Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER:
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Successful Mobile Deployments Require Robust Security
sponsored by Lopez Research
WHITE PAPER:
Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 20 May 2009 | Published: 20 May 2009
|
|
|
How to Slash Corporate Fax Telephone Charges 20 - 80%: Overview of V.34 Faxing and JBIG Document Compression
sponsored by FaxBack, Inc.
WHITE PAPER:
An in-depth look at V.34 high-speed fax and JBIG document compression technology...designed to save companies significant money in reducing fax telephone charges.
Posted: 18 Sep 2003 | Published: 01 May 2004
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Allegheny General Sees Safety, Efficiency, Financial Gains From IV Robotic Insourcing Program
sponsored by Omnicell
CASE STUDY:
Allegheny General Hospital saw significant safety, efficiency, and financial gains from its insourcing program using Omnicell's IV compounding robot and services. The hospital realized $700K in savings in the first six months and automated 30% of its IV prep process. Read the full case study to learn more.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
CW Middle East July to Sept 2016
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.
Posted: 08 Feb 2021 | Published: 18 Jul 2016
|
|
|
Simplifying IT Deployments at the Edge for Healthcare
sponsored by Schneider Electric
WHITE PAPER:
Discover in this white paper how the 3 key pillars for successful edge computing deployments can help your healthcare IT deliver resiliency and reliability.
Posted: 28 Nov 2022 | Published: 29 Nov 2022
|
|
|
Kubernetes Patterns Reusable Elements For Designing Cloud Native Applications
sponsored by Red Hat
EBOOK:
This exhaustive O'Reilly e-book aims to help developers discover and learn about the most common patterns for creating cloud-native applications with Kubernetes. Read the book now, or save it for reference material in a pinch.
Posted: 16 Apr 2024 | Published: 16 Apr 2024
|
|
|
Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE:
David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
Posted: 08 Feb 2021 | Published: 06 Nov 2019
|
|
|
The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019
|
|
|
2024 Cloud Security Report
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT:
As organizations discover new uses for the cloud, they also find new security risks lurking in the shadows. By gathering insights from over 800 cloud and cybersecurity professionals, the findings of this study explore the current state of cloud security. Download now to learn more.
Posted: 05 Jun 2024 | Published: 05 Jun 2024
|
|
|
A Computer Weekly buyer's guide to cloud-native architectures
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cloud-native architectures are seen as the future for businesses. In this 16-page buyer's guide, Computer Weekly looks at the influence of DevOps and microservices-based technology, the continued importance of security in containers for software development and the suitability of Microsoft Azure for deploying cloud-native applications
Posted: 08 Feb 2021 | Published: 20 Nov 2018
|
|
|
How do Iconic Business Models such as Airbnb Emerge?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Brands such as Airbnb disrupt industries and change how consumers think about the market, according to this research from Cass Business School, City University London.
Posted: 08 Feb 2021 | Published: 16 Mar 2016
|
|
|
Why cloud? Why now? A Qlik Cloud Comparison Guide
sponsored by Qlik
BUYER'S GUIDE:
Discover the advantages of a modern, AI-powered cloud analytics platform. This Qlik Cloud Comparison Guide highlights key differences from on-premises solutions, including enhanced security, data management, AI-powered analytics, machine learning, and automation. See how Qlik Cloud elevates your analytics. Read the Qlik Cloud Comparison Guide
Posted: 13 Sep 2024 | Published: 14 Sep 2024
|
|
|
IT outsourcing in the digital age
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, discover how cloud computing continues to change the IT outsourcing industry, how Indian staff are making up a larger proportion of the workforces at large western companies, and find out how IT is disrupting the legal firms that support the outsourcing industry.
Posted: 08 Feb 2021 | Published: 17 Apr 2018
|
|
|
The State of Software Supply Chain Security 2024
sponsored by ReversingLabs
RESEARCH CONTENT:
Over the last 3 years, supply chain attacks rose 1300%. This report is designed to give readers a map with which they can navigate the landscape of software supply chain security, exploring some of the high-level trends in software supply chain threats and how recent attacks provide insight into what’s to come. Read on to learn more.
