Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER:
Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008
|
|
|
How to solve overlapping IPs, NAT, and other challenges at scale in the cloud
sponsored by Aviatrix Systems
WEBCAST:
Organizations building their enterprise workloads and applications in the cloud have extensive requirements to make them available to various kinds of consumers. Meeting these requirements can bring equally extensive challenges. Watch this webinar to learn how to solve overlapping IPs, NAT and other challenges at scale.
Posted: 01 Nov 2021 | Premiered: Sep 7, 2021
|
|
|
Merging Businesses Together is Challenging and Fraught with Complexity S
sponsored by Aviatrix Systems
PRODUCT OVERVIEW:
Merging networks during M&A can be complex, but Aviatrix simplifies the process. Their secure connectivity and onboarding solution provides a unified data plane, advanced routing and NAT capabilities, and robust security - enabling seamless integration of merged networks. Read the full solution brief to learn more.
Posted: 12 Sep 2024 | Published: 13 Sep 2024
|
|
|
Reducing Cloud Costs with Distributed Networking and Network Security Convergence
sponsored by Aviatrix Systems
WHITE PAPER:
How can you optimize your cloud while reducing cloud costs? By converging networking and network security in the cloud, this white paper argues. To learn all about this strategy, keep reading.
Posted: 06 Mar 2024 | Published: 06 Mar 2024
|
|
|
Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017
|
|
|
A reference architecture for the IoE
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT:
Analyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).
Posted: 08 Feb 2021 | Published: 03 Oct 2016
|
|
|
Healthcare Workforce Scheduling Schedule Physicians, Nurses, And Staff In One Unified Platform For Optimal Results
sponsored by QGenda
EBOOK:
Discover how a unified scheduling platform can help healthcare organizations optimize their workforce, reduce burnout, and improve patient care. This e-book explores the challenges facing the healthcare workforce and the benefits of a purpose-built scheduling solution. Read the full e-book to learn more.
Posted: 18 Nov 2024 | Published: 17 Jul 2024
|
|
|
Session Border Controllers
sponsored by Ribbon Communications
EBOOK:
What are session border controllers (SBCs), and how do they function in a communications strategy? For answers, and for a deep dive on SBCs, tap into this 47-page e-book.
Posted: 31 Jan 2024 | Published: 31 Jan 2024
|
|
|
The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 08 Feb 2021 | Published: 09 May 2017
|
|
|
Computer Weekly – 5 September 2023: Met Police data platform goes £64m over budget
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we reveal a £64m cost over-run for the Metropolitan Police's new record management system. Our latest buyer's guide looks at the issues around integrating SaaS applications. And a leading flash storage firm says the age of spinning disk drives is almost over – are they right? Read the issue now.
Posted: 01 Sep 2023 | Published: 05 Sep 2023
|
|
|
Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022
|
|
|
Containerized Deployments On Amazon Web Services
sponsored by TIBCO
DATA SHEET:
Preparing your organization for the cloud requires a level of security and agility that some enterprises find difficult to maintain. Check out this data sheet to examine how your enterprise can safely and swiftly launch into the cloud leveraging containerized deployments on Amazon Web Services (AWS).
Posted: 09 Jun 2022 | Published: 10 Jun 2022
|
|
|
A Cloud Services Cheat Sheet for AWS, Azure and Google Cloud
sponsored by TechTarget Cloud Computing
EBOOK:
Navigating AWS and other providers' services can be daunting, with each platform offering hundreds of uniquely named options. Our Cloud Services Cheat Sheet simplifies this, giving you a quick reference to identify and compare similar services across providers.
Posted: 06 Nov 2024 | Published: 06 Nov 2024
|
|
|
Computer Weekly – 26 September 2017: Building on legacy IT
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, experts at VMworld 2017 discussed how to adapt legacy IT to make the most of modern technology – we listened in. Artificial intelligence is touted as an aid to decision-making, but it needs to be handled with care. And we learn how Wales has become a hotspot for cyber security innovation. Read the issue now.
Posted: 08 Feb 2021 | Published: 22 Sep 2017
|
|
|
Zscaler Zero Trust + AI for Amazon Web Services (AWS)
sponsored by Zscaler
ESG TECHNICAL VALIDATION REPORT:
Zscaler's Zero Trust Exchange provides secure, direct access to private apps on AWS without network complexity. It automates data discovery, classification, and protection to reduce risk. Download this Technical Validation Report from Enterprise Strategy Group to learn how Zscaler can help your organization securely migrate to the cloud.
