Using Oracle BI with Oracle E-Business Suite
sponsored by Noetix Corporation
WEBCAST:
This webcast gives an overview of the Oracle E-Business Suite and demonstrates how to integrate Oracle BI suite with the Oracle EBS using Noetix software offerings.
Posted: 18 Aug 2008 | Premiered: Aug 18, 2008
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER:
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Google Workspace CMMC Level 2 Conguration Guide
sponsored by Google Workspace
EBOOK:
This guide provides instructions for configuring Google Workspace to meet CMMC Level 2 requirements. It covers security controls, implementation steps, and best practices for protecting CUI in cloud environments. Learn to leverage Google Workspace features to enhance cybersecurity and achieve compliance. Read the full eBook for guidance.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
The great IAM - time to modernise?
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?
Posted: 08 Feb 2021 | Published: 05 Apr 2019
|
|
|
DataOps: The Missing Link in Your Industrial Data Architecture
sponsored by HighByte
WHITE PAPER:
How can your business simplify data contextualization to maximize the value of your technology investments? By leveraging DataOps to define standard models and establish and manage integrations, operational teams can provide data to the systems and business users who are requesting it in a more efficient and managed way. Read on to learn more.
Posted: 26 Oct 2023 | Published: 26 Oct 2023
|
|
|
Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019
|
|
|
Powerful, Application-aware Investigation Tools.
sponsored by Endace
DATA SHEET:
When you’re investigating a security incident, you want to eliminate any guesswork. EndaceVision, a browser-based investigation GUI, can help you do so. Learn all about the product in this data sheet.
Posted: 28 Mar 2023 | Published: 28 Mar 2023
|
|
|
Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018
|
|
|
Cloudflare Security Brief
sponsored by Cloudflare
EBOOK:
Take a deep look at the most important trends shaping the cyber threat landscape today: AI, vulnerability exploitation, DDoS attacks, phishing, and Zero Trust. Based on the extensive data from Cloudflare’s cloud network, this security brief highlights key trends. Access the brief to learn more.
Posted: 19 Sep 2024 | Published: 19 Sep 2024
|
|
|
FlexPod with All-Flash SAN Array: Availability & Integrity with NetApp ASA
sponsored by Arrow NetApp
PRODUCT OVERVIEW:
This report examines the design and implementation of a FlexPod data center solution with NetApp's All-Flash SAN Array. It offers six-nines availability, data integrity, and optimized performance for critical workloads. Learn how this pre-validated infrastructure ensures seamless storage failover and enhanced reliability.
Posted: 20 Mar 2025 | Published: 20 Mar 2025
|
|
|
Bonding, slicing, and zero trust in a 5G world
sponsored by Ericsson
WHITE PAPER:
As enterprise networks evolve with 5G and hybrid work, SD-WAN must adapt to increase resiliency, security, and simplicity. Discover how modern SD-WAN solutions can optimize cellular connectivity, leverage zero trust principles, and integrate with SASE to enhance network performance. Read the white paper to learn more.
Posted: 24 Mar 2025 | Published: 19 Dec 2024
|
|
|
Simplify desktop management and reduce costs by up to 40%
sponsored by DellEMC and Intel®
EGUIDE:
This white paper goes over what organizations have to gain - and lose - from virtual desktop technology.
Posted: 08 Feb 2021 | Published: 27 Dec 2012
|
|
|
8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023
|
|
|
Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018
|
|
|
How To Combat Modern Cyber Threats
sponsored by Dell Technologies and Intel
EBOOK:
Emerging attack vectors are creating new risk. Stay ahead of modern endpoint threats with multiple layers of defense that work together. Learn how hardware telemetry can integrate with software to improve fleet-wide security and manageability.
Posted: 26 Feb 2025 | Published: 21 Feb 2025
|
|
|
How To Combat Modern Cyber Threats
sponsored by Dell Technologies and Intel
EBOOK:
Emerging attack vectors are creating new risk. Stay ahead of modern endpoint threats with multiple layers of defense that work together. Learn how hardware telemetry can integrate with software to improve fleet-wide security and manageability.
