Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER:
Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
API Management: The role of APis in digital business transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.
Posted: 08 Feb 2021 | Published: 09 Nov 2020
|
|
|
Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 08 Feb 2021 | Published: 02 Sep 2016
|
|
|
Essential Guide: What the EU Data Protection Regulation changes mean to you
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This Essential Guide offers you news, tips and features on how the new regulations may affect you and your organisation.
Posted: 08 Feb 2021 | Published: 20 Nov 2017
|
|
|
Run Complex Queries on Massive Amounts of Data Stored on Your Amazon Documentdb Clusters Using Apache Spark Running on Amazon EMR
sponsored by Amazon Web Services
WHITE PAPER:
This blog post shows how to use Apache Spark on Amazon EMR to run complex queries on large datasets in Amazon DocumentDB clusters. It covers setting up components, configuring security, and executing queries. Learn to leverage distributed processing for efficient analysis of your document database data. Read the blog for step-by-step instructions.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
NIS2: Why European Boards Need to Raise Their Cyber-risk Game
sponsored by Arctic Wolf
ESG SHOWCASE:
In this 2024 report, TechTarget's Enterprise Strategy Group (ESG) unpacks what makes the Network and Information Systems 2 (NIS2) novel, its impacts in the EU and beyond, and more. Tap into the 10-page report to access those insights and ESG research findings.
Posted: 08 Mar 2024 | Published: 09 Mar 2024
|
|
|
REST 101: The Beginner’s Guide to Using and Testing RESTful APIs
sponsored by SmartBear Software
EBOOK:
REST APIs are preferred for web services due to their simplicity, scalability, and HTTP alignment. This e-book covers REST principles, contrasts REST with SOAP, and offers testing methods. Learn when REST suits your organization and how to test APIs effectively. Read this e-book to master RESTful API basics and enhance your development skills.
Posted: 25 Mar 2025 | Published: 25 Mar 2025
|
|
|
Focus: Network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 08 Feb 2021 | Published: 24 Apr 2017
|
|
|
EU data protection: Essential guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.
Posted: 08 Feb 2021 | Published: 24 Nov 2016
|
|
|
Comprehensive Web Protection: Leveraging AWS WAF and Partner Solutions
sponsored by AWS Coralogix
ESG SHOWCASE:
As web applications face increasing threats, security teams need comprehensive protection that is efficient and effective. This showcase explores how AWS WAF, enhanced by a robust partner ecosystem, can help secure web applications and APIs against a variety of attacks. Read the full showcase to learn more.
Posted: 12 Feb 2025 | Published: 12 Feb 2025
|
|
|
Comprehensive Web Protection: Leveraging AWS WAF and Partner Solutions
sponsored by AWS & Cyber Security Cloud
ESG SHOWCASE:
As web applications become more critical, securing them has become more challenging. Learn how AWS WAF and partner solutions can provide comprehensive web protection against evolving threats like bot attacks and API vulnerabilities. Read the full white paper.
Posted: 21 Feb 2025 | Published: 21 Feb 2025
|
|
|
Comprehensive Web Protection: Leveraging AWS WAF and Partner Solutions
sponsored by AWS & Cequence
ESG SHOWCASE:
As application architectures become more distributed, web application security has become more challenging. This white paper explores how AWS WAF and its partner ecosystem can provide comprehensive protection against evolving threats like API attacks and bot-driven fraud. Read the full white paper to learn more.
Posted: 12 Feb 2025 | Published: 12 Feb 2025
|
|
|
The Modern Guide To OAuth
sponsored by FusionAuth
EBOOK:
This guide explores OAuth 2.0 implementation, covering authorization modes, grants, and real-world uses. It provides code examples and insights into secure authentication workflows for web and mobile apps. Learn to handle tokens, refresh access, and implement device authorization. Read this e-book to master OAuth and build secure applications.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
Comprehensive Web Protection: Leveraging AWS WAF and Partner Solutions
sponsored by AWS & F5
ESG SHOWCASE:
As applications become more distributed and API-reliant, securing them grows complex. AWS WAF offers core protections, while its partner ecosystem provides advanced observability, API security, and bot mitigation. This flexible approach helps balance efficiency and effectiveness in web protection. Read the white paper for more strategies.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017
|
|
|
Preparing for the Quantum Era in Networking with Post-Quantum Cryptography
sponsored by Riverbed Technology, Inc.
WHITE PAPER:
Quantum computing threatens cryptographic systems by potentially breaking encryption for data-in-transit and digital signatures. Post-quantum cryptography, including NIST algorithms like CRYSTALS-KYBER, offers protection against these threats. Read this white paper to learn how to implement quantum-resistant solutions.
Posted: 18 Mar 2025 | Published: 18 Mar 2025
|
|
|
Drones-The Key to Building and Maintaining America’s Infrastructure?
sponsored by T-Mobile for Business
INFOGRAPHIC:
Drones are transforming infrastructure projects, enabling remote inspections, improving worker safety, and increasing operational efficiency. Tap into this infographic now to learn how 5G-powered drones can help build and maintain America's future infrastructure.
Posted: 15 Jan 2025 | Published: 16 Jan 2025
|
|
|
Computer Weekly – 8 January 2019: Technology innovation in music
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Jan 2019
|
|
|
The Big Book of MLOps
sponsored by DataBricks
EBOOK:
If you were to break down machine learning operations (MLOps) into a formula, this e-book by Databricks explains, it would the following: MLOps = DataOps + DevOps + ModelOps. Now that you know what MLOps is, why should you care about it? Find out in the 78-page ultimate guide.
Posted: 13 Feb 2024 | Published: 21 Feb 2025
|
|
|
Data protection rises up business agenda
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
Posted: 08 Feb 2021 | Published: 17 Dec 2018
|
|
|
CW EMEA - November 2023: Let the data flow
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this month's CW EMEA ezine, we find out about Heineken's mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform. Read the issue now.
Posted: 06 Nov 2023 | Published: 09 Nov 2023
|
|
|
Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018
|
|
|
Top 10 cloud stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK:
There have been plenty of ups and downs in the world of cloud over the course of 2021. The public sector has emerged as a core battleground for both public cloud giants and their smaller rivals, sustainability became more important in the cloud sourcing decisions than ever before and much more. Look at top 10 cloud stories of 2021.
Posted: 24 Jan 2022 | Published: 24 Jan 2022
|
|
|
Guide to building an enterprise API strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.
Posted: 29 Nov 2022 | Published: 29 Nov 2022
|
|
|
Getting started with Azure Red Hat OpenShift
sponsored by Red Hat
WHITE PAPER:
As the network perimeter is now everywhere and anywhere users are, security must move with it and needs to be in place at the point of access. Download this e-book to learn how you can secure remote access and build user trust.
Posted: 13 Jun 2024 | Published: 13 Jun 2024
|
|
|
A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 08 Feb 2021 | Published: 19 Nov 2019
|
|