General Attributes Registration Protocol White Papers

(View All Report Types)
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Router Essentials
sponsored by Global Knowledge
WHITE PAPER: Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016

TechTarget ComputerWeekly.com

Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017

TechTarget ComputerWeekly.com

The AI Disruption: Challenges and Guidance for Data Center Design
sponsored by Schneider Electric
WHITE PAPER: Artificial intelligence (AI) deployments are taking up an increasingly large portion of data center workloads. This paper explains relevant attributes and trends of AI workloads and describes the resulting data center challenges, including Guidance for how to address these challenges. Read on to learn more.
Posted: 25 Jan 2024 | Published: 26 Jan 2024

TOPICS:  .NET
Schneider Electric

Attack Surface Management
sponsored by Palo Alto Networks
EBOOK: With more cloud environments and digital assets in play than ever before, the enterprise attack surface has become increasingly complex and difficult to manage. This Attack Surface Management (ASM) for Dummies, e-book presents a coherent overview of ASM. Download now to unlock the extensive e-book and all the insights contained within it.
Posted: 07 Apr 2023 | Published: 08 Apr 2023

TOPICS:  .NET
Palo Alto Networks

A Computer Weekly buyer's guide to data protection
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.
Posted: 08 Feb 2021 | Published: 20 Aug 2019

TechTarget ComputerWeekly.com

Computer Weekly – 19 July 2016
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.
Posted: 08 Feb 2021 | Published: 19 Jul 2016

TechTarget ComputerWeekly.com

Computer Weekly – 5 June 2018: The bumpy ride to digital transformation
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the lessons to be learned from General Electric's bumpy ride to digital transformation. We assess the use of software-defined networking in corporate IT infrastructures. And we find out how Royal Bank of Scotland approaches digital and business innovation. Read the issue now.
Posted: 08 Feb 2021 | Published: 01 Jun 2018

TechTarget ComputerWeekly.com

Computer Weekly – 27 June 2017: Will mobile networks cope with the end of roaming charges?
sponsored by TechTarget ComputerWeekly.com
EZINE: Download this issue of Computer Weekly to discover how the industry must face up to the challenges of implementing the new rules, around mobile roaming charges.
Posted: 08 Feb 2021 | Published: 26 Jun 2017

TechTarget ComputerWeekly.com

Proactive Security Vision Report
sponsored by NetSPI
RESEARCH CONTENT: NetSPI's Proactive Security Vision Report analyzes top vulnerabilities across attack surfaces, revealing trends in web, mobile, and cloud security. The report offers insights on remediation challenges and hiring trends. Use this research to prioritize security efforts and improve vulnerability management. Read the full report for recommendations.
Posted: 01 Mar 2025 | Published: 01 Mar 2025

NetSPI

Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.
Posted: 21 Feb 2022 | Published: 22 Feb 2022

TechTarget ComputerWeekly.com

Making Sense of B2B Purchase Intent Data and Putting It to Use
sponsored by Informa TechTarget
EBOOK: Simply adopting a CRM system doesn’t guarantee better customer relationships. The data you put into the system matters. In this e-book, Patricia Anton, founder of Anton Consulting, Inc. discusses how you can bring together data, human processes and technology to create a competitive advantage.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  CRM
Informa TechTarget

Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016

TechTarget ComputerWeekly.com

Proactive Security Stories
sponsored by NetSPI
EBOOK: This e-book shares stories from NetSPI's security experts, highlighting critical vulnerabilities and unique security approaches. From exposing healthcare application source code to bypassing voice biometrics, these tales show the impact of expert penetration testing across industries. Read to gain insights into cutting-edge security practices.
Posted: 01 Mar 2025 | Published: 01 Mar 2025

NetSPI

CW EMEA - May 2023: The future of work
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now.
Posted: 10 May 2023 | Published: 11 May 2023

