CMIP over Logical Link Control White Papers

(View All Report Types)
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Router Essentials
sponsored by Global Knowledge
WHITE PAPER: Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER: Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

How enterprise networks use WAN virtualization
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Virtualization is the backbone of network management in modern enterprises. Surprisingly, in most enterprises, virtualization came to the WAN last, but it arrived with enormous sophistication. SD-WAN is the most common form of WAN virtualization. But virtual WAN strategies are evolving to include software-defined perimeter and cloud concepts.
Posted: 01 Jul 2022 | Published: 01 Jul 2022

TOPICS:  WAN
TechTarget ComputerWeekly.com

IGA Buyers Guide
sponsored by OpenText
BUYER'S GUIDE: As digital transformation widens access to sensitive data, organizations must bolster identity governance. This guide covers assessing access control maturity, applying least-privilege principles, and automating workflows to protect digital assets. Discover how to enhance your identity governance strategy.
Posted: 23 Aug 2024 | Published: 23 Aug 2024

OpenText

Atlassian Cloud Architecture And Operational Practices
sponsored by Atlassian
WHITE PAPER: This white paper explores Atlassian's cloud architecture and operational practices, including their use of AWS, availability zones, data backups, and security controls. Read on now to learn how Atlassian ensures tenant separation and data encryption to safeguard customer data in the cloud.
Posted: 24 Oct 2024 | Published: 24 Oct 2024

Atlassian

Towards more robust internetworks
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.
Posted: 08 Feb 2021 | Published: 02 Feb 2017

TechTarget ComputerWeekly.com

Computer Weekly - 15 February 2022: On a mission to track space junk
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the space experts tracking orbital debris using graph database technology. We meet the startups taking very different approaches in trying to develop commercial quantum computers. And we ask why it's so difficult to build a data science team and how to overcome the challenges. Read the issue now.
Posted: 11 Feb 2022 | Published: 15 Feb 2022

TechTarget ComputerWeekly.com

The development of wired and wireless LANs in a hybrid work model
sponsored by TechTarget ComputerWeekly.com
EBOOK: Many companies have found that as they have begun to manage the return to offices for the first time since the first lockdown were introduced, the office environment and its demands are very different to a year ago. These different demands are seen in the development of wired and wireless local area networks (LANs).
Posted: 06 Jul 2022 | Published: 06 Jul 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to continuous integration and continuous deployment
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Continuous integration and continuous deployment offer a variety of advantages for software developers. In this 13-page buyer's guide, Computer Weekly looks at what changes are in its pipeline, assesses the cultural changes it brings and how it can deliver results at speed.
Posted: 08 Feb 2021 | Published: 17 Dec 2019

TechTarget ComputerWeekly.com

Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.
Posted: 08 Feb 2021 | Published: 15 Mar 2017

TechTarget ComputerWeekly.com

7 Reasons Rancher is the Enterprise Container Management Platform You Need
sponsored by SUSE
EBOOK: Container adoption is surging, and Kubernetes has become the go-to for managing container workloads. Yet, Kubernetes' complexity at scale is daunting. This white paper delves into how Rancher simplifies Kubernetes deployment and management. Read the white paper for 7 reasons why you should consider Rancher for your container management.
Posted: 30 Apr 2024 | Published: 30 Apr 2024

TOPICS:  .NET
SUSE

Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

Data governance more important now than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.
Posted: 08 Feb 2021 | Published: 11 Jun 2019

TechTarget ComputerWeekly.com

CW ANZ: Fix the weak links
sponsored by TechTarget ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jul 2018

TechTarget ComputerWeekly.com

Futureproof – how to get your business ready for the next disruption
sponsored by TechTarget ComputerWeekly.com
BOOK: This extract from the book, Futureproof – how to get your business ready for the next disruption, by Minter Dial, gives some invaluable career tips for IT and other professionals, looking to futureproof their careers.
Posted: 08 Feb 2021 | Published: 14 Dec 2017

TOPICS:  CIOs | Training
TechTarget ComputerWeekly.com

A Computer Weekly Buyer's Guide to Microsoft Office 365
sponsored by TechTarget ComputerWeekly.com
EBOOK: Microsoft Office used to be a simple thing. You'd buy a box of software, install Word, Excel, Outlook and PowerPoint – and that was it. But that all changed with the launch of Office 365. In this 13-page buyer's guide, Computer Weekly looks at Microsoft's subscription-based enterprise software offering.
Posted: 08 Feb 2021 | Published: 15 Nov 2017

