High Definition: The Evolution of Video Conferencing
sponsored by Polycom, Inc.
WHITE PAPER:
High definition (HD) video conferencing provides new voice, content sharing and cost-effective communication capabilities. Learn the vendor requirements for implementing HD video conferencing to help avoid the potential pitfalls of this new tec...
Posted: 01 Jun 2007 | Published: 01 Jan 2006
|
|
|
RADVISION: Recipient of the 2008 North American Videoconferencing Infrastructure Systems Product Differentiation Innovation Award
sponsored by RADVISION
WHITE PAPER:
Frost & Sullivan presents the 2008 Product Differentiation Innovation Award in the videoconferencing infrastructure systems market to RADVISION.
Posted: 09 Jun 2008 | Published: 01 Jun 2008
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Improve IT Efficiency With A Standardized OS
sponsored by Red Hat
EBOOK:
Are your teams struggling with managing diverse IT infrastructure? If so, you’re not alone, faced with the challenge of integrating legacy IT systems with new technologies. However, a standardized operating environment (SOE) on Red Hat Enterprise Linux can alleviate this burden. Read this e-book now to learn how.
Posted: 15 Mar 2025 | Published: 15 Mar 2025
|
|
|
Sustainable Devices for Positive Impact
sponsored by Dell Technologies and Intel
EGUIDE:
Download this eGuide and learn how Dell and Intel help organizations be more sustainable.
Posted: 10 May 2023 | Published: 10 May 2023
|
|
|
The Business Value of Standardizing on Red Hat Enterprise Linux
sponsored by Red Hat
ANALYST REPORT:
This analyst report is designed to help your business get started with your open source journey by putting context behind the business value of standardizing on Red Hat Enterprise Linux (RHEL). Read on now to discover key challenges and opportunities and learn how you can unlock the quantified benefits of RHEL.
Posted: 15 Mar 2025 | Published: 15 Mar 2025
|
|
|
Beyond the Standards: Extending the Reach of Copper Cabling
sponsored by Panduit
WHITE PAPER:
This white paper examines how 22 AWG Category 6 and 6A copper cabling can extend 1000BASE-T Ethernet beyond the 100-meter limit. Through analysis and validation, Panduit shows that a 150-meter channel using 140 meters of 22 AWG cable plus 10 meters of patch cords provides reliable performance. Read the white paper for detailed insights.
Posted: 17 Mar 2025 | Published: 18 Mar 2025
|
|
|
2020 Media Consumption Series - Where
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this inforgraphic, we show the results of our 2020 Media Consumption Survey. Find out where is pre-purchase research conducted and what types of content are most preferred for consumption for purchase research?
Posted: 08 Feb 2021 | Published: 21 Oct 2020
|
|
|
Computer Weekly – 18 June 2024: General election 2024 – the digital policies examined
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the digital policies revealed in the three main political parties' general election manifestos. Our new buyer's guide looks at the latest trends in cloud security. And we find out about the EU's plans for a digital single market that could span the globe. Read the issue now.
Posted: 16 Jun 2024 | Published: 18 Jun 2024
|
|
|
A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016
|
|
|
Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.
Posted: 08 Feb 2021 | Published: 15 Mar 2017
|
|
|
2020 Media Consumption Series Infographic Pack
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Here they are, the final results of our 2020 Media Consumption Series all packaged together. We take a dive in to the who, what, why, where, when, and how the IT sector consumes all forms of digital media and more. Answering questions such as why sales reps with data driven intent get the best response rates and what subject lines get the open?
Posted: 08 Feb 2021 | Published: 15 Dec 2020
|
|
|
Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017
|
|
|
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 08 Feb 2021 | Published: 29 Jul 2016
|
|
|
Analysis of the Linux Audit System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Posted: 08 Feb 2021 | Published: 01 Sep 2016
|
|
|
NetApp ASA Series: Simple, powerful, affordable block-optimized storage.
sponsored by Arrow NetApp
PRODUCT OVERVIEW:
NetApp ASA offers simple, powerful, and affordable block-optimized storage, balancing simplicity with high-end capabilities. It ensures exceptional performance, 99.9999% data availability, and built-in ransomware protection, modernizing SAN infrastructure at up to 50% less cost than competitors. Discover how NetApp ASA can transform your storage.
