URI Reports

Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022

TechTarget ComputerWeekly.com

Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola Solutions

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

API Management: The role of APis in digital business transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.
Posted: 08 Feb 2021 | Published: 09 Nov 2020

TechTarget ComputerWeekly.com

Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 08 Feb 2021 | Published: 02 Sep 2016

TechTarget ComputerWeekly.com

Data Governance Methodology
sponsored by Alation
WHITE PAPER: Data governance stratagems have become so complex over the years, meaning it’s time for businesses to reimagine their governance approaches to cut down on bloat and inefficiency. Read on to learn how Alation’s data governance methodology goes a step beyond traditional approaches to ensure quality data remains compliant and generates business value.
Posted: 06 Oct 2021 | Published: 06 Oct 2021

Alation

Essential Guide: What the EU Data Protection Regulation changes mean to you
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This Essential Guide offers you news, tips and features on how the new regulations may affect you and your organisation.
Posted: 08 Feb 2021 | Published: 20 Nov 2017

TechTarget ComputerWeekly.com

NIS2: Why European Boards Need to Raise Their Cyber-risk Game
sponsored by Arctic Wolf
ESG SHOWCASE: In this 2024 report, TechTarget's Enterprise Strategy Group (ESG) unpacks what makes the Network and Information Systems 2 (NIS2) novel, its impacts in the EU and beyond, and more. Tap into the 10-page report to access those insights and ESG research findings.
Posted: 08 Mar 2024 | Published: 09 Mar 2024

TOPICS:  .NET
Arctic Wolf

Asset Inventory Solution Comprehensive Visibility Into Your Connected Infrastructure
sponsored by Redjack
PRODUCT OVERVIEW: Asset inventories may seem deceptively simple, but they can make a serious difference when it comes to cybersecurity. The Redjack platform uses non-intrusive software-based network sensors to give you a comprehensive view of your connected infrastructure. Download the full product overview to learn more.
Posted: 26 Mar 2024 | Published: 26 Mar 2024

TOPICS:  .NET
Redjack

Focus: Network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 08 Feb 2021 | Published: 24 Apr 2017

TechTarget ComputerWeekly.com

EU data protection: Essential guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.
Posted: 08 Feb 2021 | Published: 24 Nov 2016

TechTarget ComputerWeekly.com

Navigating the Future: A Blueprint for Success
sponsored by TPG
WHITE PAPER: A future-fit network strategy is crucial for healthcare organizations to stay competitive. SD-WAN and Fibre Internet can provide the flexibility, scalability, and reliability needed to support telemedicine, remote patient monitoring, and secure data access. Learn how to build a future-ready network in this White Paper.
Posted: 17 Sep 2024 | Published: 18 Sep 2024

TPG

Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017

TechTarget ComputerWeekly.com

Computer Weekly – 8 January 2019: Technology innovation in music
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Jan 2019

TechTarget ComputerWeekly.com

The Big Book of MLOps
sponsored by DataBricks
EBOOK: Generative models such as large language models (LLMs) and image generation models have revolutionized the machine learning (ML) landscape. However, their arrival also introduces new challenges. Read on to learn how you can leverage a unified, data-centric AI platform to achieve long-term efficiency and performance stability of ML in production.
Posted: 13 Feb 2024 | Published: 13 Feb 2024

TOPICS:  .NET
DataBricks

Data protection rises up business agenda
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
Posted: 08 Feb 2021 | Published: 17 Dec 2018

TechTarget ComputerWeekly.com

CW EMEA - November 2023: Let the data flow
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA ezine, we find out about Heineken's mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform. Read the issue now.
Posted: 06 Nov 2023 | Published: 09 Nov 2023

TechTarget ComputerWeekly.com

The Skeptic’s Guide to Oracle Third-Party Support
sponsored by Spinnaker Support
WHITE PAPER: This guide answers 15 common queries about third-party Oracle support, addressing legality, quality, response times, costs, and security. It offers facts and recommendations to assess if it suits your organization. Read the full eBook for more details.
Posted: 04 Jun 2024 | Published: 04 Jun 2024

TOPICS:  .NET
Spinnaker Support

Navigating The European Union’s General Data Protection Regulation
sponsored by Veracode
WHITE PAPER: Today’s businesses encounter not only rising cyberattacks but also regulations with stringent requirements. To help organizations navigate that challenging landscape, this white paper presents best practices for complying with the EU’s GDPR. Keep reading to unlock insights.
Posted: 06 Jun 2023 | Published: 06 Jun 2023

TOPICS:  .NET
Veracode

Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018

TechTarget ComputerWeekly.com

F5 Distributed Cloud API Security
sponsored by F5 Inc.
PRODUCT OVERVIEW: Discover, map, and secure your APIs with F5 Distributed Cloud API Security. Automatically identify endpoints, block unwanted connections, and monitor for anomalies using AI/ML. Integrate security into your API lifecycle and optimize your APIs. Read the full white paper to learn more.
Posted: 04 Sep 2024 | Published: 05 Sep 2024

F5 Inc.

Top 10 cloud stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK: There have been plenty of ups and downs in the world of cloud over the course of 2021. The public sector has emerged as a core battleground for both public cloud giants and their smaller rivals, sustainability became more important in the cloud sourcing decisions than ever before and much more. Look at top 10 cloud stories of 2021.
Posted: 24 Jan 2022 | Published: 24 Jan 2022

TechTarget ComputerWeekly.com

The State of Software Supply Chain Security 2024
sponsored by ReversingLabs
RESEARCH CONTENT: Over the last 3 years, supply chain attacks rose 1300%. This report is designed to give readers a map with which they can navigate the landscape of software supply chain security, exploring some of the high-level trends in software supply chain threats and how recent attacks provide insight into what’s to come. Read on to learn more.
Posted: 22 Feb 2024 | Published: 22 Feb 2024

TOPICS:  .NET
ReversingLabs

Guide to building an enterprise API strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Today's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.
Posted: 29 Nov 2022 | Published: 29 Nov 2022

TechTarget ComputerWeekly.com

Getting started with Azure Red Hat OpenShift
sponsored by Red Hat
WHITE PAPER: As the network perimeter is now everywhere and anywhere users are, security must move with it and needs to be in place at the point of access. Download this e-book to learn how you can secure remote access and build user trust.
Posted: 13 Jun 2024 | Published: 13 Jun 2024

Red Hat

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 08 Feb 2021 | Published: 19 Nov 2019

TechTarget ComputerWeekly.com

Data protection, a live issue that affects us all
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.
Posted: 08 Feb 2021 | Published: 16 Dec 2019

TechTarget ComputerWeekly.com

MicroScope – October 2019: What's next for the channel?
sponsored by MicroScope
EZINE: The fourth quarter is the busiest in the channel, and we get an idea of which technologies should be selling strongly
Posted: 08 Feb 2021 | Published: 04 Sep 2019

MicroScope