Posted: 12 Nov 2024 | Published: 13 Nov 2024
|
|
|
Moving Beyond Fragmented Cloud Security with Unified SASE
sponsored by Fortinet, Inc.
WHITE PAPER:
As organizations adopt hybrid work and multi-cloud environments, fragmented cloud security adds complexity. Unified SASE offers a consolidated approach. Read the full white paper to learn more.
Posted: 10 Sep 2024 | Published: 11 Sep 2024
|
|
|
Business to Business Connectivity Has Never Been More Complex
sponsored by Aviatrix Systems
PRODUCT OVERVIEW:
Secure B2B partner connectivity is crucial for businesses to stay agile and competitive. Aviatrix's solution simplifies this complex challenge by providing advanced networking, security, and operational capabilities in the cloud. Learn how Aviatrix can revolutionize your B2B connectivity. Read the full solution brief.
Posted: 12 Sep 2024 | Published: 13 Sep 2024
|
|
|
Liberate Data and Modernize your Network for AI and LLM with Aviatrix
sponsored by Aviatrix Systems
PRODUCT OVERVIEW:
Aviatrix's cloud networking platform enables enterprises to secure and optimize hybrid networks for AI and large language model workloads. It provides high-performance encryption, deep observability, and cost savings. Learn more about Aviatrix's cloud networking solutions.
Posted: 12 Sep 2024 | Published: 13 Sep 2024
|
|
|
An Integrated Approach to Managing Edge using GitOps, Fleet and Akri
sponsored by SUSE
WHITE PAPER:
This white paper provides an overview of how GitOps, Fleet, and Akri can help manage edge infrastructure at scale. This integrated approach automates deployments, reduces errors, and improves visibility across diverse edge environments. Read the full research content to learn more.
Posted: 01 May 2024 | Published: 01 May 2024
|
|
|
You’re Under SIP Attack: Limiting SIP Vulnerabilities
sponsored by Ribbon Communications
WHITE PAPER:
Without the necessary expertise, monitoring, and management, companies could be leaving their network vulnerable to exploitation through their VoIP communications. Read this white paper to understand hackers’ tactics and motivations to help your enterprise operators secure their networks from attack.
Posted: 31 Jan 2024 | Published: 31 Jan 2024
|
|
|
Migrate to AWS using Ansible Automation Platform
sponsored by Red Hat
PRODUCT OVERVIEW:
Streamline cloud migration and management with Ansible Automation Platform on AWS. Orchestrate, operationalize, and govern cloud workflows across your hybrid environment. Learn how to automate deployment, migration, and ongoing operations with Ansible validated content for AWS.[Read the full overview]
Posted: 13 Jun 2024 | Published: 13 Jun 2024
|
|
|
Red Hat Ansible Automaton Platform
sponsored by Red Hat
EBOOK:
In this e-book, discover everything you need to get started with Ansible Automation Platform, including key automation concepts, product features and capabilities, use cases for gaining value quickly, and strategies for implementing organization-wide automation.
Posted: 25 Jun 2024 | Published: 25 Jun 2024
|
|
|
The SUSE Guide to Edge Computing in a Cloud Native World 2022
sponsored by SUSE
EBOOK:
What really is edge computing? And how are near edge, far edge and tiny edge different? This guide explains what edge computing means for your business and how you can take advantage of it in a cloud native world. Read it here.
Posted: 19 Sep 2022 | Published: 20 Sep 2022
|
|
|
UCaaS Buyers’ Checklist
sponsored by 8x8
PRODUCT OVERVIEW:
The best unified communications as a service (UCaaS) tools offer a range of transformative capabilities, from personalized meeting rooms to built-in security and encryption. Use this checklist to benchmark the most important features against your organization’s UCaaS requirements.
Posted: 31 May 2024 | Published: 31 May 2024
|
|
|
A Computer Weekly e-guide to SASE
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 29 Jul 2021 | Published: 28 Jul 2021
|
|
|
A Computer Weekly Buyer's Guide to Internet of Things Security
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.
Posted: 08 Feb 2021 | Published: 07 Feb 2017
|
|