URL White Papers

(View All Report Types)
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola Solutions

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Security Products for Protection: Endpoint and Anti-Malware
sponsored by Carbon Black
EGUIDE: Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.
Posted: 08 Feb 2021 | Published: 21 Aug 2017

Carbon Black

A-core Fortifies Cybersecurity
sponsored by Bitdefender
CASE STUDY: After a close call with a ransomware attack, A-Core Concrete Specialists’ IT team decided they needed a more prepared and mature endpoint and email security operation. By partnering with Bitdefender, A-Core were able to combine several of their offerings and create a more secure operation while saving time and energy. Read on to learn more.
Posted: 10 Feb 2023 | Published: 11 Feb 2023

TOPICS:  .NET
Bitdefender

Web security: Important but often overlooked
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 08 Feb 2021 | Published: 24 Nov 2017

TechTarget ComputerWeekly.com

How Van Horn Improves Employee Training By 20%
sponsored by T-Mobile for Business
CASE STUDY: “Amaze Our Customers”: This is Van Horn Automotive Group’s philosophy. To continue fulfilling that mission, Van Horn set out to transform its communications system. This case study maps out the journey, breaking down how, in addition to modernizing its communications, Van Horn improved its onboarding training. Read on for more details.
Posted: 18 Jul 2024 | Published: 18 Jul 2024

T-Mobile for Business

Unified Communications: One Simple Tool to Help Avoid the Hang-Ups of Legacy Voice Systems
sponsored by T-Mobile for Business
ANALYST REPORT: As SMBs grapple with increasingly competitive situations where connectivity between employees and customers is essential, unified communications (UC) solutions have risen to the occasion. Further explore the role UC plays in reducing the need for dedicated internal resources and cutting costs for SMBs in this IDC report.
Posted: 20 Jun 2023 | Published: 20 Jun 2023

TOPICS:  .NET
T-Mobile for Business

The Secure Coding Handbook
sponsored by Veracode
EBOOK: This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
Posted: 06 Jun 2023 | Published: 06 Jun 2023

TOPICS:  .NET
Veracode

Hacking the Human Operating System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 08 Feb 2021 | Published: 27 Feb 2017

TechTarget ComputerWeekly.com

Understanding How Businesses Can Leverage the Fixed Wireless Access Opportunity
sponsored by T-Mobile for Business
ANALYST REPORT: Fixed wireless access (FWA) is a powerful and cost-effective option for shoring up connectivity for businesses operating in both rural and urban areas while also streamlining the connectivity experience for businesses with distributed locations. Read on to learn how you can meet your organization’s connectivity needs with FWA.
Posted: 15 Jul 2024 | Published: 15 Jul 2024

T-Mobile for Business

The Benefits Of AI And Automation For Smbs And How 5G Can Help Amplify Them
sponsored by T-Mobile for Business
ANALYST REPORT: With 71% of U.S. small and medium businesses planning to increase their IT spending in the next 12 months, many of these organizations are looking to AI and automation tools to improve their operational efficiency. But what exactly are the benefits of AI and automation? Access this report to learn more.
Posted: 12 Jul 2024 | Published: 13 Jul 2024

TOPICS:  .NET
T-Mobile for Business

Automated Threat Analysis
sponsored by Splunk
EBOOK: Phishing and malware threats have become a huge concern for businesses both big and small. These threat types continue to evolve at an alarming rate, leveraging advanced techniques in order to bypass traditional security measures. Access this guide to learn more.
Posted: 29 Oct 2024 | Published: 29 Oct 2024

Splunk

Effectively leveraging cloud-based contracts
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cloud contracts offer great benefits, but they can put organisations at significantly greater risk than conventional IT service contracts. This report by consultant Bob Fawthrop explains how to mitigate the risks.
Posted: 08 Feb 2021 | Published: 18 Jan 2017

TechTarget ComputerWeekly.com

How Business Travelers and Remote Workers Benefit from Connectivity on the Go
sponsored by T-Mobile for Business
ANALYST REPORT: This white paper addresses considerations for SMBs to maintain secure, productive remote work, including:How to overcome challenges of public Wi-Fi and BYOD for mobile workBenefits of 5G for consistent coverage and enhanced securityRead the white paper now.
Posted: 16 Jul 2024 | Published: 16 Jul 2024

