Link Control Protocols Reports

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

CW ANZ: Fix the weak links
sponsored by TechTarget ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jul 2018

TechTarget ComputerWeekly.com

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Regaining Control With A Connectivity Cloud
sponsored by Cloudflare
FORRESTER RESEARCH REPORT: Businesses are struggling to manage the growing complexity of IT and security responsibilities. A connectivity cloud solution could help regain control by providing secure, performant connectivity across on-premises, cloud, and web environments. Read the full Forrester Research report to learn more.
Posted: 13 Jul 2024 | Published: 13 Jul 2024

Cloudflare

NVMe promises blisteringly fast flash performance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this guide we look at the architectural issues blocking agreement on NVMe, the fundamentals that underlie NVMe and its blistering performance, the key NVMe product deployments available, and ask what will become of the storage features associated with the storage controller.
Posted: 08 Feb 2021 | Published: 10 Apr 2018

TechTarget ComputerWeekly.com

Understanding Gmail And Yahoo’s New Standards For Senders
sponsored by Sinch
WHITE PAPER: Gmail and Yahoo are changing email-sending requirements in 2024. Learn how to ensure your domain settings, unsubscribe links, and spam rates align with the new protocols to avoid getting blocked from major inboxes. Access the guide to understand the remediation steps.
Posted: 29 May 2024 | Published: 29 May 2024

TOPICS:  .NET
Sinch

Demystifying Initial Access Brokers (IABS) and Their Links to Ransomware
sponsored by Outpost24
WHITE PAPER: This white paper examines the role of Initial Access Brokers in cybercrime, detailing how they obtain and sell corporate network access to ransomware groups. It analyzes access sales on forums, pricing trends, and the relationship between IABs and ransomware operators. Read the full white paper to understand this critical cybersecurity threat.
Posted: 06 Mar 2025 | Published: 06 Mar 2025

Outpost24

Connectivity Cloud: A Way To Take Back IT And Security Control
sponsored by Cloudflare
WHITE PAPER: Organizations are losing control over their IT and security as their technology environment becomes more complex. Learn how a "connectivity cloud" can help regain control by providing seamless, secure, and performant connectivity across any network, cloud, or user. Read the full white paper to discover the benefits.
Posted: 08 Mar 2025 | Published: 13 Jul 2024

Cloudflare

Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

Zero Trust Lateral Access Control
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW: Secure your network by controlling lateral access with zero trust identity. Learn how Zentera's CoIP Platform enables targeted lateral access controls to defend against advanced threats inside your network. Read the solution brief to discover this elegant zero trust approach.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Google Workspace CMMC Level 2 Conguration Guide
sponsored by Google Workspace
EBOOK: This guide provides instructions for configuring Google Workspace to meet CMMC Level 2 requirements. It covers security controls, implementation steps, and best practices for protecting CUI in cloud environments. Learn to leverage Google Workspace features to enhance cybersecurity and achieve compliance. Read the full eBook for guidance.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

Google Workspace

Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019

TechTarget ComputerWeekly.com

Software Development Kit (SDK) U.Trust SDK
sponsored by Utimaco
BLOG: The utrust SDK is a professional development environment that enables custom firmware extensions for Utimaco's hardware security modules. It provides full control, efficient development, and qualified support to create tailored security solutions. Read the full details in this blog article.
Posted: 17 Jul 2024 | Published: 17 Jul 2024

Utimaco

Bastille Threat Research: Insider Threat
sponsored by Bastille
WHITE PAPER: Insider threats can exploit wireless devices to infiltrate corporate networks. This white paper explores real-world case studies and best practices to secure your wireless environment and mitigate insider risks. Read the full white paper to learn how to protect your organization.
Posted: 19 Feb 2025 | Published: 20 Feb 2025

Bastille

8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com 
EGUIDE: Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023

TechTarget ComputerWeekly.com 

How the food & beverage sector can optimize its SAP warehouse management
sponsored by Basis Technologies
BLOG: The food and beverage industry faces challenges like labor shortages, quality control, and workplace safety. Learn how to optimize SAP EWM to address these issues with practical solutions. Download the e-book to discover how ActiveDiscover can help you get the most value from your SAP investments.
Posted: 20 Feb 2025 | Published: 21 Feb 2025

Basis Technologies

Infographic: 6 file transfer best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.
Posted: 05 May 2022 | Published: 05 May 2022

TechTarget ComputerWeekly.com

Zero trust: Taking back control of IT security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
Posted: 08 Feb 2021 | Published: 18 Jan 2021

TechTarget ComputerWeekly.com

NVMe flash storage 101
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
Posted: 08 Feb 2021 | Published: 31 Mar 2017

TechTarget ComputerWeekly.com

Top Five Reasons to Convert Your AWS DirectConnect to a Multicloud On-Ramp
sponsored by Apcela
BLOG: This blog post outlines why you should convert the access circuits that enable AWS DirectConnect into a multicloud link instead of a single purpose connection and leveraging existing SD-WAN. Read on to uncover 5 reasons you should convert your AWS DirectConnect to a multicloud on-ramp.
Posted: 21 Jun 2022 | Published: 22 Jun 2022

TOPICS:  .NET
Apcela

Exploring the value of EX & CX
sponsored by Mitel
INFOGRAPHIC: This infographic examines the link between employee experience (EX) and customer experience (CX) in today's workplaces. It outlines the challenges in integrating communication technologies and the benefits of unified communications. Discover how enhancing EX and CX can boost business growth and employee satisfaction.
Posted: 06 Mar 2025 | Published: 06 Mar 2025

Mitel

Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019

TechTarget ComputerWeekly.com

Focus: Campus local area networks (LAN)
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will explore some of the key trends driving the market for campus LANs and ask how to implement one, find out how one user went about building a network from the ground up on a brand-new site, and look in-depth at some of the active suppliers in the market.
Posted: 08 Feb 2021 | Published: 26 Jul 2018

TechTarget ComputerWeekly.com

Comparing Azure Active Directory options
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

VPN vs. SSO vs. ZTNA: What is Future-Built Access Control?
sponsored by Open Systems
WHITE PAPER: As remote work becomes the norm, secure access to enterprise apps is critical. This white paper explores the differences between VPN, SSO, and ZTNA to help you select the right approach. Learn how ZTNA can provide adaptive security and continuous validation to your workforce. Read the full white paper.
Posted: 19 Feb 2025 | Published: 19 Feb 2025

All resources sponsored by Open Systems

Advancing Precision Medicine: Enhancing Next-Generation Quality Control for Clinical Precision Applications
sponsored by Qualitest Group
EBOOK: This eBook explores the critical role of data quality control in next-generation sequencing (NGS) for accurate diagnoses, effective treatments, and groundbreaking discoveries. It emphasizes a project-specific approach and highlights key steps in NGS data QC. Download to unlock the full potential of NGS technology.
Posted: 25 Feb 2025 | Published: 25 Feb 2025

Qualitest Group