Using Oracle BI with Oracle E-Business Suite
sponsored by Noetix Corporation
WEBCAST:
This webcast gives an overview of the Oracle E-Business Suite and demonstrates how to integrate Oracle BI suite with the Oracle EBS using Noetix software offerings.
Posted: 18 Aug 2008 | Premiered: Aug 18, 2008
|
|
|
The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER:
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Demystifying Initial Access Brokers (IABS) and Their Links to Ransomware
sponsored by Outpost24
WHITE PAPER:
This white paper examines the role of Initial Access Brokers in cybercrime, detailing how they obtain and sell corporate network access to ransomware groups. It analyzes access sales on forums, pricing trends, and the relationship between IABs and ransomware operators. Read the full white paper to understand this critical cybersecurity threat.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019
|
|
|
Understanding Gmail And Yahoo’s New Standards For Senders
sponsored by Sinch
WHITE PAPER:
Gmail and Yahoo are changing email-sending requirements in 2024. Learn how to ensure your domain settings, unsubscribe links, and spam rates align with the new protocols to avoid getting blocked from major inboxes. Access the guide to understand the remediation steps.
Posted: 29 May 2024 | Published: 29 May 2024
|
|
|
Balancing Requirements for Application Protection
sponsored by Human Security
ESG THOUGHT LEADERSHIP EBOOK:
This Enterprise Strategy Group eBook examines how evolving web application environments have increased security challenges. It explores trends in DDoS, bot, and API attacks, and the need for consolidated web application protection. Read the eBook to learn how to better secure your web applications and APIs.
Posted: 05 Feb 2025 | Published: 06 Feb 2025
|
|
|
DataOps: The Missing Link in Your Industrial Data Architecture
sponsored by HighByte
WHITE PAPER:
How can your business simplify data contextualization to maximize the value of your technology investments? By leveraging DataOps to define standard models and establish and manage integrations, operational teams can provide data to the systems and business users who are requesting it in a more efficient and managed way. Read on to learn more.
Posted: 26 Oct 2023 | Published: 26 Oct 2023
|
|
|
CW ANZ: Fix the weak links
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jul 2018
|
|
|
The Industrial CISO: Bringing Balance
sponsored by Netskope
EBOOK:
This report explores the evolving role of CISOs in the industrial sector, revealing their growing confidence as business enablers despite perception challenges from C-suite peers. It examines the adoption of zero trust principles and the need for CISOs to focus on business enablement over technology. Read the full eBook for deeper insights.
Posted: 27 Feb 2025 | Published: 28 Feb 2025
|
|
|
Top Methods To Modernize and Balance Your Infrastructure
sponsored by Service Express
EBOOK:
According to the latest State of the Data Center Report, 83% of respondents are repatriating workloads from the cloud back to on-premises data centers and colocations, with a close eye on evaluating costs. Discover how to strike a balance between cloud and DC investments by downloading this e-book.
Posted: 02 Feb 2024 | Published: 02 Feb 2024
|
|
|
Privileged Access Management
sponsored by One Identity
ANALYST REPORT:
Read this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.
Posted: 17 Apr 2024 | Published: 17 Apr 2024
|
|
|
Access, Risk and the Modern Workforce
sponsored by CyberArk
RESEARCH CONTENT:
This e-book explores insights into prevalent employee behaviors and data access patterns drawn from a survey of 14,003 employees across the UK, USA, France, Germany, Australia, and Singapore. Read on now to discover how its findings underscore the need to rethink how you protect the workforce.
Posted: 18 Dec 2024 | Published: 18 Dec 2024
|
|
|
Balancing Innovation and Security in Financial Services: Three Keys for Success
sponsored by SmartBear Software
EBOOK:
Financial institutions must balance mobile innovation with data security and compliance to meet customer expectations. This e-book explores strategies: delivering real-time personalized experiences, maintaining on-premises data control, and implementing compliance automation. Discover how to create secure, innovative banking experiences.
Posted: 25 Mar 2025 | Published: 25 Mar 2025
|
|
|
How virtual desktops simplify end user computing during lockdown
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.