T-Mobile for Business

2024 Miercom Security Benchmark Compare the Top Enterprise Firewalls
sponsored by Checkpoint Software Technologies
INFOGRAPHIC: With such a narrow margin between defense and disaster, you need to make sure you have the most effective and functional firewall possible. This infographic presents the 2024 Miercom Security Benchmark for top enterprise firewalls, which uses attack-time metrics to compare the leading vendors. Download now to learn more.
Posted: 10 May 2024 | Published: 10 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

Extracting actionable data from banking malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 08 Feb 2021 | Published: 17 Aug 2016

TechTarget ComputerWeekly.com

Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 08 Feb 2021 | Published: 28 Feb 2018

TechTarget ComputerWeekly.com

Obtaining Best-in-Class Network Security with Cloud Ease of Use
sponsored by Palo Alto Networks
PRODUCT OVERVIEW: Secure your cloud workloads with Palo Alto Networks' Cloud NGFW for AWS. This fully managed cloud-native service provides best-in-class network security with easy deployment and zero maintenance. Learn how Cloud NGFW can safeguard your AWS environment.
Posted: 05 Nov 2024 | Published: 06 Nov 2024

Palo Alto Networks

The sped-up deployment of IoT on the back of "failure free" 5G
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Research in November 2021 from Inmarsat Enterprise found that as many as 84% of businesses gave sped up deployment of IoT, or plan to, because of Covid.  In this guide, learn how businesses implementing IoT technologies are getting ahead of the competition across their value chains.
Posted: 10 Dec 2021 | Published: 10 Dec 2021

TechTarget ComputerWeekly.com

Getting Started with Zero Trust Access Management
sponsored by Okta
EBOOK: For businesses adopting a Zero Trust security posture, placing identity at the posture’s foundation can assure continuous access assessment without friction for users. Explore this e-book to learn the 4 stages that comprise Okta’s model for enabling identity-centric Zero Trust.
Posted: 14 Sep 2022 | Published: 14 Sep 2022

TOPICS:  .NET
Okta

Your Hybrid Infrastructure Is Under Attack
sponsored by Palo Alto Networks
WHITE PAPER: Hybrid cloud environments present complex security challenges due to increased interconnectivity and attack surface. This white paper examines hybrid security requirements and how the Palo Alto Networks platform can secure against ransomware, cryptojacking, and container threats. Read the full white paper to protect your hybrid infrastructure.
Posted: 07 Nov 2024 | Published: 08 Nov 2024

Palo Alto Networks

Mobile Unified Communications and Collaboration: The Gateway to AI for SMBs
sponsored by T-Mobile for Business
ANALYST REPORT: In this 2024 IDC report, unlock answers to 5 FAQs about unified communications and collaboration (UC&C) and AI.
Posted: 19 Jul 2024 | Published: 19 Jul 2024

T-Mobile for Business

Secure Connectivity for Devices and Users at the Network Edge
sponsored by Cradlepoint
EBOOK: Yes, security threats are expanding – and so is the network edge. So, how can you ensure your organization’s users at the edge are as secure as possible? Tap into this e-book by Cradlepoint for guidance.
Posted: 26 Oct 2023 | Published: 26 Oct 2023

TOPICS:  .NET
Cradlepoint

Bitdefender Penetration Testing Services
sponsored by Bitdefender
WHITE PAPER: Many organizations that invested in web and mobile applications over the past few years were uneducated in the potential threats and failed to protect their end users from encountering availability and performance issues. Download this white paper to learn how it works and explore the different types of penetration testing.
Posted: 10 Feb 2024 | Published: 10 Feb 2024

TOPICS:  .NET
Bitdefender

Not If, But When: 4 1/2 Ways to Prepare for Future Industry Disruptions
sponsored by Zelis
WHITE PAPER: No one forgets the February 2024 data breach that brought the healthcare industry to a standstill. Are you prepared for the next disruption? Facing mounting compliance challenges and increasing cyberattacks, payers must fortify their systems. Download the Guide for 4 (and ½) ways National Health Plan leaders can prepare for what’s next.
Posted: 25 Sep 2024 | Published: 25 Sep 2024

TOPICS:  .NET
Zelis

Bridgestone Customer Case
sponsored by Schneider Electric
CASE STUDY: When this leading tire manufacturer began to struggle with their data servers, ESG, and modernization efforts, they sought out a way they could upgrade their existing manufacturing site server room in a safe and sustainable way. Access this case study to hear the full story.
Posted: 21 May 2024 | Published: 21 May 2024

TOPICS:  .NET
Schneider Electric