W3 Consortium White Papers

(View All Report Types)
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

GFI EventsManager
sponsored by GFI Software
TRIAL SOFTWARE: GFI EventsManager collects data from all devices that use Windows event logs, W3C, and Syslog and applies the best rules and filtering in the industry to identify key data.
Posted: 22 Jun 2007 | Premiered: 01 Jun 2007

GFI Software

FAQ Presentation Transcript: Global Deduplication
sponsored by FalconStor Software
PRESENTATION TRANSCRIPT: Global data deduplication allows users to deduplicate data across multiple boxes, which can simplify management as companies back up more and more data. W. Curtis Preston, executive editor of the Storage Media Group, discusses the pros and cons of global deduplication, who should consider it, and which vendors are offering it today in this Q&A.
Posted: 19 Oct 2009 | Published: 19 Oct 2009

FalconStor Software

Snapshot technology for data backups: What to watch out for
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: Check out this expert Q&A from SearchStorage.com featuring W. Curtis Preston as he discusses 3 of the biggest challenges associated with snapshot technology for data backups. Find out the differences between a snapshot and a copy, how to tell if snapshots are right for your business and where to use snapshot in your storage environment.
Posted: 05 Oct 2010 | Published: 05 Oct 2010

Hewlett Packard Enterprise

CW EMEA – October 2023: Prepare for AI explosion
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at generative AI, which Accenture claims is the next big thing in enterprise IT. We also look at a demo of multi-supplier non-real-time RAN optimisation, a Ryder Cup tech testbed, and how Zurich Insurance has cut the time it takes to develop ServiceNow apps. Read the issue now.
Posted: 12 Oct 2023 | Published: 12 Oct 2023

TechTarget ComputerWeekly.com

Storage Magazine June 2010: Solid State vs. Disk
sponsored by TechTarget Storage
EZINE: The June 2010 cover story of Storage magazine provided insights on where solid state makes sense in today’s storage environments. This month’s issue also reveals the winners of our latest Quality Awards survey for backup and recovery software, best practices from W. Curtis Preston for backing up Microsoft SharePoint and much more.
Posted: 07 Jun 2010 | Published: 07 Jun 2010

TechTarget Storage

Use A Decentralized Identity Framework to Reduce Enterprise Risk
sponsored by Beta Systems
EGUIDE: Decentralized identity aims to eliminate this problem by allowing users to manage their own identities, eliminating the need for centralized data centers that provide value to hackers. Download this e-guide for an analysis of decentralized identity, explaining how it works, and how it helps fight identity theft.
Posted: 12 Oct 2022 | Published: 04 Oct 2022

TOPICS:  .NET
Beta Systems

Acronis vmProtect 6
sponsored by Acronis
TRIAL SOFTWARE: Built specifically for VMware vSphere™, Acronis® vmProtect™ 6 provides all the features you need in an extremely easy-to-use solution that can be deployed in minutes so you can start to perform your backup and recovery tasks.
Posted: 14 Dec 2011 | Premiered: 14 Dec 2011

Acronis

Storage Magazine: July-August 2010
sponsored by TechTarget Storage
ESSENTIAL GUIDE: To realize the full benefits of vSphere, you need networked storage. And when it comes to virtualized servers, iSCSI is viewed as the top choice over Fibre Channel. In this month's cover story, Eric Siebert goes under the hood of VMware vSphere to show you how to make iSCSI work for virtual machines plus other essential and informative articles.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

TechTarget Storage

Opposing Forces: The Fight for Ethernet
sponsored by TechTarget Networking
EZINE: Most enterprises can't get the most out of 802.11ac Wave 2. The problem is Ethernet speeds in the access layer: 1 GbE is too slow and 10 GbE too expensive. Could 2.5 and 5 GbE could be its salvation?
Posted: 02 Feb 2015 | Published: 30 Jan 2015

TechTarget Networking

LTO tape technology continues to evolve with LTO 5
sponsored by Spectra Logic Corporation
EGUIDE: Read this E-Guide today to discover why tape still plays a vital role in today's data-driven IT.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

