligence. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Aug 2017

TechTarget ComputerWeekly.com

Finding Your Digital Adversaries. Before They Find You.
sponsored by CounterCraft
EBOOK: Discover how digital twin technology can help you proactively defend against sophisticated cyber threats. Learn how threat deception and specific, actionable intelligence powered by deception can fortify your cybersecurity defenses. Read the e-book to learn more.
Posted: 14 Oct 2024 | Published: 14 Oct 2024

CounterCraft

Modernizing Mainframe Backup for Healthcare Payers
sponsored by Pure Storage
PRODUCT OVERVIEW: Learn how healthcare payers are deploying new strategies and solutions to achieve better performance, greater reliability, and the ability to rapidly restore data for improved Return to Operations in the event of a data breach or other disruption.
Posted: 29 Aug 2024 | Published: 29 Aug 2024

Pure Storage

CHAPTER 13: IT Troubleshooting
sponsored by McGraw Hill
BOOK: Download this sample chapter from ITF+ CompTIA IT Fundamentals to learn how to approach IT problems using a standard troubleshooting method, how to troubleshoot common computer problems and more.
Posted: 08 Feb 2021 | Published: 12 Jan 2021

McGraw Hill

Cloud-Native eSBCs for the Cloud-First Enterprise
sponsored by Ribbon Communications
WHITE PAPER: Forward-looking enterprises are rearchitecting their networks and moving communications infrastructure to the cloud to better support today’s on-demand services and mobile-first users. Tap into this white paper to learn how Ribbon’s cloud-native enterprise session border controllers (eSBC) is designed to provide a handful of enhancements.
Posted: 31 Jan 2024 | Published: 31 Jan 2024

TOPICS:  .NET
Ribbon Communications

A Computer Weekly buyer's guide to perimeterless network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 08 Feb 2021 | Published: 05 Feb 2019

TechTarget ComputerWeekly.com

2024 Cyber Security Report
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT: In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.
Posted: 03 May 2024 | Published: 04 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

Navigating Cost and Contractual Concerns in Network Monitoring and Managed Services
sponsored by LogicVein
WHITE PAPER: Understand the cost structures, contract flexibility, and data management provisions when selecting network monitoring and managed services. Learn from real-world lessons by industry leaders to ensure your organization's infrastructure aligns with financial and operational goals. Read the full white paper to make informed decisions.
Posted: 23 Aug 2024 | Published: 23 Aug 2024

All resources sponsored by LogicVein

The Internet Outage Survival Guide: Unpacking common outages types and how they impact your business
sponsored by Cisco ThousandEyes
EBOOK: Today, business rely on the Internet more than ever. Yet, the Internet is as unpredictable as it is critical. It's a "best-effort" collection of networks connecting a myriad of providers, and at its very core, the Internet is vulnerable to outages. In this e-book, learn how you can mitigate the risk of an Internet outage.
Posted: 08 Feb 2021 | Published: 15 Jan 2021

Cisco ThousandEyes

A Computer Weekly e-guide on Network Visibility, Performance and Monitoring
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.
Posted: 06 Jul 2021 | Published: 06 Jul 2021

TechTarget ComputerWeekly.com

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: Download this report and learn the risks associated with privileged access, and explains how solutions from One Identity mitigate those risks with granular access control and accountability.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  Access Control
One Identity

Is AI coming for YOUR job? (Spoiler alert: No!)
sponsored by Oversight Systems
WHITE PAPER: While AI and automation can seem like scary, job-stealing technology, some organizations, and financial teams are finding that it’s the exact opposite. However, most companies aren’t completely convinced. Browse this white paper to learn more.
Posted: 15 Aug 2023 | Published: 15 Aug 2023

TOPICS:  .NET
Oversight Systems

9 essential elements of network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
Posted: 08 Feb 2021 | Published: 08 May 2020

TechTarget ComputerWeekly.com

Automotive HMI Test Automation
sponsored by Keysight
PRODUCT OVERVIEW: Discover how Keysight Eggplant's integrated end-to-end testing solution can elevate the efficiency, quality, and safety of your automotive HMI testing. Explore advanced computer vision technology and seamless integration capabilities to streamline your testing processes and deliver superior business outcomes. Read the white paper to learn more.
Posted: 04 Oct 2024 | Published: 04 Oct 2024

All resources sponsored by Keysight

Powerful, Application-aware Investigation Tools.
sponsored by Endace
DATA SHEET: When you’re investigating a security incident, you want to eliminate any guesswork. EndaceVision, a browser-based investigation GUI, can help you do so. Learn all about the product in this data sheet.
Posted: 28 Mar 2023 | Published: 28 Mar 2023

TOPICS:  .NET
Endace

Transitioning to Teams
sponsored by Ribbon Communications
WHITE PAPER: Microsoft Teams does not by default include the ability to make and receive calls to/from the outside world. Read this white paper to explore the option of adding phone system services and telecom services to Microsoft Teams.
Posted: 31 Jan 2024 | Published: 31 Jan 2024

TOPICS:  .NET
Ribbon Communications

You’re Under SIP Attack: Limiting SIP Vulnerabilities
sponsored by Ribbon Communications
WHITE PAPER: Without the necessary expertise, monitoring, and management, companies could be leaving their network vulnerable to exploitation through their VoIP communications. Read this white paper to understand hackers’ tactics and motivations to help your enterprise operators secure their networks from attack.
Posted: 31 Jan 2024 | Published: 31 Jan 2024

TOPICS:  .NET
Ribbon Communications

DataOps: The Missing Link in Your Industrial Data Architecture
sponsored by HighByte
WHITE PAPER: How can your business simplify data contextualization to maximize the value of your technology investments? By leveraging DataOps to define standard models and establish and manage integrations, operational teams can provide data to the systems and business users who are requesting it in a more efficient and managed way. Read on to learn more.
Posted: 26 Oct 2023 | Published: 26 Oct 2023

TOPICS:  .NET
HighByte