V.21 Standards Reports

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

How to Slash Corporate Fax Telephone Charges 20 - 80%: Overview of V.34 Faxing and JBIG Document Compression
sponsored by FaxBack, Inc.
WHITE PAPER: An in-depth look at V.34 high-speed fax and JBIG document compression technology...designed to save companies significant money in reducing fax telephone charges.
Posted: 18 Sep 2003 | Published: 01 May 2004

FaxBack, Inc.

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Successful Mobile Deployments Require Robust Security
sponsored by Lopez Research
WHITE PAPER: Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 20 May 2009 | Published: 20 May 2009

Lopez Research

Allegheny General Sees Safety, Efficiency, Financial Gains From IV Robotic Insourcing Program
sponsored by Omnicell
CASE STUDY: Allegheny General Hospital saw significant safety, efficiency, and financial gains from its insourcing program using Omnicell's IV compounding robot and services. The hospital realized $700K in savings in the first six months and automated 30% of its IV prep process. Read the full case study to learn more.
Posted: 29 Oct 2024 | Published: 29 Oct 2024

Omnicell

CW Middle East July to Sept 2016
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.
Posted: 08 Feb 2021 | Published: 18 Jul 2016

TechTarget ComputerWeekly.com

Future of Work
sponsored by TechTarget ComputerWeekly.com
BOOK: In this extract from his book, The Future of Work, Jacob Morgan looks at the five key factors shaping the way we work.
Posted: 08 Feb 2021 | Published: 09 Feb 2015

TechTarget ComputerWeekly.com

The AI Disruption: Challenges and Guidance for Data Center Design
sponsored by Schneider Electric
WHITE PAPER: Artificial intelligence (AI) deployments are taking up an increasingly large portion of data center workloads. This paper explains relevant attributes and trends of AI workloads and describes the resulting data center challenges, including Guidance for how to address these challenges. Read on to learn more.
Posted: 25 Jan 2024 | Published: 26 Jan 2024

TOPICS:  .NET
Schneider Electric

Navigating the Compliance Labyrinth: Transform NIS2 & DORA Regulations into Strategic Advantages with SASE
sponsored by Open Systems
WHITE PAPER: This white paper explores transforming NIS2 and DORA regulations into strategic advantages with a managed SASE solution. It guides on benchmarking cybersecurity maturity, implementing robust security controls, and navigating the evolving regulatory landscape. Read the full white paper to strengthen your organization's digital resilience.
Posted: 19 Feb 2025 | Published: 19 Feb 2025

All resources sponsored by Open Systems

Avon calling: what happens when lockdown eliminates your business model?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, global beauty brand Avon explains how it coped with a lockdown dilemma – a door-to-door sales model when its reps couldn't leave home. Our buyer's guide examines the use of artificial intelligence in IT security. And we analyse the government's decision to strip Huawei from the UK's 5G network. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Jan 2021

TechTarget ComputerWeekly.com

Avon calling: what happens when lockdown eliminates your business model?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, global beauty brand Avon explains how it coped with a lockdown dilemma – a door-to-door sales model when its reps couldn't leave home. Our buyer's guide examines the use of artificial intelligence in IT security. And we analyse the government's decision to strip Huawei from the UK's 5G network. Read the issue now.
Posted: 08 Feb 2021 | Published: 21 Jul 2020

TechTarget ComputerWeekly.com

Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE: David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

Top 10 Concerns Of Leveraging AI In Healthcare
sponsored by Surgical Safety Technologies
WHITE PAPER: AI benefits healthcare, but concerns about accuracy, bias, and ethics remain. This paper explores 10 key issues, from data security to information overload, and solutions through careful implementation and standards. Discover how AI can improve healthcare while preserving human expertise and patient safety.
Posted: 22 Mar 2025 | Published: 22 Mar 2025

All resources sponsored by Surgical Safety Technologies

The currency of trust: why banks and insurers must make customer data safer and more secure
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
Posted: 08 Feb 2021 | Published: 25 Apr 2017

TechTarget ComputerWeekly.com

Power Distribution Units
sponsored by Panduit
PRODUCT OVERVIEW: Panduit's Power Distribution Units offer versatile solutions for data centers, from basic to intelligent PDUs with advanced monitoring. Features include high-temperature operation, hot-swappable controllers, and integration with Cisco Nexus Dashboard for energy management. Discover how Panduit PDUs enhance efficiency and protect infrastructure.
Posted: 18 Mar 2025 | Published: 18 Mar 2025

Panduit

How do Iconic Business Models such as Airbnb Emerge?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Brands such as Airbnb disrupt industries and change how consumers think about the market, according to this research from Cass Business School, City University London.
Posted: 08 Feb 2021 | Published: 16 Mar 2016

