Beyond Corporate Walls: Motorola Enterprise Mesh Networks
sponsored by Motorola Solutions
WHITE PAPER:
Wireless mesh technology is flexible, secure and allows for easy control of user access. Read this paper to learn how mesh technology can help your enterprise cost effectively extend its wireless coverage without any extra cable or fiber.
Posted: 29 Jun 2007 | Published: 01 Mar 2007
|
|
|
Distributed Network Architecture for WiMAX: For a Digital, Converged, Mobile IP World
sponsored by Motorola Solutions
PRODUCT LITERATURE:
The world is moving to IP and service providers in all geographies are embracing the shift.
Posted: 15 Jun 2007 | Published: 01 Jun 2007
|
|
|
Presentation Transcript: Wired and Wireless Network Infrastructures-- Planning Tips to Improve Network Performance and Reduce Costs
sponsored by Belden
PRESENTATION TRANSCRIPT:
This presentation transcript, taken from the webcast of the same name, will help inform network designers, planners and installers of important considerations in planning to help them optimize combined network performance and reduce project costs. It will provide recommendations and tips for installing or upgrading a structured cabling plant.
Posted: 24 Apr 2009 | Published: 24 Apr 2009
|
|
|
Implementing a Wireless LAN
sponsored by AT&T Corp
WHITE PAPER:
This paper outlines the networking requirements and considerations for a successful WLAN implementation.
Posted: 08 Nov 2007 | Published: 13 Jul 2007
|
|
|
CW@50: What was making the news in June
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
Posted: 08 Feb 2021 | Published: 03 Jun 2016
|
|
|
Computer Weekly – 17 November 2020: How Mastercard is taking digital payments into a new era
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to Mastercard about how the credit card giant is using new technologies to take digital payments into a new era. After months of unprecedented uncertainty, we ask CIOs how they are planning for the next 12 months. And we examine how the growth in remote working will affect IT salaries. Read the issue now.
Posted: 08 Feb 2021 | Published: 17 Nov 2020
|
|
|
Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
Posted: 08 Feb 2021 | Published: 21 Sep 2020
|
|
|
Computer Weekly 50th anniversary special
sponsored by TechTarget ComputerWeekly.com
EZINE:
It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.
Posted: 08 Feb 2021 | Published: 22 Sep 2016
|
|
|
First the Tick, Now the Tock: Next Generation Intel Microarchitecture - Nehalem
sponsored by Intel Corporation
WHITE PAPER:
Read this paper and get a look at how the next generation microarchitecture's dynamically scalable and design-scalable features directly contribute to power efficiency and performance.
Posted: 03 Apr 2009 | Published: 02 Apr 2009
|
|
|
Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 06 May 2021 | Published: 06 May 2021
|
|
|
Addressing Municipal Pain Points with ConnectIV CX and AI
sponsored by Intervision
WHITE PAPER:
AI-powered solutions can help government agencies address key municipal pain points like high call volumes, low citizen satisfaction, and compliance issues. Learn how ConnectIV CX leverages AI to transform these challenges into opportunities for improved service delivery. Read the full white paper.
Posted: 23 Jul 2024 | Published: 24 Jul 2024
|
|
|
Privilege access governance close the gap between privileged access and standard user identities
sponsored by One Identity
WHITE PAPER:
Explore how to unify identity management and provisioning processes, eliminate silos, and simplify compliance with One Identity's Privileged Account Governance. Read the full white paper to learn more.
Posted: 10 Jul 2024 | Published: 10 Jul 2024
|
|
|
A Computer Weekly Buyer's Guide to Wireless Networks
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Mobile devices are increasing the pressure on wireless networks. In this 13-page buyer's guide, learn about the latest developments in wireless networks, the challenges of wireless local area networking, and how to deploy the 802.11ac Wave 2 wireless standard.
Posted: 08 Feb 2021 | Published: 10 Aug 2017
|
|
|
ITSM Problem Management: What Are Your Pain Points?
sponsored by ServiceNow
EGUIDE:
If digital transformation is on your CIO agenda, then a top-of-class ITSM strategy had better be also. In this expert guide, Emily McLaughlin, Content Development Strategist at searchCIO, converses with several notable CIOs who identify their organizations' biggest ITSM pain points, including business-user expectations and risk.
Posted: 08 Feb 2021 | Published: 20 Jun 2016
|
|
|
SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 15 Mar 2021 | Published: 12 Feb 2021
|
|
|
SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 08 Feb 2021 | Published: 24 Aug 2020
|
|
|
SaaS ERP mushrooms during Covid crisis, up to a point
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the migration of business applications to the cloud, under the discipline of the Covid crisis; we examine the question of who is winning the cloud ERP wars; and offer a case study of one large, complex company, Vodafone, that gives a counter example of how cloud still has limits when it comes to ERP.
Posted: 08 Feb 2021 | Published: 18 Sep 2020
|
|
|
DRaas and the key decision points in DR-as-a-service
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.