TechTarget ComputerWeekly.com

Top 3 Risks For DIY Auth In Regulated Industries
sponsored by FusionAuth
WHITE PAPER: This white paper examines the challenges of managing in-house authentication, particularly for regulated industries. It covers compliance, security, and the advantages of outsourcing. Discover how to select the right vendor and ensure a smooth transition. Read the full paper for insights on securing your organization's digital future.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

FusionAuth

Google Workspace CMMC Level 2 Conguration Guide
sponsored by Google Workspace
EBOOK: This guide provides instructions for configuring Google Workspace to meet CMMC Level 2 requirements. It covers security controls, implementation steps, and best practices for protecting CUI in cloud environments. Learn to leverage Google Workspace features to enhance cybersecurity and achieve compliance. Read the full eBook for guidance.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

Google Workspace

Computer Weekly – 25 April 2023: Aston Martin Formula One: Driven by data
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we speak to Aston Martin Formula One's Clare Lansley to find out how digital transformation helps the team to move further up the F1 grid. We explore how automation and AI is helping businesses tackle rising costs and also look into the maturity of Industry 4.0 initiatives. Read the issue now.
Posted: 21 Apr 2023 | Published: 25 Apr 2023

TechTarget ComputerWeekly.com

CW APAC, Sep 2021: Buyer's guide to robotic process automation
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at the adoption of robotic process automation in APAC and where the technology fits in the wider automation landscape
Posted: 16 Sep 2021 | Published: 16 Sep 2021

TechTarget ComputerWeekly.com

CW Middle East Oct to Dec 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: This year the Gitex event in Dubai had a focus on how technology is disrupting organisations across the Middle East. One of the main themes of discussion was smart cities and with Dubai recognised as a world leader, this was no surprise.
Posted: 08 Feb 2021 | Published: 12 Oct 2017

TechTarget ComputerWeekly.com

Top AI attack tactics and mitigations
sponsored by Amazon Web Services
WHITE PAPER: Download this solution brief for a few examples of AI security breaches being perpetrated by attackers and the AI-powered mitigations offered by cyber vendors.
Posted: 12 Dec 2024 | Published: 06 Jan 2025

Amazon Web Services

Top AI attack tactics and mitigations
sponsored by Amazon Web Services
WHITE PAPER: Download this solution brief for a few examples of AI security breaches being perpetrated by attackers and the AI-powered mitigations offered by cyber vendors.
Posted: 21 Dec 2024 | Published: 06 Jan 2025

Amazon Web Services

GRIT 2025 Ransomware & Cyber Threat Report
sponsored by GuidePoint Security
RESEARCH CONTENT: This comprehensive report analyzes the evolving ransomware and cybercrime threat landscape in 2024. It covers key trends, industry impacts, vulnerability analysis, and case studies. Learn how to improve post-compromise detection and stay ahead of these persistent threats. Read the full report.
Posted: 23 Jan 2025 | Published: 24 Jan 2025

GuidePoint Security

Digital Transformation & Care Enablement
sponsored by Fabric Health
WHITE PAPER: Solving healthcare's biggest challenges—including patient access and provider shortages—requires a comprehensive, virtual-first approach to care. Download Fabric's end-to-end Care Enablement Guide for a unique perspective on a unified virtual-first approach to healthcare transformation.
Posted: 26 Aug 2024 | Published: 15 Aug 2024

Fabric Health

NAS meets cloud and unstructured data challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.
Posted: 08 Feb 2021 | Published: 11 Jan 2019

TechTarget ComputerWeekly.com

Unit 42 Attack Surface Threat Report
sponsored by Palo Alto Networks
RESEARCH CONTENT: Explore the latest cybersecurity threats and vulnerabilities in the Unit 42 Attack Surface Threat Report. Uncover critical insights to strengthen your security posture. Read the full report for comprehensive analysis.
Posted: 11 Dec 2024 | Published: 11 Dec 2024

Palo Alto Networks