Posted: 13 Mar 2025 | Published: 13 Mar 2025
|
|
|
How To Combat Modern Cyber Threats
sponsored by Dell Technologies and Intel
EBOOK:
Emerging attack vectors are creating new risk. Stay ahead of modern endpoint threats with multiple layers of defense that work together. Learn how hardware telemetry can integrate with software to improve fleet-wide security and manageability.
Posted: 21 Feb 2025 | Published: 21 Feb 2025
|
|
|
2024 Comcast Business Cybersecurity Threat Report
sponsored by Comcast Business
RESEARCH CONTENT:
Combining publicly available data with the 29 billion cybersecurity events Comcast Business detected across their base of security customers in 2023, this report provides a wide-angle view of the global threat landscape. Read now to learn more.
Posted: 19 Nov 2024 | Published: 19 Nov 2024
|
|
|
Essential Guide: Securing hybrid IT infrastructure
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
Posted: 08 Feb 2021 | Published: 16 Nov 2017
|
|
|
Top Cybersecurity Threat Detections With Splunk And MITRE ATT&CK
sponsored by Splunk
EBOOK:
Organizations can combat cyber threats by aligning MITRE ATT&CK with Splunk’s Analytic Stories. The guide details tactics like reconnaissance and lateral movement, offering Splunk searches and playbooks for detection. Teams can then investigate and remediate. Access the full paper for pre-built detections and enhanced defense insights.
Posted: 10 Feb 2024 | Published: 10 Feb 2024
|
|
|
Using digital twins to cut costs and improve safety at Shell
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.
Posted: 08 Feb 2021 | Published: 10 Nov 2020
|
|
|
The future of API management: Key trends for IT leaders
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
As enterprises accelerate digital transformation, API management has become increasingly complex. IT leaders must navigate an evolving landscape where efficiency, security, and modernisation intersect. This e-guide explores API management trends, including the challenges of API security, and the impact of genAI.
Posted: 20 Mar 2025 | Published: 20 Mar 2025
|
|
|
10 Essential Use Cases for Attack Surface Management
sponsored by Palo Alto Networks
EBOOK:
Discover 10 essential use cases for attack surface management to secure your complex, evolving attack surface. Learn how Cortex Xpanse can help you prevent ransomware, eliminate shadow IT, respond to zero-days, and more. Read the full e-book to take a proactive approach to attack surface management.
Posted: 11 Dec 2024 | Published: 11 Dec 2024
|
|
|
Rapid and Accurate Isolation of Issues in Modern Networks: Key Challenges and Critical Requirements
sponsored by BROADCOM, Inc
WHITE PAPER:
Modern networks require a unified data model, advanced analytics, and intelligent triage workflows to rapidly isolate issues. This white paper explores the key challenges and critical requirements for managing complex networks. Read the full white paper to learn more.
Posted: 05 Feb 2025 | Published: 05 Feb 2025
|
|
|
Bastille Threat Research: Insider Threat
sponsored by Bastille
WHITE PAPER:
Insider threats can exploit wireless devices to infiltrate corporate networks. This white paper explores real-world case studies and best practices to secure your wireless environment and mitigate insider risks. Read the full white paper to learn how to protect your organization.
Posted: 19 Feb 2025 | Published: 20 Feb 2025
|
|
|
CDN Buyer’s Guide
sponsored by Fastly
BUYER'S GUIDE:
Many CDNs offer the same types of services, but they're not all the same. This Buyer’s Guide can help you distinguish the best from the rest. Download it now to explore the key factors to consider when selecting a CDN, essential questions to ask to ensure you get the most out of your CDN, and more.
Posted: 03 Oct 2024 | Published: 03 Oct 2024
|
|
|
A network automation roadmap to reap tech's best benefits
sponsored by TechTarget Networking
EBOOK:
A network automation roadmap can help guide organizations through the Wild West of modern networking in order to reap benefits that automation can bring to employees, customers and partners. Reducing labor-intensive tasks does entail changing a network engineer's work, though.
Posted: 09 Sep 2021 | Published: 06 Sep 2021
|
|