Spectra Logic Corporation

Getting Down to Business with Mobile APM
sponsored by TechTarget Networking
EZINE: Mobile APM matures with more granular visibility than ever for mobile apps. Also discover what's behind the big push for 25 Gigabit Ethernet, plus new uses for SDN in wireless.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

TechTarget Networking

Antimalware IT Checklist: Decision Time Part 3
sponsored by TechTarget Security
EGUIDE: This is the third piece in SearchSecurity.com's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

TechTarget Security

Antimalware IT Checklist: From Business Problem to Technical Solution Part 1
sponsored by TechTarget Security
EGUIDE: In the first of SearchSecurity.com's three-part guide on selecting antimalware products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of antimalware solutions.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

TechTarget Security

Antimalware IT Checklist: RFP Technology Decisions Part 2
sponsored by TechTarget Security
EGUIDE: Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

TechTarget Security

Current networking trends increasingly shape the enterprise
sponsored by TechTarget Networking
EBOOK: Current networking trends continue to affect the traditional enterprise, as well as the approach to network education and management.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

TechTarget Networking

In-house Network Test Labs and SDN Switching Assessment
sponsored by Juniper Networks, Inc.
EGUIDE: Keeping an in-house network test lab up to date requires considerable expertise. Learn how to avoid the complexity of maintaining an internal lab by utilizing a virtual test environment. Additionally, learn how expert bloggers assess SDN switching at UNH InterOperability Laboratory.
Posted: 15 Nov 2016 | Published: 11 Nov 2016

Juniper Networks, Inc.

IoT technologies make inroads into manufacturing
sponsored by GE Digital
EGUIDE: Many manufacturing organizations are turning to the Internet of Things (IoT) for effective predictive analytics that can affect their respective bottom lines. But the IoT can do so much more. In this e-guide explore the diverse capabilities of the IoT.
Posted: 04 Mar 2016 | Published: 01 Mar 2016

GE Digital

Computer Weekly – 26 February 2013: European Commission targets data security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the new IT security proposals from the European Commission and ask whether the benefits will be worth it. We reveal the challenges of managing big data, with help from some industry analysts, and hear from the Open University CIO on IT tools that support learning. Read the issue now.
Posted: 25 Feb 2013 | Published: 26 Feb 2013

TechTarget ComputerWeekly.com

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks

Hardware is Dead; Long Live Hardware
sponsored by TechTarget Networking
EZINE: Will physical network gear disappear in the era of software-defined networking and virtualization? Not likely. In this month's issue of Network Evolution, find out why networks still need hardware, and how early adopters are using hardware in their virtual environments.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

TechTarget Networking

UCaaS-to-SaaS Cooperation Offers Competitive Edge
sponsored by TechTarget Networking
EZINE: In this edition of Network Evolution, find out how integrating your unified communications platform with mission-critical enterprise applications like Salesforce can provide significant competitive advantage by reducing human error and offering new insight into customer behavior.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

TechTarget Networking

Network Evolution E-Zine: New Architectures, Traditional Hardware: Why You Need Both
sponsored by TechTarget Networking
EZINE: This issue of Network Evolution will help network engineers assess the looming changes brought on by trends like network features virtualization, software-defined networking and WebRTC, determine how fast they might arrive, and guide them in determining how to keep physical networks functioning in the meantime.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

TechTarget Networking

An Introduction to Quantum Lifecycle Management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

TechTarget ComputerWeekly.com

CW Europe: CW Awards winners case studies
sponsored by TechTarget ComputerWeekly.com
EZINE: Find out the winners of the Computer Weekly European User Awards 2015. The awards aim to shine a light on businesses across Europe that have excelled in their approach to using technology.
Posted: 08 Sep 2015 | Published: 08 Sep 2015

TOPICS:  IT Management
TechTarget ComputerWeekly.com

Fast and Furious: Speedy Data Center Interconnect is in Demand
sponsored by TechTarget Networking
EZINE: In this issue of Network Evolution, we examine how demand from both service providers and enterprises for speedy, scalable interconnect links are driving upgrades -- whether from 1 Gbps to 10 Gbps, or from 10 Gbps to 100 Gbps -- and moving the data center interconnect market forward.
Posted: 03 Oct 2016 | Published: 03 Oct 2016

TechTarget Networking