V.29 Standards Reports

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

How to Slash Corporate Fax Telephone Charges 20 - 80%: Overview of V.34 Faxing and JBIG Document Compression
sponsored by FaxBack, Inc.
WHITE PAPER: An in-depth look at V.34 high-speed fax and JBIG document compression technology...designed to save companies significant money in reducing fax telephone charges.
Posted: 18 Sep 2003 | Published: 01 May 2004

FaxBack, Inc.

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Successful Mobile Deployments Require Robust Security
sponsored by Lopez Research
WHITE PAPER: Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 20 May 2009 | Published: 20 May 2009

Lopez Research

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

CW Middle East July to Sept 2016
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.
Posted: 08 Feb 2021 | Published: 18 Jul 2016

TechTarget ComputerWeekly.com

API Management: The role of APis in digital business transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.
Posted: 08 Feb 2021 | Published: 09 Nov 2020

TechTarget ComputerWeekly.com

How do Iconic Business Models such as Airbnb Emerge?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Brands such as Airbnb disrupt industries and change how consumers think about the market, according to this research from Cass Business School, City University London.
Posted: 08 Feb 2021 | Published: 16 Mar 2016

TechTarget ComputerWeekly.com

The currency of trust: why banks and insurers must make customer data safer and more secure
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
Posted: 08 Feb 2021 | Published: 25 Apr 2017

TechTarget ComputerWeekly.com

Meeting the challenges of AI workloads with the Dell AI portfolio
sponsored by Dell Technologies and Microsoft
ANALYST REPORT: Discover how Dell's AI portfolio can help you address the challenges of AI workloads. Explore their server options, storage solutions, and professional services that can support your AI journey. Read the full report to learn more.
Posted: 05 Feb 2025 | Published: 05 Feb 2025

Dell Technologies and Microsoft

Meeting the challenges of AI workloads with the Dell AI portfolio
sponsored by Dell Technologies and Microsoft
WHITE PAPER: Dell's AI portfolio helps address the challenges of AI workloads through powerful compute, storage, and services. Benchmark testing shows Dell servers outperform HPE in AI performance. Learn more about Dell's comprehensive AI offerings in this report.
Posted: 05 Feb 2025 | Published: 05 Feb 2025

Dell Technologies and Microsoft

Meeting the challenges of AI workloads with the Dell AI portfolio
sponsored by Dell Technologies and Microsoft
ANALYST REPORT: Dell's AI portfolio helps address the challenges of AI workloads through powerful compute, storage, and services. Benchmark testing shows Dell servers outperform HPE in AI performance. Learn more about Dell's comprehensive AI offerings in this report.
Posted: 26 Feb 2025 | Published: 05 Feb 2025

Dell Technologies and Microsoft

Meeting the challenges of AI workloads with the Dell AI portfolio
sponsored by Dell Technologies and Microsoft
ANALYST REPORT: Dell's AI portfolio helps address the challenges of AI workloads through powerful compute, storage, and services. Benchmark testing shows Dell servers outperform HPE in AI performance. Learn more about Dell's comprehensive AI offerings in this report.
Posted: 21 Feb 2025 | Published: 05 Feb 2025

Dell Technologies and Microsoft

The Modern Guide To OAuth
sponsored by FusionAuth
EBOOK: This guide explores OAuth 2.0 implementation, covering authorization modes, grants, and real-world uses. It provides code examples and insights into secure authentication workflows for web and mobile apps. Learn to handle tokens, refresh access, and implement device authorization. Read this e-book to master OAuth and build secure applications.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

FusionAuth

The AI Disruption: Challenges and Guidance for Data Center Design
sponsored by Schneider Electric
WHITE PAPER: Artificial intelligence (AI) deployments are taking up an increasingly large portion of data center workloads. This paper explains relevant attributes and trends of AI workloads and describes the resulting data center challenges, including Guidance for how to address these challenges. Read on to learn more.
Posted: 25 Jan 2024 | Published: 26 Jan 2024

TOPICS:  .NET
Schneider Electric

Security by design: How Verizon approaches 5G security.
sponsored by Verizon
WHITE PAPER: As 5G enables new capabilities, security is a key design feature. This white paper examines Verizon's approach to 5G security, including enhancements over 4G, private 5G networks, and alignment with CISA guidelines. Read the full white paper to learn how Verizon is securing 5G for public and private sector organizations.
Posted: 19 Nov 2024 | Published: 20 Nov 2024

