DOS Protected Mode Interface Reports

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

A Computer Weekly buyer's guide to API management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Application programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.
Posted: 08 Nov 2022 | Published: 08 Nov 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to next-generation programming tools
sponsored by TechTarget ComputerWeekly.com
EGUIDE: All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.
Posted: 08 Feb 2021 | Published: 27 Nov 2019

TechTarget ComputerWeekly.com

10 Best Practices to Improve Recovery Objectives
sponsored by Veeam Software
WHITE PAPER: Recovery objectives are the foundational metric for building your disaster recovery strategy. Building your backup and recovery strategy based on your recovery objectives can provide you with confidence that when disaster hits, you are ready to recover with minimal data loss and impact on business processes and protect your business’s brand.
Posted: 21 Oct 2024 | Published: 22 Oct 2024

TOPICS:  .NET
Veeam Software

Fraud management: A perennial business issue
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
Posted: 06 Jul 2021 | Published: 06 Jul 2021

TechTarget ComputerWeekly.com

Application Delivery Network Buyers' Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 15 Mar 2021 | Published: 18 Feb 2021

TechTarget ComputerWeekly.com

Cloud Native Application Protection Platforms
sponsored by Palo Alto Networks
EBOOK: This e-book explores cloud native application protection platforms (CNAPPs) and how they enable collaborative security across development, DevOps, and security teams. Learn how CNAPPs provide a holistic approach to securing cloud native applications from code to cloud. Discover the foundations of comprehensive cloud security.
Posted: 20 Dec 2024 | Published: 21 Dec 2024

Palo Alto Networks

Comprehensive Web Protection: Leveraging AWS WAF and Partner Solutions
sponsored by AWS & Cequence
ESG SHOWCASE: As application architectures become more distributed, web application security has become more challenging. This white paper explores how AWS WAF and its partner ecosystem can provide comprehensive protection against evolving threats like API attacks and bot-driven fraud. Read the full white paper to learn more.
Posted: 12 Feb 2025 | Published: 12 Feb 2025

AWS & Cequence

Comprehensive Web Protection: Leveraging AWS WAF and Partner Solutions
sponsored by AWS & Cyber Security Cloud
ESG SHOWCASE: As web applications become more critical, securing them has become more challenging. Learn how AWS WAF and partner solutions can provide comprehensive web protection against evolving threats like bot attacks and API vulnerabilities. Read the full white paper.
Posted: 21 Feb 2025 | Published: 21 Feb 2025

AWS & Cyber Security Cloud

Comprehensive Web Protection: Leveraging AWS WAF and Partner Solutions
sponsored by AWS Coralogix
ESG SHOWCASE: As web applications face increasing threats, security teams need comprehensive protection that is efficient and effective. This showcase explores how AWS WAF, enhanced by a robust partner ecosystem, can help secure web applications and APIs against a variety of attacks. Read the full showcase to learn more.
Posted: 12 Feb 2025 | Published: 12 Feb 2025

AWS Coralogix

Contact Center Buyer’s Guide
sponsored by 8x8, Inc.
EBOOK: In the modern business world, contact centers play a critical role in the customer experience. However, outdated legacy systems can have you running into some challenges. So, how can you meet service expectations while providing a better experience for all? Access this guide to learn more.
Posted: 05 Apr 2023 | Published: 05 Apr 2023

TOPICS:  .NET
8x8, Inc.

The Modern Guide To OAuth
sponsored by FusionAuth
EBOOK: This guide explores OAuth 2.0 implementation, covering authorization modes, grants, and real-world uses. It provides code examples and insights into secure authentication workflows for web and mobile apps. Learn to handle tokens, refresh access, and implement device authorization. Read this e-book to master OAuth and build secure applications.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

FusionAuth

The Value of Runtime Application with Self-Protection
sponsored by Contrast Security
PRODUCT OVERVIEW: Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

The Value of Runtime Application with Self-Protection
sponsored by Contrast Security
PRODUCT OVERVIEW: Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.
Posted: 09 Jul 2024 | Published: 09 Jul 2024