Posted: 18 Mar 2025 | Published: 18 Mar 2025
|
|
|
Renewable Energy Solutions Brochure
sponsored by Panduit
PRODUCT OVERVIEW:
As solar and other renewable energy sources continue to gain in popularity and usage, it has led to an increase in renewable energy production facilities around the world. With this rise in production, one partner in particular has found a way to partner with both EPC’s and solar installers to help power the world. Read on to learn more about it.
Posted: 27 Jun 2023 | Published: 27 Jun 2023
|
|
|
CW EMEA - November 2023: Let the data flow
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this month's CW EMEA ezine, we find out about Heineken's mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform. Read the issue now.
Posted: 06 Nov 2023 | Published: 09 Nov 2023
|
|
|
Build a Better Webinar: Audience Engagement
sponsored by BrightTALK by TechTarget
WEBCAST:
As B2B marketers, we find ourselves fighting for market share at a time when it’s harder than ever to keep audiences captivated. Distractions are everywhere. How can you ensure your content doesn’t get lost in the crowd? Watch this webinar to learn more.
Posted: 06 Sep 2023 | Premiered: Sep 6, 2023
|
|
|
Royal Holloway: Secure multiparty computation and its application to digital asset custody
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.
Posted: 20 Apr 2022 | Published: 20 Apr 2022
|
|
|
The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019
|
|
|
Future-Proof Your Security: Quantum Computing and PQC with Utimaco
sponsored by Utimaco
ANALYST REPORT:
Frost & Sullivan names Utimaco a Competitive Strategy Leader in post-quantum cryptography. Utimaco's expertise in deploying hardware security modules positions it as a key partner for organizations migrating to quantum-resistant algorithms. Read the full analyst report to learn more.
Posted: 16 Dec 2024 | Published: 17 Dec 2024
|
|
|
Case Study: Modernizing Media Archive Environment for SportsNet New York (SNY)
sponsored by Spectra Logic
CASE STUDY:
SportsNet New York (SNY) modernized its media archive with Spectra's BlackPearl Nearline Gateway, achieving improved performance, cost savings, and workflow efficiency. Read this full case study to learn how SNY's migration to this scalable, open-standard solution addressed their storage challenges.
Posted: 17 Sep 2024 | Published: 24 Sep 2024
|
|
|
Modernizing Enterprise Search
sponsored by Vespa.ai
EBOOK:
This e-book explores the benefits of replacing Elasticsearch with Vespa for enterprise search, emphasizing real-time availability, scalability, and efficiency. It highlights Vespa's strengths in RAG and vector databases, and presents benchmarks showing significant performance gains. See how Vespa can modernize your enterprise search capabilities.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
All resources sponsored by Vespa.ai
|
|
Compute Engine Tau T2D: Industry Leading Price-Performance Virtual Machines with x86 Compatibility
sponsored by Google Cloud & AMD
PRODUCT OVERVIEW:
In this product overview, discover how Tau T2D, an important expansion to Google Cloud’s already comprehensive Compute Engine portfolio designed to drive cost efficiency for large-scale cloud workloads, can help your organization better price-performance from your cloud investments.
Posted: 06 Jun 2024 | Published: 06 Jun 2024
|
|
|
The Use of Couchbase for Developing and Supporting AI-powered Applications
sponsored by Couchbase
WHITE PAPER:
As AI becomes integral to applications, database choice is crucial. This ESG technical validation shows how Couchbase aids AI-powered apps by delivering top performance, simplifying data modeling, and boosting developer productivity with Capella IQ. Read this report to see how Couchbase reduces complexity while managing diverse data types.
Posted: 21 Mar 2025 | Published: 22 Mar 2025
|
|
|
Using Programmatic Webinars to Achieve Better ABM Engagement
sponsored by Informa TechTarget
EBOOK:
Explore in this e-book why teams struggle with the shifts ABM requires of them, and discover a methodology by which they can drive substantive success with thoughtful, programmatic implementation of webinar series.
Posted: 29 Jul 2022 | Published: 29 Jul 2022
|
|
|
Understanding behavioural detection of antivirus
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
Posted: 08 Feb 2021 | Published: 12 Aug 2016
|
|