Using Oracle BI with Oracle E-Business Suite
sponsored by Noetix Corporation
WEBCAST:
This webcast gives an overview of the Oracle E-Business Suite and demonstrates how to integrate Oracle BI suite with the Oracle EBS using Noetix software offerings.
Posted: 18 Aug 2008 | Premiered: Aug 18, 2008
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER:
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
FlexPod with All-Flash SAN Array: Availability & Integrity with NetApp ASA
sponsored by Arrow NetApp
PRODUCT OVERVIEW:
This report examines the design and implementation of a FlexPod data center solution with NetApp's All-Flash SAN Array. It offers six-nines availability, data integrity, and optimized performance for critical workloads. Learn how this pre-validated infrastructure ensures seamless storage failover and enhanced reliability.
Posted: 20 Mar 2025 | Published: 20 Mar 2025
|
|
|
Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018
|
|
|
Nvidia AI Structured Cabling Reference Architecture
sponsored by Panduit
WHITE PAPER:
This guide offers a step-by-step approach for NVIDIA AI infrastructures, detailing how to choose transceivers, enclosure systems, and connectivity components for high-performance networks. Read this white paper to learn best practices for implementing standardized, future-proof cabling that supports high-fiber densities in AI data centers.
Posted: 17 Mar 2025 | Published: 18 Mar 2025
|
|
|
2024 Comcast Business Cybersecurity Threat Report
sponsored by Comcast Business
RESEARCH CONTENT:
Combining publicly available data with the 29 billion cybersecurity events Comcast Business detected across their base of security customers in 2023, this report provides a wide-angle view of the global threat landscape. Read now to learn more.
Posted: 19 Nov 2024 | Published: 19 Nov 2024
|
|
|
Impact of Structured Cabling on AI Network Performance
sponsored by Panduit
WHITE PAPER:
This white paper explores how structured cabling boosts AI network performance without affecting latency or reliability. Tests show NVIDIA transceivers can handle structured cabling, easing deployment and maintenance in dense AI setups. Discover how proper cabling infrastructure enhances your AI network's scalability and manageability.
Posted: 17 Mar 2025 | Published: 18 Mar 2025
|
|
|
Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 08 Feb 2021 | Published: 02 Sep 2016
|
|
|
Top Cybersecurity Threat Detections With Splunk And MITRE ATT&CK
sponsored by Splunk
EBOOK:
Organizations can combat cyber threats by aligning MITRE ATT&CK with Splunk’s Analytic Stories. The guide details tactics like reconnaissance and lateral movement, offering Splunk searches and playbooks for detection. Teams can then investigate and remediate. Access the full paper for pre-built detections and enhanced defense insights.
Posted: 10 Feb 2024 | Published: 10 Feb 2024
|
|
|
The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019
|
|
|
Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018
|
|
|
The Rising Threat of Traffers
sponsored by Outpost24
RESEARCH CONTENT:
This report examines the threat of traffers - cybercriminal groups focused on credential theft. It explores their structure, tools, and impact on underground markets. Learn how traffers operate, spread malware, and profit from stolen data. Read the full report to understand this threat and get recommendations for protecting your organization.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
Computer Weekly – 10 October 2023: Teeing up tech at the Ryder Cup
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we go behind the scenes at golf's Ryder Cup to see the tech firsts introduced to improve the fan experience. UK tech leaders explain why they feel 'betrayed' by the government's net-zero policy changes. Read the issue now.
Posted: 10 Oct 2023 | Published: 10 Oct 2023
|
|
|
Google Workspace CMMC Level 2 Conguration Guide
sponsored by Google Workspace
EBOOK:
This guide provides instructions for configuring Google Workspace to meet CMMC Level 2 requirements. It covers security controls, implementation steps, and best practices for protecting CUI in cloud environments. Learn to leverage Google Workspace features to enhance cybersecurity and achieve compliance. Read the full eBook for guidance.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
Infrastructure For Smart Building Technologies
sponsored by Panduit
EBOOK:
Smart buildings use technology to optimize resources, enhance safety, and meet sustainability goals. This e-book covers infrastructure needs for networked systems, focusing on network convergence in modern buildings. Learn about essential infrastructure, reducing energy use, and improving efficiency. Discover how it transforms buildings.