Posted: 22 Feb 2024 | Published: 22 Feb 2024
|
|
|
A guide to platform agnostic application delivery
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
There is no single answer to the question of how to run applications independent of the underlying hardware. In this e-guide, we explore options for application virtualisation.
Posted: 10 Aug 2021 | Published: 10 Aug 2021
|
|
|
The Skeptic’s Guide to Oracle Third-Party Support
sponsored by Spinnaker Support
WHITE PAPER:
This guide answers 15 common queries about third-party Oracle support, addressing legality, quality, response times, costs, and security. It offers facts and recommendations to assess if it suits your organization. Read the full eBook for more details.
Posted: 04 Jun 2024 | Published: 04 Jun 2024
|
|
|
Fail to prepare quality data, prepare to fail
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Fail to prepare, prepare to fail is an adage that never fails to lose its veracity. The same is true of using poor quality data, known to be the bane of the lives of data analysts, not to speak of organisations that yearn to be "data driven".
Posted: 29 Dec 2022 | Published: 29 Dec 2022
|
|
|
The currency of trust: why banks and insurers must make customer data safer and more secure
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
Posted: 08 Feb 2021 | Published: 25 Apr 2017
|
|
|
The State of AI at Work
sponsored by Asana
RESEARCH CONTENT:
The rapid rise of AI is transforming the workplace. This in-depth report examines the opportunities and challenges of AI adoption, from productivity gains to literacy gaps. Discover the 5 stages of AI maturity and how to harness AI's potential. Read the full report to learn how to move your organization to AI excellence.
Posted: 22 Oct 2024 | Published: 22 Oct 2024
|
|
|
Web security: Important but often overlooked
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 08 Feb 2021 | Published: 24 Nov 2017
|
|
|
The sped-up deployment of IoT on the back of "failure free" 5G
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Research in November 2021 from Inmarsat Enterprise found that as many as 84% of businesses gave sped up deployment of IoT, or plan to, because of Covid. In this guide, learn how businesses implementing IoT technologies are getting ahead of the competition across their value chains.
Posted: 10 Dec 2021 | Published: 10 Dec 2021
|
|
|
Guide to Environmental Sustainability Metrics for Data Centers
sponsored by Schneider Electric
EBOOK:
To find out how your organization can improve both the accuracy of your sustainability tracking in the data center and the utility of your ESG reports, download this essential guide to environmental sustainability metrics.
Posted: 12 Mar 2024 | Published: 12 Mar 2024
|
|
|
Guide to Environmental Sustainability Metrics for Data Centers
sponsored by Schneider Electric
WHITE PAPER:
In this deep-diving white paper — designed for companies in the data center industry or wishing to report on their data center operations — discover why there 5 often-misunderstood categories for environmental sustainability reporting metrics that need to be at the core of your sustainability strategy.
Posted: 19 Mar 2024 | Published: 19 Mar 2024
|
|
|
Gamma International: The Macedonia files
sponsored by TechTarget ComputerWeekly.com
RESOURCE:
This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 08 Feb 2021 | Published: 23 Nov 2017
|
|
|
CIO Trends #8: Nordics
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we take a look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at a pace. This e-guide features an article about each.
Posted: 08 Feb 2021 | Published: 02 Jan 2020
|
|
|
CIO Trends #8: Nordics
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we take a look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at a pace. This e-guide features an article about each.
Posted: 08 Feb 2021 | Published: 09 Jan 2019
|
|
|
Pay It Forward: Attracting and Retaining Top Agents in South Africa CX Delivery Centres
sponsored by Hinduja Global Solutions
WHITE PAPER:
South Africa is a top offshore customer experience delivery destination, offering a large talent pool, cultural compatibility, and lower costs. Learn how HGS is attracting and retaining top agents in its new South Africa delivery centre. Read the full white paper.
Posted: 03 Sep 2024 | Published: 04 Sep 2024
|
|