TechTarget ComputerWeekly.com

The Modern Guide To OAuth
sponsored by FusionAuth
EBOOK: This guide explores OAuth 2.0 implementation, covering authorization modes, grants, and real-world uses. It provides code examples and insights into secure authentication workflows for web and mobile apps. Learn to handle tokens, refresh access, and implement device authorization. Read this e-book to master OAuth and build secure applications.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

FusionAuth

Why cloud? Why now? A Qlik Cloud Comparison Guide
sponsored by Qlik
EBOOK: Discover the advantages of a modern, AI-powered cloud analytics platform. This Qlik Cloud Comparison Guide highlights key differences from on-premises solutions, including enhanced security, data management, AI-powered analytics, machine learning, and automation. See how Qlik Cloud elevates your analytics. Read the Qlik Cloud Comparison Guide
Posted: 13 Sep 2024 | Published: 14 Sep 2024

Qlik

Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Nov 2016

TechTarget ComputerWeekly.com

CyberRisk Validation Report – Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: In the ever-evolving landscape of cloud network security solutions, Palo Alto Networks VM-Series Virtual Next-Generation Firewall emerges as a leader for security efficacy, operational efficiency, and robust SSL/TLS decryption and inspection. Read this report now to learn about top choices for advanced cloud network security.
Posted: 28 Feb 2025 | Published: 25 Feb 2025

TOPICS:  .NET
Palo Alto Networks

Improving Health Outcomes With Data and AI
sponsored by DataBricks
EBOOK: Eliminate the unnecessary costs and difficulties associated with accessing the data you need for innovation. With the Databricks Data Intelligence Platform for Healthcare and Life Sciences, you can move past the limitations of legacy systems to put data and AI in the hands of all your teams. Read on now to learn more.
Posted: 28 Nov 2024 | Published: 21 Feb 2025

TOPICS:  .NET
DataBricks

From Edge to Cloud: Linux as the Foundation for Modern AI and Cloud-native Environments
sponsored by Wind River
ESG WHITE PAPER: This executive summary explores Linux's role in modern enterprise IT, from edge to cloud. It highlights trends in Linux adoption, including its importance for AI workloads, cloud-native technologies, and diverse environments. Discover how organizations leverage Linux for innovation and efficiency. Read the full report for more insights.
Posted: 26 Feb 2025 | Published: 26 Feb 2025

Wind River

Risk, Resiliency, And Supply Chain Modeling: How To Plan For And Recover Faster After Disruption.
sponsored by Coupa
WHITE PAPER: This white paper explores building risk and resiliency into supply chain models to mitigate disruption impacts. Readers will learn about risk analysis, selecting responses, and faster recovery post-disruption. Discover how supply chain modeling can help achieve a more resilient supply chain by reading the full white paper.
Posted: 22 Jan 2025 | Published: 22 Jan 2025

Coupa

The Business Value of Dell PowerFlex
sponsored by Dell Technologies
WHITE PAPER: In this IDC white paper, discover why IDC calculates that users of Dell PowerFlex will realize an average benefit of $7.24 million and a 276% return on investment (ROI) over a three-year time frame.
Posted: 06 May 2024 | Published: 06 May 2024

TOPICS:  .NET
Dell Technologies

Luminis Health improves throughput & access at one of the nation’s busiest ERs
sponsored by Fabric Health
CASE STUDY: Luminis Health faced rising wait times and staff burnout post-pandemic. To address these challenges, they partnered with Fabric to digitally transform their emergency department by digitizing the patient intake process, educating patients about their visit, and improving follow-up scheduling and PCP attachment.
Posted: 29 Aug 2024 | Published: 29 Aug 2024

Fabric Health

Migrate VMs From VMware to KVM
sponsored by StorPool
EBOOK: Read this detailed Migrate VMs to KVM: A how-to guide to understand the benefits and process of migrating VMs from common hypervisors to cloud-first stacks powered by KVM. It includes a detailed step-by-step process and a Command List.
Posted: 09 Jul 2024 | Published: 09 Jul 2024

TOPICS:  .NET
StorPool

Computer Weekly - 21 September 2021: The cities planning for ethical use of AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now.
Posted: 21 Sep 2021 | Published: 21 Sep 2021

TechTarget ComputerWeekly.com

Charting the Path to NIS2 Compliance
sponsored by Omada
WHITE PAPER: This white paper examines how the EU's NIS2 Directive impacts organizations and provides guidance on preparing for compliance. It highlights the role of identity governance in meeting NIS2 requirements around access control, risk management, and incident response. Read the full white paper to learn more.
Posted: 31 Jan 2025 | Published: 31 Jan 2025

All resources sponsored by Omada

Security Think Tank: Biden's Cyber Security Plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TechTarget ComputerWeekly.com