Verizon

WellNow Urgent Care rapidly boosts capacity with clinically-enabled virtual care
sponsored by Fabric Health
CASE STUDY: Learn how WellNow Urgent Care adopted a clinical automation and virtual-first strategy that led to 2.11 times greater capacity for virtual visits, an average savings of 8:44 minutes in clinical time per visit, and achieving virtual visit volume targets within just 30 days (~250 visits per day).
Posted: 29 Aug 2024 | Published: 29 Aug 2024

Fabric Health

No deal Brexit: Ideal or Ordeal?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.
Posted: 08 Feb 2021 | Published: 28 Feb 2019

TechTarget ComputerWeekly.com

UPS Systems Reliable, Scalable Power Solutions, Protecting Critical Applications Worldwide.
sponsored by Panduit
PRODUCT OVERVIEW: Intelligent UPS systems provide critical power backup and protection against surges. Panduit offers line-interactive and true online double-conversion options with lithium-ion or VRLA batteries, hot-swappable capabilities, and management software. Discover how Panduit's UPS solutions ensure continuity in data centers.
Posted: 18 Mar 2025 | Published: 18 Mar 2025

Panduit

Computer Weekly – 23 May 2023: How to secure your software supply chain
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
Posted: 19 May 2023 | Published: 23 May 2023

TechTarget ComputerWeekly.com

Computer Weekly – 23 July 2019: How Apollo 11 influenced modern computing
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.
Posted: 08 Feb 2021 | Published: 23 Jul 2019

TechTarget ComputerWeekly.com

The Power Of Patient Insights In Modern Healthcare
sponsored by Dovetail
EBOOK: Discover how healthcare organizations balance HIPAA compliance with patient research to improve outcomes. This e-book explores AI integration in research, patient journey mapping, and strategies for protecting data while gaining insights. Learn how Dovetail helps providers create a patient-centered approach.
Posted: 02 Apr 2025 | Published: 02 Apr 2025

Dovetail

The Aragon Research Globe for Intelligent Unified Communications and Collaboration, 2025
sponsored by Avaya
RESEARCH CONTENT: Aragon Research's latest Globe for Intelligent Unified Communications and Collaboration examines 14 major providers as AI transforms the industry. With intelligent assistants and agents powering UC&C platforms, omni-channel communications are crucial for business. Read the report to discover the leading providers in integrated communications.
Posted: 27 Mar 2025 | Published: 28 Mar 2025

Avaya

Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE: David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

The patient experience (PX) revolution in healthcare
sponsored by TalkDesk
WHITE PAPER: Influenced by their consumer interactions, patients now expect easy, seamless, and personalized healthcare experiences.Gain insights from our major global research survey that show how healthcare providers are rethinking and repositioning contact centers in support of a reimagined PX.
Posted: 22 Nov 2022 | Published: 02 Aug 2022

TalkDesk

Gamma International: The Macedonia files
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

Computer Weekly – 23 October 2018: Where next for digital identity?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Oct 2018

TechTarget ComputerWeekly.com

CTI Maturity-driven TIP Buyer’s Guide
sponsored by EclecticIQ
BUYER'S GUIDE: This buyer's guide helps organizations align their threat intelligence platform (TIP) selection with their current and desired cyber threat intelligence (CTI) maturity levels. Discover essential TIP features, operational requirements, and deployment options to meet stakeholder needs. Read the guide to choose the right TIP for your CTI practice.
Posted: 10 Feb 2025 | Published: 24 Jan 2025

EclecticIQ

The IT Automation Imperative
sponsored by Red Hat
EBOOK: Every automation journey is unique, but some best practices find success across businesses and industries. You can find those best practices in the form of this 16-page e-book, 5 Steps to Automate Your Business. Access the full e-book now to unlock key insights.
Posted: 15 Mar 2025 | Published: 15 Mar 2025

TOPICS:  .NET
Red Hat

Technology, media and telecommunications predictions 2017
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Deloitte predicts the key trends in technology, media and telecommunications in 2017
Posted: 08 Feb 2021 | Published: 11 Jan 2017

TechTarget ComputerWeekly.com