ITU-T White Papers

(View All Report Types)
The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

How to Slash Corporate Fax Telephone Charges 20 - 80%: Overview of V.34 Faxing and JBIG Document Compression
sponsored by FaxBack, Inc.
WHITE PAPER: An in-depth look at V.34 high-speed fax and JBIG document compression technology...designed to save companies significant money in reducing fax telephone charges.
Posted: 18 Sep 2003 | Published: 01 May 2004

FaxBack, Inc.

5g And Security
sponsored by Reply
WHITE PAPER: Supply chain risks, interdependencies with critical systems: these are two of the five major threats to 5G security that this white paper breaks down. To learn all about those dangers and how to face them, download the paper.
Posted: 25 Jul 2023 | Published: 25 Jul 2023

TOPICS:  .NET
Reply

Learning Guide - Do You Need a Fax Server?
sponsored by FaxBack, Inc.
WHITE PAPER: This whitepaper provides an introduction to network faxing, discusses fax server technology in general and current research on faxing trends.
Posted: 04 Nov 2003 | Published: 01 Dec 2003

FaxBack, Inc.

Video conferencing standards and interoperability considerations
sponsored by TechTarget Security
EGUIDE: Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

TechTarget Security

Cyber Security Trends 2017 ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.
Posted: 08 Feb 2021 | Published: 17 Jul 2017

TechTarget ComputerWeekly.com

Presentation Transcript: Driving Collaboration Efficiency - H.264 High Profile
sponsored by Polycom, Inc.
PRESENTATION TRANSCRIPT: Polycom continues bringing leading-edge, standards-based technologies to visual communication. This is an advantage that resonates across all applications and industries.  Read this transcript to learn how Less Delivers Much More!
Posted: 27 Sep 2010 | Published: 27 Sep 2010

Polycom, Inc.

CW Europe - August Edition
sponsored by TechTarget ComputerWeekly.com
EZINE: Has the 2007 assault on the Wi-Fi network of the US based TJX retail group shocked corporations enough to take note and ensure their networks are actually secure?CW Europe investigates the dip in high-profile security breaches, across the region.
Posted: 29 Jul 2013 | Published: 29 Jul 2013

TOPICS:  Security | Wi-Fi
TechTarget ComputerWeekly.com

CW ASEAN: Time to dial up defences
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
Posted: 08 Feb 2021 | Published: 08 Mar 2018

TechTarget ComputerWeekly.com

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018

TOPICS:  Telephones | VoIP
TechTarget ComputerWeekly.com

SSL Decryption: Uncovering The New Infrastructure Blind Spot
sponsored by Gigamon
WHITE PAPER: SSL is vital but it limits visibility for monitoring. Find out how to build trusted cloud services and SSL connections.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

TOPICS:  IT Management
Gigamon

Jargon Buster Guide to Unified Communications
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.
Posted: 08 Feb 2021 | Published: 26 Oct 2017

TechTarget ComputerWeekly.com

Signals And Noise: The New Normal In Cyber-Security
sponsored by Mimecast
WHITE PAPER: Cybersecurity is a top priority for Boards and the C-Suite. Download this white paper to strengthen your security posture with executive level guidance from Economist Impact.
Posted: 10 Jan 2022 | Published: 10 Jan 2022

TOPICS:  .NET
Mimecast

A Computer Weekly buyer's guide to datacentre cooling
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Effective cooling methods are essential for the running of the datacentre. In this 16-page buyer's guide, Computer Weekly looks at how to power them efficiently, the potential of a shift to liquid cooling systems and the most cost-effective methods of datacentre cooling.
Posted: 08 Feb 2021 | Published: 05 Jun 2020

TechTarget ComputerWeekly.com

How Covid-19 is affecting the colocation market
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide shares details of some of the latest trends and thinking in colocation, while also shining a light on how datacentre operators are rushing to meet the soaring demand for compute capacity they are seeing both from enterprises and hyperscale cloud firms.
Posted: 08 Feb 2021 | Published: 15 Sep 2020

TechTarget ComputerWeekly.com

CW APAC: Trend Watch - business response to coronavirus
sponsored by TechTarget ComputerWeekly.com
EZINE: With countries the world over reeling from the Covid-19 coronavirus outbreak, which has meant sweeping changes both economically and socially, Computer Weekly looks at how firms in the Asia-Pacific region have adapted to what has so quickly become the new normal.
Posted: 08 Feb 2021 | Published: 14 May 2020

TechTarget ComputerWeekly.com

A Computer Weekly buyer’s guide to datacentre cooling
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Effective cooling methods are essential for the running of the datacentre. In this 16-page buyer's guide, Computer Weekly looks at how to power them efficiently, the potential of a shift to liquid cooling systems and the most cost-effective methods of datacentre cooling.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

TechTarget ComputerWeekly.com

How Covid-19 is affecting the colocation market
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide shares details of some of the latest trends and thinking in colocation, while also shining a light on how datacentre operators are rushing to meet the soaring demand for compute capacity they are seeing both from enterprises and hyperscale cloud firms.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

TechTarget ComputerWeekly.com

Computer Weekly – 6 August 2013: Tech startups inspiring retail IT innovations
sponsored by TechTarget ComputerWeekly.com
EVENT: In this week's Computer Weekly, we talk to department store John Lewis about working with tech startups to improve its multichannel retail strategy. As PC sales slump, we hear from companies moving to non-Windows devices. And the final part of our buyer's guide to data management looks at the benefits of predictive analytics.
Posted: 02 Aug 2013 | Published: 06 Aug 2013

TechTarget ComputerWeekly.com

Collaboration: RFP Technology Decisions Guide
sponsored by TechTarget Security
EGUIDE: Part two of SearchUnifiedCommunications.com's three-part guide on collaboration products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the process.
Posted: 11 May 2012 | Published: 11 May 2012

TechTarget Security

Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 May 2020

TechTarget ComputerWeekly.com

Virtualizing Network Functions: Could NFV Mean Network Nirvana?
sponsored by TechTarget Networking
EBOOK: This Technical Guide on network functions virtualization covers NFV basics, how NFV fits into existing network systems and how to write an NFV request for proposal (RFP) to get you what you need.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

TechTarget Networking

Securing Australia’s cyber future
sponsored by Mimecast
EBOOK: According to a recent study 77% of Australian companies were affected by ransomware attacks over the last year. This e-book looks at the state of cybersecurity in Australia, analyzing how current cybercrime trends are affecting organizations, and what strategies organizations can use to overcome them. Read on to learn more.
Posted: 17 Jan 2023 | Published: 18 Jan 2023

TOPICS:  .NET
Mimecast

CW Europe – January Edition
sponsored by TechTarget ComputerWeekly.com
EZINE: Find out what analysts are predicting for technology in Europe this year, including changes in budgets and how companies can reduce costs and improve sustainability.
Posted: 07 Jan 2013 | Published: 07 Jan 2013

TechTarget ComputerWeekly.com

Business Continuity Management Systems
sponsored by TechTarget ComputerWeekly.com
BOOK: Brush-up you knowledge of the practical aspects of business continuity management with this book extract.
Posted: 17 Dec 2012 | Published: 13 Dec 2012

TechTarget ComputerWeekly.com