Common Object Request Broker Architecture Reports

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Object Storage Architecture: Mitigating Complexity, Capacity, and Archival Concerns
sponsored by HGST
EGUIDE: This expert resource serves as your full guide to object storage implementation, with cloud workload, sync-and-share, API-accessible storage, and more use cases examined. Download now to gain full access, learning how object storage maintains the unstructured data deluge, and view an object vs. file vs. block storage bake off.
Posted: 08 Feb 2021 | Published: 12 Jun 2017

HGST

Object Storage 101
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.
Posted: 08 Feb 2021 | Published: 07 Feb 2017

TechTarget ComputerWeekly.com

Demystifying Initial Access Brokers (IABS) and Their Links to Ransomware
sponsored by Outpost24
WHITE PAPER: This white paper examines the role of Initial Access Brokers in cybercrime, detailing how they obtain and sell corporate network access to ransomware groups. It analyzes access sales on forums, pricing trends, and the relationship between IABs and ransomware operators. Read the full white paper to understand this critical cybersecurity threat.
Posted: 06 Mar 2025 | Published: 06 Mar 2025

Outpost24

Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to cloud-native architectures
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cloud-native architectures are seen as the future for businesses. In this 16-page buyer's guide, Computer Weekly looks at the influence of DevOps and microservices-based technology, the continued importance of security in containers for software development and the suitability of Microsoft Azure for deploying cloud-native applications
Posted: 08 Feb 2021 | Published: 20 Nov 2018

TechTarget ComputerWeekly.com

Accelerating your Database Modernization journey with Deloitte on AWS
sponsored by Amazon Web Services
EBOOK: Unfortunately, the requested content appears to be unavailable. The server returned a 404 Not Found error for the URL. This may indicate that the white paper on AWS Database Modernization has been moved or removed. For the most up-to-date information on AWS database solutions, read the full white paper if it becomes available again.
Posted: 06 Mar 2025 | Published: 06 Mar 2025

Amazon Web Services

Atlassian Cloud Architecture And Operational Practices
sponsored by Atlassian
WHITE PAPER: This white paper explores Atlassian's cloud architecture and operational practices, including their use of AWS, availability zones, data backups, and security controls. Read on now to learn how Atlassian ensures tenant separation and data encryption to safeguard customer data in the cloud.
Posted: 24 Oct 2024 | Published: 24 Oct 2024

Atlassian

Computer Weekly – 25 October 2016: 25 years of Linux
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Oct 2016

TechTarget ComputerWeekly.com

Computer Weekly – 15 October 2019: Securing the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Oct 2019

TechTarget ComputerWeekly.com

Modern Data Architectures for Dummies
sponsored by Informatica
WHITE PAPER: This guide explores modern data architectures, detailing three patterns: modern data stack, data fabric, and data mesh. Learn how these approaches break down silos, leverage AI for insights, and enable faster decisions. Discover how Informatica's Intelligent Data Management Cloud supports all three with its AI-powered CLAIRE engine.
Posted: 20 Mar 2025 | Published: 20 Mar 2025

Informatica

Object storage: A great fit for large, unstructured data sets
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Object storage is a rising star. In this e-guide we walk you through the key differences between object storage and the currently more mainstream approaches - file and block access. In doing so you'll clearly see the benefits and drawbacks of the object approach, which is to organise data in a flat structure with unique identifiers.
Posted: 08 Feb 2021 | Published: 12 Nov 2018

TechTarget ComputerWeekly.com

Computer Weekly – 10 December 2024: On the road to change at Aston Martin
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Aston Martin's CIO to find out how tech is helping tackle the challenges facing the automotive sector. The new National Cyber Security boss explains the need to be vigilant against growing online threats. We also examine the future of secure remote connectivity in the cloud era. Read the issue now.
Posted: 10 Dec 2024 | Published: 10 Dec 2024

TechTarget ComputerWeekly.com

CW APAC, February 2020: Expert Advice: Container Storage
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on storage in the Asia-Pacific region, Computer Weekly looks at how container applications can make companies more agile, the cost benefits of data storage and the most common data storage myths that need to be debunked.
Posted: 08 Feb 2021 | Published: 13 Feb 2020