Contrast Security

Comprehensive Web Protection: Leveraging AWS WAF and Partner Solutions
sponsored by AWS & F5
ESG SHOWCASE: As applications become more distributed and API-reliant, securing them grows complex. AWS WAF offers core protections, while its partner ecosystem provides advanced observability, API security, and bot mitigation. This flexible approach helps balance efficiency and effectiveness in web protection. Read the white paper for more strategies.
Posted: 06 Mar 2025 | Published: 06 Mar 2025

AWS & F5

Managing Android devices in the enterprise
sponsored by TechTarget ComputerWeekly.com
EBOOK: This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
Posted: 08 Feb 2021 | Published: 04 Aug 2016

TechTarget ComputerWeekly.com

ADP Global Payroll: protecting your data as your business grows (IN)
sponsored by ADP
EBOOK: When expanding your organization overseas, it is critical to ensure that your data security is up to date, especially when it comes to your employees’ personal and payroll information. To do so, many have turned to payroll partners who can provide them with the tools and support they need. Browse this guide to learn more.
Posted: 06 Feb 2024 | Published: 06 Feb 2024

TOPICS:  .NET
ADP

Computer Weekly – 4 October 2022: Putting APIs to work
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.
Posted: 30 Sep 2022 | Published: 04 Oct 2022

TechTarget ComputerWeekly.com

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

Modernizing Your Infrastructure with Red Hat OpenShift & Protecting Your Kubernetes Data
sponsored by Red Hat
WHITE PAPER: This white paper explores how Red Hat OpenShift and Veeam Kasten modernize infrastructure and protect Kubernetes data. It covers containerization, orchestration, data protection challenges, and enterprise-grade solutions for multi-cloud environments. Learn how to enhance your Kubernetes data resilience and application mobility.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

Red Hat

Atlassian Cloud Data Protection
sponsored by Atlassian
EBOOK: In most industries, the most important asset to an organization is data. The problem is that data is becoming more challenging to protect and secure, and this is no different in the cloud. If your data isn’t protected correctly, the cost of a breach can take down an entire organization. So, what are the challenges? Read on to find out more.
Posted: 22 Aug 2023 | Published: 22 Aug 2023

TOPICS:  .NET
Atlassian

ADP Global Payroll: protecting your data as your business grows (AU)
sponsored by ADP
EBOOK: When expanding your organization overseas, it is critical to ensure that your data security is up to date, especially when it comes to your employees’ personal and payroll information. To do so, many have turned to payroll partners who can provide them with the tools and support they need. Browse this guide to learn more.
Posted: 08 Feb 2024 | Published: 08 Feb 2024

TOPICS:  .NET
ADP

ADP Global Payroll: protecting your data as your business grows (PH)
sponsored by ADP
EBOOK: When expanding your organization overseas, it is critical to ensure that your data security is up to date, especially when it comes to your employees’ personal and payroll information. To do so, many have turned to payroll partners who can provide them with the tools and support they need. Browse this guide to learn more.
Posted: 06 Feb 2024 | Published: 06 Feb 2024

TOPICS:  .NET
ADP

ADP Global Payroll: protecting your data as your business grows (SG)
sponsored by ADP
EBOOK: When expanding your organization overseas, it is critical to ensure that your data security is up to date, especially when it comes to your employees’ personal and payroll information. To do so, many have turned to payroll partners who can provide them with the tools and support they need. Browse this guide to learn more.
Posted: 08 Feb 2024 | Published: 08 Feb 2024

TOPICS:  .NET
ADP

ADP Global Payroll: protecting your data as your business grows (HK)
sponsored by ADP
EBOOK: When expanding your organization overseas, it is critical to ensure that your data security is up to date, especially when it comes to your employees’ personal and payroll information. To do so, many have turned to payroll partners who can provide them with the tools and support they need. Browse this guide to learn more.
Posted: 06 Feb 2024 | Published: 06 Feb 2024

TOPICS:  .NET
ADP

Learn New Techniques For Preventing Data Loss In The Cloud
sponsored by Symantec & Blue Coat Systems
EGUIDE: This e-guide outlines the risks the cloud exposes modern enterprises to, and explores new options in cloud security like third-party cloud access security brokers (CASBs). Learn about several tools available that can let CIOs gain the visibility to prioritize cloud apps based on their security risk, and more.
Posted: 08 Feb 2021 | Published: 04 Nov 2016

Symantec & Blue Coat Systems