Component Object Request Broker Architecture Reports

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

DataOps: The Missing Link in Your Industrial Data Architecture
sponsored by HighByte
WHITE PAPER: How can your business simplify data contextualization to maximize the value of your technology investments? By leveraging DataOps to define standard models and establish and manage integrations, operational teams can provide data to the systems and business users who are requesting it in a more efficient and managed way. Read on to learn more.
Posted: 26 Oct 2023 | Published: 26 Oct 2023

TOPICS:  .NET
HighByte

Demystifying Initial Access Brokers (IABS) and Their Links to Ransomware
sponsored by Outpost24
WHITE PAPER: This white paper examines the role of Initial Access Brokers in cybercrime, detailing how they obtain and sell corporate network access to ransomware groups. It analyzes access sales on forums, pricing trends, and the relationship between IABs and ransomware operators. Read the full white paper to understand this critical cybersecurity threat.
Posted: 06 Mar 2025 | Published: 06 Mar 2025

Outpost24

Security Service Edge (SSE) Guide for Networking, Infrastructure & Operations: The Six Essentials
sponsored by Netskope
WHITE PAPER: This white paper explores Security Service Edge (SSE), a key part of modern cybersecurity. It covers SSE components, use cases, value for I&O teams, deployment strategies, trends, and selection criteria. Discover how SSE can boost your network security, performance, and efficiency. Read the full paper for detailed insights on implementing SSE.
Posted: 27 Feb 2025 | Published: 28 Feb 2025

Netskope

Atlassian Cloud Architecture And Operational Practices
sponsored by Atlassian
WHITE PAPER: This white paper explores Atlassian's cloud architecture and operational practices, including their use of AWS, availability zones, data backups, and security controls. Read on now to learn how Atlassian ensures tenant separation and data encryption to safeguard customer data in the cloud.
Posted: 24 Oct 2024 | Published: 24 Oct 2024

Atlassian

The Definitive Guide to End-User Computing
sponsored by Nutanix
EGUIDE: Nutanix's hyperconverged infrastructure simplifies end-user computing (EUC) deployments, delivering excellent user experience at scale, faster provisioning, and improved efficiency. Explore Nutanix's flexible EUC solutions, including on-premises, cloud, and hybrid options, in this comprehensive e-book.
Posted: 07 Feb 2025 | Published: 07 Feb 2025

TOPICS:  .NET
Nutanix

The Buyer’s Guide to SASE Use Cases
sponsored by Cloudflare
WHITE PAPER: This guide helps IT leaders navigate SASE implementation, covering key use cases, vendor assessments, and persona-based strategies. It explores initiatives like Zero Trust adoption, network modernization, and data protection. Learn to align SASE with your organization's priorities and evaluate solutions. Read the full Buyer's Guide for insights.
Posted: 11 Mar 2025 | Published: 11 Mar 2025

Cloudflare

HighByte Intelligence Hub version 3.2: A complete UNS and data engineering toolset
sponsored by HighByte
WHITE PAPER: In this white paper, you’ll discover a software solution designed to provide organizations will all the necessary components to build and manage a Unified Namespace (UNS). Read on to learn how you can maximize the value and accessibility of your industrial data.
Posted: 22 Dec 2023 | Published: 22 Dec 2023

TOPICS:  .NET
HighByte

Modern Data Architectures for Dummies
sponsored by Informatica
WHITE PAPER: This guide explores modern data architectures, detailing three patterns: modern data stack, data fabric, and data mesh. Learn how these approaches break down silos, leverage AI for insights, and enable faster decisions. Discover how Informatica's Intelligent Data Management Cloud supports all three with its AI-powered CLAIRE engine.
Posted: 20 Mar 2025 | Published: 20 Mar 2025

Informatica

Computer Weekly – 25 October 2016: 25 years of Linux
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Oct 2016

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to API management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Application programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.
Posted: 08 Nov 2022 | Published: 08 Nov 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to cloud-native architectures
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cloud-native architectures are seen as the future for businesses. In this 16-page buyer's guide, Computer Weekly looks at the influence of DevOps and microservices-based technology, the continued importance of security in containers for software development and the suitability of Microsoft Azure for deploying cloud-native applications
Posted: 08 Feb 2021 | Published: 20 Nov 2018

TechTarget ComputerWeekly.com

Computer Weekly – 10 December 2024: On the road to change at Aston Martin
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Aston Martin's CIO to find out how tech is helping tackle the challenges facing the automotive sector. The new National Cyber Security boss explains the need to be vigilant against growing online threats. We also examine the future of secure remote connectivity in the cloud era. Read the issue now.
Posted: 10 Dec 2024 | Published: 10 Dec 2024