TechTarget ComputerWeekly.com

An Integrated Approach to Managing Edge using GitOps, Fleet and Akri
sponsored by SUSE
WHITE PAPER: This white paper provides an overview of how GitOps, Fleet, and Akri can help manage edge infrastructure at scale. This integrated approach automates deployments, reduces errors, and improves visibility across diverse edge environments. Read the full research content to learn more.
Posted: 01 May 2024 | Published: 01 May 2024

TOPICS:  .NET
SUSE

Computer Weekly – 7 May 2024: Casting a critical eye on HMRC's IR35 checker tool
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we investigate what has been going on with the HMRC's Check Employment Status for Tax (CEST). We also speak to the CIO of Danfoss about making datacentres greener and explore the issue of restoring data and system backups after a ransomware or cyber attack. Read the issue now.
Posted: 06 May 2024 | Published: 07 May 2024

TechTarget ComputerWeekly.com

The Director's Guide to Observability: Leveraging OpenTelemetry in Complex Systems
sponsored by Honeycomb
WHITE PAPER: For a 13-page guide to observability in complex systems, review this white paper, which explores 3 layers of observability, observability workflows, and more.
Posted: 08 Apr 2024 | Published: 09 Apr 2024

TOPICS:  .NET
Honeycomb

The Future of Data Security Posture Management
sponsored by OpenText
WHITE PAPER: This white paper examines the evolution of data security posture management (DSPM) and how it can help organizations better protect their data. It explores the impact of AI on DSPM and how the platform can enable business growth by providing a robust data security foundation. Read the full white paper to learn more.
Posted: 10 Oct 2024 | Published: 10 Oct 2024

OpenText

MITRE Engenuity ATT&CK Evaluations : Quick Guide
sponsored by Trend Micro
RESEARCH CONTENT: MITRE ATT&CK is a public knowledgebase of adversarial tactics and techniques, widely used as a foundation when developing of specific cyber threat models and methodologies. This report presents the findings from a recent evaluation of Trend Micro Vision One through the MITRE ATT&CK framework. Download now to see more.
Posted: 05 Apr 2024 | Published: 05 Apr 2024

TOPICS:  .NET
Trend Micro

How OpenTelemetry and Semantic Telemetry Will Reshape Observability
sponsored by Honeycomb
WHITE PAPER: This white paper explores how OpenTelemetry and semantic telemetry are reshaping observability. It discusses the challenges of traditional telemetry, the benefits of semantic data, and how OpenTelemetry addresses the tradeoffs in observability. Read the full white paper to learn how these innovations can transform your observability practices.
Posted: 17 Sep 2024 | Published: 17 Sep 2024

Honeycomb

Resilient Cybersecurity with Network Detection and Response
sponsored by Progress Software Corporation
WHITE PAPER: Network Detection and Response (NDR) solutions have emerged to plug common gaps in cybersecurity protection. Discover NDR’s benefits, the NDR market landscape according to Gartner, and a review of the Progress Flowmon ADS solution in this white paper.
Posted: 16 May 2024 | Published: 16 May 2024

TOPICS:  .NET
Progress Software Corporation

A Computer Weekly Buyer's Guide to Next-Generation Storage
sponsored by TechTarget ComputerWeekly.com
EBOOK: Storage needs are ever increasing—and data volumes constantly expanding. How are today's systems accommodating these capacity demands? In this buyer's guide, Computer Weekly experts look at the evolution of storage systems and how they meet processing demands, the continuing role of all-flash arrays, and how to buy the best storage investment.
Posted: 08 Feb 2021 | Published: 11 Apr 2017

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to edge computing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Edge computing is currently one of the most important trends in IT. It is more likely to complement cloud by supporting workloads that are latency sensitive, require a lot of compute power, or involve large data volumes. In this 15-page buyer's guide, Computer Weekly looks at the potential of harnessing compute power at the edge.
Posted: 08 Feb 2021 | Published: 22 Jan 2020

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to robotic process automation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Robotic process automation is making its business value known in a variety of ways. In this 15-page buyer's guide, Computer Weekly looks at how how the market is ever-evolving, the security risks to guard against, and how RPA can spearhead a firm's digital transformation
Posted: 08 Feb 2021 | Published: 05 Nov 2019

TechTarget ComputerWeekly.com

Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.
Posted: 22 Sep 2023 | Published: 26 Sep 2023

TechTarget ComputerWeekly.com