Posted: 15 Mar 2021 | Published: 19 Feb 2021
|
|
|
CW Benelux - November 2021-January 2022: Dutch IT company rips up the HR rule book for better work-life balance
sponsored by TechTarget ComputerWeekly.com
EZINE:
One Dutch tech firm has used learnings from the pandemic to rip up its HR rule book and implement an official work-from-home policy. In fact, Infolearn has gone further than hybrid working, with a personal mobility budget for staff and a four-day working week.
Posted: 20 Oct 2021 | Published: 11 Nov 2021
|
|
|
Balancing innovation, safety, compliance, and risk in life sciences
sponsored by XtelligentMedia Healthcare
EGUIDE:
The life sciences sector is evolving rapidly, collaboration, compliance, and proactive risk management are key to patient safety.
Posted: 11 Jun 2024 | Published: 11 Jun 2024
|
|
|
Supply chain management balance shifts from efficiency to resilience under Covid
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide explores these matters, beginning with a comprehensive article that ranges over supply chain management, from a macro level through how trading platforms have been flexed to switch suppliers rapidly down to how robots have been quickly deployed to solve problems of scale.
Posted: 08 Feb 2021 | Published: 22 Sep 2020
|
|
|
Why CIAM?
sponsored by Okta
WHITE PAPER:
This white paper explores how customer identity and access management (CIAM) can help organizations balance convenience, privacy, and security across digital channels. Learn how CIAM can catalyze growth, increase developer efficiency, and reduce compliance costs. Read the full white paper to discover the business benefits of CIAM.
Posted: 07 Feb 2025 | Published: 08 Feb 2025
|
|
|
The ultimate guide to identity & access management
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
Posted: 22 Jan 2023 | Published: 23 Jan 2023
|
|
|
The Ultimate Buyer’s Guide For Secure Access Solutions
sponsored by Claroty
BUYER'S GUIDE:
Cyber-Physical Systems (CPS) form the foundation of many critical infrastructure sectors. This guide helps ensure you are choosing the right vendor to meet your unique needs by examining the CPS cybersecurity landscape, criteria to consider when looking for a secure remote access solution, key outcomes of secure access, and more.
Posted: 27 Mar 2025 | Published: 27 Mar 2025
|
|
|
Google Workspace CMMC Level 2 Conguration Guide
sponsored by Google Workspace
EBOOK:
This guide provides instructions for configuring Google Workspace to meet CMMC Level 2 requirements. It covers security controls, implementation steps, and best practices for protecting CUI in cloud environments. Learn to leverage Google Workspace features to enhance cybersecurity and achieve compliance. Read the full eBook for guidance.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
10 Best Practices For Msps Supporting High-Performing Hybrid Workplaces
sponsored by NCP Engineering Inc
WHITE PAPER:
This white paper outlines 10 best practices for MSPs supporting hybrid workplaces, including multi-tenancy solutions, "Always On" connectivity, MFA strategies, and centralized management. Learn how the right VPN can enhance security, improve efficiency, and provide seamless access. Discover strategic benefits for your MSP business.
Posted: 20 Mar 2025 | Published: 20 Mar 2025
|
|
|
8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023
|
|
|
Zero Trust Access For Dummies, 3rd Fortinet Special Edition
sponsored by Fortinet, Inc.
EBOOK:
In this eBook, you’ll learn all about Zero Trust Network Access (ZTNA) technology and the strategy for securing users’ remote access. After reading “Zero Trust Access For Dummies,” you will know how to control what devices connect to your network and applications – and much more.
Posted: 18 Oct 2024 | Published: 02 Oct 2024
|
|
|
CW ASEAN November 2016
sponsored by TechTarget Security
EZINE:
Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
Posted: 08 Feb 2021 | Published: 31 Oct 2016
|
|
|
Bastille Threat Research: Insider Threat
sponsored by Bastille
WHITE PAPER:
Insider threats can exploit wireless devices to infiltrate corporate networks. This white paper explores real-world case studies and best practices to secure your wireless environment and mitigate insider risks. Read the full white paper to learn how to protect your organization.
Posted: 19 Feb 2025 | Published: 20 Feb 2025
|
|
|
SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 15 Mar 2021 | Published: 12 Feb 2021
|
|