Posted: 08 Feb 2021 | Published: 25 Jan 2021
|
|
|
Insurance Premium Pricing: Pain Points and Solutions
sponsored by SAS
PRESENTATION TRANSCRIPT:
In this presentation transcript, you’ll learn why automating data extraction systems is crucial for overcoming insurance pricing obstacles. By reducing the reliance on manual processes, insurers can not only improve the accuracy of their data but also minimize operational errors. Read on now to learn more.
Posted: 28 Nov 2024 | Published: 28 Nov 2024
|
|
|
Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER:
Download this report and learn the risks associated with privileged access, and explains how solutions from One Identity mitigate those risks with granular access control and accountability.
Posted: 17 Apr 2024 | Published: 17 Apr 2024
|
|
|
Privileged Access Management
sponsored by One Identity
ANALYST REPORT:
Read this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.
Posted: 17 Apr 2024 | Published: 17 Apr 2024
|
|
|
Privileged Access Management
sponsored by One Identity
ANALYST REPORT:
This Analyst Report provides an overview of the Privileged Access Management (PAM) market, evaluating leading vendors and their solutions. It offers insights into the evolving landscape, focusing on cloud security, identity management, and advanced features. Read the full report to learn how to select the right PAM solution for your organization.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE:
David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
Posted: 08 Feb 2021 | Published: 06 Nov 2019
|
|
|
Getting started with Azure Red Hat OpenShift
sponsored by Red Hat
WHITE PAPER:
As the network perimeter is now everywhere and anywhere users are, security must move with it and needs to be in place at the point of access. Download this e-book to learn how you can secure remote access and build user trust.
Posted: 13 Jun 2024 | Published: 13 Jun 2024
|
|
|
IBM Hybrid Cloud Mesh Product Guide
sponsored by Aliado
WHITE PAPER:
As the network perimeter is everywhere, security must move with it and be in place at the point of access. This e-book explains how to secure remote access and build user trust using IBM Hybrid Cloud Mesh.
Posted: 27 Nov 2024 | Published: 27 Nov 2024
|
|
|
What you need to know about Application Security Observability
sponsored by Contrast Security
INFOGRAPHIC:
As the network perimeter extends everywhere users are, security must move with it and be in place at the point of access. Download this infographic to learn 16 key things about observability and how it can help secure remote access and build user trust.
Posted: 12 Sep 2024 | Published: 12 Sep 2024
|
|
|
Application Security observability
sponsored by Contrast Security
INFOGRAPHIC:
As the network perimeter extends everywhere users are, security must move with it and be in place at the point of access. Download this infographic to learn 16 key things about observability and how it can help secure remote access and build user trust.
Posted: 18 Dec 2024 | Published: 18 Dec 2024
|
|
|
2024 Cyber Security Report
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT:
In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.
Posted: 03 May 2024 | Published: 04 May 2024
|
|
|
Considerations for Implementing Zero Trust for the Workforce
sponsored by Cloudflare
ESG RESEARCH REPORT:
As the network perimeter expands, organizations must move security to the point of access. This Enterprise Strategy Group report explores how zero-trust network access (ZTNA) can help secure remote access, accelerate zero-trust adoption, and enable consistent, seamless user experiences. Download the report to learn more.
Posted: 19 Oct 2024 | Published: 19 Oct 2024
|
|
|
Why Just Securing Human Identities Is Not Enough
sponsored by CyberArk
WEBCAST:
If your business leverages digital technology, then securing human access is not enough - attackers will find the weak point. Don’t let it happen to you! In this session you'll learn why you need to secure both your human and machine identities, as well as the applications and workloads they access. Tune in now to learn more.
Posted: 21 Aug 2024 | Premiered: Aug 21, 2024
|
|
|
Secure Access Growth Opps
sponsored by AT&T and LevelBlue
ANALYST REPORT:
Explore the latest report on Secure Access Service Edge (SASE) from Frost & Sullivan. Uncover key insights into why businesses are opting for Managed Security Service Providers (MSSP) and how a SASE unified cloud-based platform can drive operational efficiency and cost savings.
Posted: 27 Aug 2024 | Published: 28 Aug 2024
|
|
|
Zero Trust Network Access
sponsored by Cloudflare
PRODUCT OVERVIEW:
Zero trust philosophy is now at the core center of many organizations' security strategies, and yet many struggle to find an offering that can effectively deliver on these principles. Cloudflare Zero Trust Network Access (ZTNA) is an all-in-one solution that has helped existing users realize many benefits. Read on to learn more.
Posted: 27 Nov 2024 | Published: 13 Dec 2023
|
|
|
Zero Trust Is Not Enough for Backup
sponsored by Cobalt Iron
WHITE PAPER:
Traditional security approaches like zero-trust may not be enough to protect critical backup environments from modern cyber threats. In this white paper, you'll discover how the Zero Access model in Cobalt Iron Compass can provide advanced cyber resilience to safeguard your backup data. Read the full white paper now to learn more.
Posted: 13 Nov 2024 | Published: 15 Nov 2024
|
|
|
7 types of networks and their use cases
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
A computer network is an interconnected system of devices, represented as network nodes, that share information, data and resources among each other. Not all networks are the same. In this e-guide, learn about the seven most common types of networks, their benefits and use cases.
Posted: 06 Jul 2022 | Published: 06 Jul 2022
|
|