Posted: 18 Mar 2025 | Published: 18 Mar 2025
|
|
|
Digital secure remote payment: How Apple Pay can change the future of remote payments
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
Posted: 08 Feb 2021 | Published: 27 Mar 2018
|
|
|
Talkdesk 2024 CX in Banking survey: An industry benchmark
sponsored by Talkdesk
RESEARCH CONTENT:
This benchmark explores how banks and credit unions use AI and omnichannel tactics to boost customer experience and loyalty. Discover key trends like rising CX importance, more AI and omnichannel spending, and digital transformation hurdles. Access the full report for optimal CX strategy insights.
Posted: 29 Jul 2024 | Published: 30 Jul 2024
|
|
|
Powerful, Application-aware Investigation Tools.
sponsored by Endace
DATA SHEET:
When you’re investigating a security incident, you want to eliminate any guesswork. EndaceVision, a browser-based investigation GUI, can help you do so. Learn all about the product in this data sheet.
Posted: 28 Mar 2023 | Published: 28 Mar 2023
|
|
|
MicroScope – March-April 2024: Is cloud the best option?
sponsored by MicroScope
EZINE:
In this issue, find out why cloud may not always be the right course of action for businesses to take. Also discover the growing threat artificial intelligence brings to the cyber security market, as well as read predictions on what areas will grow over the course of the year
Posted: 29 Feb 2024 | Published: 01 Mar 2024
|
|
|
CW EMEA – February 2023: Kyiv is ready for anything
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this issue of CW EMEA, the CIO at Kyiv City Council explains how its IT team has kept services running for residents amid relentless bombing by Russia. We also look at the Netherlands’ plans to regulate AI to reduce bias, how highly accurate time protocols ensure fair trading, and the use of tech in agriculture in Denmark. Read the issue now.
Posted: 02 Feb 2023 | Published: 09 Feb 2023
|
|
|
Cloudflare Security Brief
sponsored by Cloudflare
EBOOK:
Take a deep look at the most important trends shaping the cyber threat landscape today: AI, vulnerability exploitation, DDoS attacks, phishing, and Zero Trust. Based on the extensive data from Cloudflare’s cloud network, this security brief highlights key trends. Access the brief to learn more.
Posted: 19 Sep 2024 | Published: 19 Sep 2024
|
|
|
Specops Breached Password Report 2025
sponsored by SpecOps and Outpost24
RESEARCH CONTENT:
This report analyzes over 1 billion malware-stolen passwords, revealing alarming trends. Despite security awareness, users still create weak passwords like "123456" and "admin." Read on to examine how malware like Redline, Vidar, and Raccoon Stealer could impact organizations like yours and the current password security trends therein.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019
|
|
|
Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016
|
|
|
Demystifying Initial Access Brokers (IABS) and Their Links to Ransomware
sponsored by Outpost24
WHITE PAPER:
This white paper examines the role of Initial Access Brokers in cybercrime, detailing how they obtain and sell corporate network access to ransomware groups. It analyzes access sales on forums, pricing trends, and the relationship between IABs and ransomware operators. Read the full white paper to understand this critical cybersecurity threat.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
A Leader's Guide to Customer Engagement Excellence in Banking
sponsored by CleverTap
EBOOK:
This e-book explores AI-driven customer engagement strategies for banks, focusing on trust, technology, touchpoints, and transactions. It offers insights for retail banks, neobanks, and specialized banks to enhance personalization, optimize operations, and build customer loyalty. Read the e-book to develop your bank's AI roadmap.
Posted: 19 Mar 2025 | Published: 15 Mar 2025
|
|
|
Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017
|
|