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to API management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Application programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.
Posted: 08 Nov 2022 | Published: 08 Nov 2022

TechTarget ComputerWeekly.com

Jargon buster guide to hybrid cloud storage
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this Jargon Buster guide we bring you definitions for the key concepts in hybrid cloud storage plus in-depth articles on hybrid cloud file and object storage, how to use the cloud as a storage tier and the key decision points when it comes to private cloud vs hybrid cloud.
Posted: 08 Feb 2021 | Published: 24 Jul 2018

TechTarget ComputerWeekly.com

SASE Success Starts Here: The 6 SD-WAN Evaluation Factors
sponsored by Open Systems
WHITE PAPER: Explore the 6 key factors to consider when evaluating a managed SASE SD-WAN provider. This guide covers network, security, technology, setup, operations, and organizational implications to help you select the right SASE solution for your business objectives. Read the full white paper to get started.
Posted: 19 Feb 2025 | Published: 19 Feb 2025

All resources sponsored by Open Systems

Unlock On-Demand, Cost-Optimized Performance With Amazon Elasticache Serverless
sponsored by Amazon Web Services
BLOG: Amazon ElastiCache Serverless offers easy setup, automatic scaling, and pay-per-use pricing for Redis-compatible caching. This post compares serverless to node-based options for various workloads. Learn to evaluate data storage and request costs to optimize your caching strategy. Read the full blog for examples and pricing details.
Posted: 06 Mar 2025 | Published: 06 Mar 2025

Amazon Web Services

NAS meets cloud and unstructured data challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.
Posted: 08 Feb 2021 | Published: 11 Jan 2019

TechTarget ComputerWeekly.com

Top 10 storage stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Computer Weekly's storage content decodes trends and offers practical and technical advice. So, looking at the key storage stories of 2019, we see all the main developments reflected.
Posted: 08 Feb 2021 | Published: 28 Jan 2020

TechTarget ComputerWeekly.com

Using digital twins to cut costs and improve safety at Shell
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.
Posted: 08 Feb 2021 | Published: 10 Nov 2020

TechTarget ComputerWeekly.com

Security Service Edge (SSE) Guide for Networking, Infrastructure & Operations: The Six Essentials
sponsored by Netskope
WHITE PAPER: This white paper explores Security Service Edge (SSE), a key part of modern cybersecurity. It covers SSE components, use cases, value for I&O teams, deployment strategies, trends, and selection criteria. Discover how SSE can boost your network security, performance, and efficiency. Read the full paper for detailed insights on implementing SSE.
Posted: 27 Feb 2025 | Published: 28 Feb 2025

Netskope

The Total Economic Impact ™ Of Atlassian Jira Service Management
sponsored by Atlassian
ANALYST REPORT: Download the following Forrester Research report to gain an in-depth economic evaluation of Atlassian Jira Service Management. The results of Atlassian users include a 10% reduction in service requests and savings of 115 hours monthly.
Posted: 10 Mar 2023 | Published: 10 Mar 2023

TOPICS:  .NET
Atlassian

Your Hybrid Infrastructure Is Under Attack
sponsored by Palo Alto Networks
WHITE PAPER: In a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.
Posted: 15 Mar 2021 | Published: 10 Nov 2020

Palo Alto Networks

GRIT 2025 Ransomware & Cyber Threat Report
sponsored by GuidePoint Security
RESEARCH CONTENT: This comprehensive report analyzes the evolving ransomware and cybercrime threat landscape in 2024. It covers key trends, industry impacts, vulnerability analysis, and case studies. Learn how to improve post-compromise detection and stay ahead of these persistent threats. Read the full report.
Posted: 23 Jan 2025 | Published: 24 Jan 2025

GuidePoint Security

10 prompt engineering tips and best practices
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Generative AI is finally coming into its own as a tool for research, learning, creativity and interaction. Asking the right questions is key to using generative AI effectively. Learn 10 tips for writing clear, useful prompts, including mistakes to avoid and advice for image generation.
Posted: 05 Nov 2023 | Published: 06 Nov 2023

TechTarget ComputerWeekly.com