TechTarget ComputerWeekly.com

Computer Weekly – 15 October 2019: Securing the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Oct 2019

TechTarget ComputerWeekly.com

SASE Success Starts Here: The 6 SD-WAN Evaluation Factors
sponsored by Open Systems
WHITE PAPER: Explore the 6 key factors to consider when evaluating a managed SASE SD-WAN provider. This guide covers network, security, technology, setup, operations, and organizational implications to help you select the right SASE solution for your business objectives. Read the full white paper to get started.
Posted: 19 Feb 2025 | Published: 19 Feb 2025

All resources sponsored by Open Systems

Jargon buster guide to hybrid cloud storage
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this Jargon Buster guide we bring you definitions for the key concepts in hybrid cloud storage plus in-depth articles on hybrid cloud file and object storage, how to use the cloud as a storage tier and the key decision points when it comes to private cloud vs hybrid cloud.
Posted: 08 Feb 2021 | Published: 24 Jul 2018

TechTarget ComputerWeekly.com

Learn New Techniques For Preventing Data Loss In The Cloud
sponsored by Symantec & Blue Coat Systems
EGUIDE: This e-guide outlines the risks the cloud exposes modern enterprises to, and explores new options in cloud security like third-party cloud access security brokers (CASBs). Learn about several tools available that can let CIOs gain the visibility to prioritize cloud apps based on their security risk, and more.
Posted: 08 Feb 2021 | Published: 04 Nov 2016

Symantec & Blue Coat Systems

Deliver Applications Efficiently
sponsored by Red Hat
EBOOK: As applications grow complex, development teams face challenges in managing tools, processes, and security. This e-book shows how internal developer platforms streamline workflows, boost productivity, and enhance security. Discover how Red Hat's Developer Hub and Trusted Software Supply Chain optimize development. Read for efficiency insights.
Posted: 27 Feb 2025 | Published: 27 Feb 2025

Red Hat

Top 10 storage stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Computer Weekly's storage content decodes trends and offers practical and technical advice. So, looking at the key storage stories of 2019, we see all the main developments reflected.
Posted: 08 Feb 2021 | Published: 28 Jan 2020

TechTarget ComputerWeekly.com

Deliver Applications Efficiently
sponsored by Red Hat
WHITE PAPER: This white paper examines improving developer productivity amid complex applications. It addresses fragmented development challenges and presents platform engineering as a solution. Discover how Red Hat's Developer Hub and Trusted Software Supply Chain streamline development and enhance security. Read the full paper for optimization insights.
Posted: 25 Feb 2025 | Published: 26 Feb 2025

Red Hat

NAS meets cloud and unstructured data challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.
Posted: 08 Feb 2021 | Published: 11 Jan 2019

TechTarget ComputerWeekly.com

The ultimate SASE buying guide key considerations for today’s buying teams
sponsored by Windstream Enterprise
EBOOK: This detailed SASE buying guide outlines key considerations for today's buying teams, including SASE components, market trends, benefits and the purchasing process. Learn how SASE can secure your network and workforce. Read the full guide.
Posted: 27 Jun 2024 | Published: 01 Jul 2024

Windstream Enterprise

A Computer Weekly buyer's guide to Threat Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 08 Feb 2021 | Published: 05 Apr 2019

TechTarget ComputerWeekly.com

A Computer Weekly Buyer's Guide to Containers and Microservices
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at how the architectures are configured, the suppliers building them – and the benefits to the organisation using them.
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

The Definitive Guide To Container Security
sponsored by Palo Alto Networks
EBOOK: Securing container environments requires understanding tools and policies for protecting infrastructure, applications, and components. This guide explores container security across the lifecycle, from build to runtime, and offers a roadmap to prepare your environment and secure your containers. Read the full e-book to learn more.
Posted: 10 Dec 2024 | Published: 11 Dec 2024

Palo Alto Networks

Breaking Down JSON Web Tokens
sponsored by FusionAuth
EBOOK: This eBook explores JSON Web Tokens (JWTs), detailing their structure, security, and best practices. Learn about JWT components, revocation strategies, and performance. Discover when and how to use JWTs in authentication systems. Read this eBook to deepen your understanding of this powerful token format.
Posted: 14 Mar 2025 | Published: 15 Mar 2025

FusionAuth