SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022
|
|
|
Supporting DORA Objectives with Akamai
sponsored by Akamai Technologies
WHITE PAPER:
The EU's Digital Operational Resilience Act (DORA) sets new standards for financial services to enhance their resilience against cyberthreats. Akamai’s latest white paper provides key insights into how financial institutions can prepare for and meet DORA’s stringent requirements.
Posted: 21 Dec 2024 | Published: 21 Dec 2024
|
|
|
Object Storage Architecture: Mitigating Complexity, Capacity, and Archival Concerns
sponsored by HGST
EGUIDE:
This expert resource serves as your full guide to object storage implementation, with cloud workload, sync-and-share, API-accessible storage, and more use cases examined. Download now to gain full access, learning how object storage maintains the unstructured data deluge, and view an object vs. file vs. block storage bake off.
Posted: 08 Feb 2021 | Published: 12 Jun 2017
|
|
|
Your expert guide to object storage: potential successor to traditional file and block storage
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Object storage does away with the tree-like hierarchies of file systems used by traditional storage NAS and SAN systems.
Posted: 08 Feb 2021 | Published: 06 Jun 2017
|
|
|
Object storage: A great fit for large, unstructured data sets
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Object storage is a rising star. In this e-guide we walk you through the key differences between object storage and the currently more mainstream approaches - file and block access. In doing so you'll clearly see the benefits and drawbacks of the object approach, which is to organise data in a flat structure with unique identifiers.
Posted: 08 Feb 2021 | Published: 12 Nov 2018
|
|
|
Storage trends 2016: Storage priorities, cloud appliances and NAS vs object storage
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This guide offers a collection of our most popular articles on storage-related issues from the first few months of 2016.
Posted: 08 Feb 2021 | Published: 18 Apr 2016
|
|
|
Data Lakes with Supermicro® Storage Servers
sponsored by Supermicro
WHITE PAPER:
Data lakes are evolving to support a wider range of data and applications. Learn how Supermicro storage servers can enable high-performance, hybrid data lakes that meet diverse needs. Read the full white paper to discover the latest data lake architectures and Supermicro solutions.
Posted: 08 Nov 2024 | Published: 08 Nov 2024
|
|
|
NAS meets cloud and unstructured data challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.
Posted: 08 Feb 2021 | Published: 11 Jan 2019
|
|
|
Computer Weekly – 8 November 2016: The march of the robot workers
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.
Posted: 08 Feb 2021 | Published: 08 Nov 2016
|
|
|
How to Implement an OSS Governance Program
sponsored by Anaconda
WHITE PAPER:
Just like all software, open-source carries risk, and many data science teams still lack security protocols. For some, there simply aren’t security protocols or governance tools for open-source software (OSS). Read on to learn about 6 steps you can take to build an OSS governance program that works for data science and set your team up for success.
Posted: 10 Jul 2023 | Published: 11 Jul 2023
|
|
|
Computer Weekly - 26 July 2022: Inside Russia's Ukraine information operations
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we get the inside track on Russia's disinformation operations attempting to spread propaganda and cyber threats about the invasion of Ukraine. Our new buyer's guide looks at customer and employee experience management. And we assess 10 top Kubernetes backup suppliers. Read the issue now.
Posted: 22 Jul 2022 | Published: 26 Jul 2022
|
|
|
Jargon buster guide to hybrid cloud storage
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this Jargon Buster guide we bring you definitions for the key concepts in hybrid cloud storage plus in-depth articles on hybrid cloud file and object storage, how to use the cloud as a storage tier and the key decision points when it comes to private cloud vs hybrid cloud.
Posted: 08 Feb 2021 | Published: 24 Jul 2018
|
|
|
Using digital twins to cut costs and improve safety at Shell
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.
Posted: 08 Feb 2021 | Published: 10 Nov 2020
|
|
|
NVMe flash storage 101
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
Posted: 08 Feb 2021 | Published: 31 Mar 2017
|
|
|
Computer Weekly – 15 October 2019: Securing the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Oct 2019
|
|
|
Top 10 storage stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Computer Weekly's storage content decodes trends and offers practical and technical advice. So, looking at the key storage stories of 2019, we see all the main developments reflected.
Posted: 08 Feb 2021 | Published: 28 Jan 2020
|
|
|
SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 15 Mar 2021 | Published: 12 Feb 2021
|
|
|
SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 08 Feb 2021 | Published: 24 Aug 2020
|
|
|
Bitdefender Offensive Services: Red Teaming
sponsored by Bitdefender
PRODUCT OVERVIEW:
Every new technology introduced to your organization adds further complexity to the attack surface. Bitdefender offers customized Red Team Exercises that simulate real-life threat actors to identify vulnerabilities so that your security teams can resolve them before real hackers can exploit them. Read on to learn more.
Posted: 13 Feb 2024 | Published: 13 Feb 2024
|
|
|
Computer Weekly – 10 December 2024: On the road to change at Aston Martin
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to Aston Martin's CIO to find out how tech is helping tackle the challenges facing the automotive sector. The new National Cyber Security boss explains the need to be vigilant against growing online threats. We also examine the future of secure remote connectivity in the cloud era. Read the issue now.
Posted: 10 Dec 2024 | Published: 10 Dec 2024
|
|
|
AV Comparatives: Top-Performance in Independent Testing
sponsored by Bitdefender
WHITE PAPER:
Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare? This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone. Read on to learn more.
Posted: 02 Feb 2024 | Published: 02 Feb 2024
|
|
|
Eguide Shell RES LI 1423429
sponsored by Dimension Data
EGUIDE:
This guide shows you seven elements of cyber security readiness critical for every organization. Expert Peter Sullivan outlines the most important components that your organization needs for a high degree of situational awareness into your network operations and utilization.
Posted: 08 Feb 2021 | Published: 20 Sep 2016
|
|
|
Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
Posted: 08 Feb 2021 | Published: 09 Jul 2020
|
|
|
Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022
|
|
|
2024-25 Dcig Top 5 Midrange Hybrid Cloud Storage Solutions // Global Edition
sponsored by Hitachi Vantara
ANALYST REPORT:
This analyst report explores the top midrange hybrid cloud storage solutions from Hitachi, IBM, Lenovo, NetApp, and StorONE. It examines their capabilities, features, and differentiators to help you select the best fit for your organization's hybrid cloud needs. Read the full report now to learn more.
Posted: 18 Nov 2024 | Published: 20 Nov 2024
|
|