High Speed Token Ring White Papers

(View All Report Types)
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Emerging Multicast VPN Applications
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
Posted: 25 Nov 2008 | Published: 25 Nov 2008

Juniper Networks, Inc.

Motorola's Wireless Broadband Indoor/Outdoor Solution
sponsored by Motorola Solutions
WHITE PAPER: With a Wi-Fi network, businesses can increase the efficiency of their mobile employees resulting in increased ROI and greater profitability. This document highlights two specific indoor/outdoor Wi-Fi network configurations based on Motorola's MOTOMESH Duo product solution.
Posted: 28 Apr 2009 | Published: 02 Apr 2009

Motorola Solutions

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Router Essentials
sponsored by Global Knowledge
WHITE PAPER: Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

CW APAC - December 2020: Trend Watch on cloud infrastructure
sponsored by TechTarget ComputerWeekly.com
EZINE: The rise of 5G is driving telcos to embrace cloud-native and software-defined architectures. In this handbook focused on cloud infrastructure in the Asia-Pacific region, Computer Weekly looks at the slow and steady path businesses are taking to cloud-based radio access networks.
Posted: 08 Feb 2021 | Published: 17 Dec 2020

TechTarget ComputerWeekly.com

Infographic: Hybrid network vs. Hybrid network infrastructure
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Hybrid networks and hybrid network infrastructure blend different kinds of equipment, geographic locations, network ownership and technology disciplines. In this infographic, we highlight the main differences between the two models.
Posted: 02 Mar 2022 | Published: 02 Mar 2022

TechTarget ComputerWeekly.com

Practical Zero Trust Implementing Protections for High-Value Data
sponsored by Zentera Systems Inc.
EBOOK: This e-book offers a model for implementing a Zero Trust security strategy to protect high-value data. Learn to apply Zero Trust principles like segmentation, identity-based access, and continuous monitoring to secure sensitive information. Download the e-book for practical examples and a software-based approach to Zero Trust.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

CW APAC, March 2022: Trend Watch: Storage management
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how open source is shaping data storage management and this year’s emerging cloud supplier trends.
Posted: 17 Mar 2022 | Published: 17 Mar 2022

TechTarget ComputerWeekly.com

The changing mobile platform landscape
sponsored by TechTarget ComputerWeekly.com
EGUIDE: So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.
Posted: 08 Feb 2021 | Published: 18 Jan 2019

TechTarget ComputerWeekly.com

IAM: Managing identity remains key to cyber security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
Posted: 08 Feb 2021 | Published: 29 Aug 2019

TechTarget ComputerWeekly.com

Middle-Mile Networks The Digital Economy Enabler in Rural America
sponsored by Panduit
WHITE PAPER: Middle-mile networks are vital for connecting rural America to high-speed internet, supporting digital agriculture and growth. This paper examines bandwidth needs through 2030 under various scenarios, highlighting how optical technologies like coherent pluggable transceivers meet rural demands. Learn how these networks bridge the digital divide.
Posted: 17 Mar 2025 | Published: 18 Mar 2025

Panduit

Computer Weekly - 29 October 2019: IR35 reforms - the difficult decisions facing IT contractors
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.
Posted: 08 Feb 2021 | Published: 29 Oct 2019

TechTarget ComputerWeekly.com

The Definitive Guide to Serving Open Source Models
sponsored by Predibase
EBOOK: This e-book explores strategies for optimizing small language model inference, covering reliability, performance, and cost efficiency. Learn about GPU autoscaling, Turbo LoRA, FP8 quantization, and LoRA Exchange for better throughput and resource management. Discover how to build robust AI infrastructure for enterprise deployments.
Posted: 09 Mar 2025 | Published: 10 Mar 2025

Predibase

2024 Talkdesk Bank And Credit Union Contact Center Benchmark Report
sponsored by Talkdesk
RESEARCH CONTENT: The contact center has become one of the most important factors when it comes to customer retention in the banking sector. But it’s more than just achieving daily KPI’s, it’s about optimizing your services by focusing on the metrics that truly matter. Read on to learn about the five most important performance metrics for the call center.
Posted: 19 Jun 2024 | Published: 19 Jun 2024

TOPICS:  .NET
Talkdesk

The LLM Mesh: A Practical Guide to Using Generative AI in the Enterprise
sponsored by Dataiku
EBOOK: This data, from a 2024 Dataiku and Cognizant survey of 200 senior analytics and IT leaders, highlights that GenAI is a top priority at the highest level — nearly three-quarters of respondents (73%) will spend over $500,000 on the tech in the next 12 months.
Posted: 30 Aug 2024 | Published: 30 Aug 2024

Dataiku

Computer Weekly buyer's guide to mobile app development
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
Posted: 08 Feb 2021 | Published: 27 Feb 2018

TechTarget ComputerWeekly.com

5 Common Audit Processes You Can Automate in a Week
sponsored by Alteryx
EBOOK: McKinsey reports that 60% of the audit process can be partly or fully automated, reducing error rates (up to 16%) and saving analysts 26 hours per week. In this e-book, learn how to avoid fines, fees, and human error while achieving faster, scalable results by automating 5 key processes.
Posted: 22 Oct 2024 | Published: 22 Oct 2024

Alteryx

Computer Weekly – 16 May 2023: Microsoft and Google go into battle for enterprise AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as developments in generative AI accelerate, Microsoft and Google have each unveiled plans around enterprise applications. Nobody doubts the importance of digital transformation – but experts say it won't work without cultural change as well. Read the issue now.
Posted: 12 May 2023 | Published: 16 May 2023

TechTarget ComputerWeekly.com

2 types of endpoint encryption to protect data
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
Posted: 04 May 2022 | Published: 04 May 2022

TechTarget ComputerWeekly.com

CW APAC - November 2019: Expert advice on container security
sponsored by TechTarget ComputerWeekly.com
EZINE: For all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Nov 2019

TechTarget ComputerWeekly.com

2024 Talkdesk global contact center KPI benchmarking report
sponsored by Talkdesk
RESEARCH CONTENT: Today’s organizations are constantly looking for new ways that they can enhance their contact center processes in order to make operations more efficient. To do so, many have turned to generative AI and other automation tools. However, does this technology actually live up to the hype? Dig into this report.
Posted: 12 Jun 2024 | Published: 12 Jun 2024

TOPICS:  .NET
Talkdesk

Securing AI workloads on Dell PowerEdge with Intel® Xeon® processors using Intel® Trust Domain Extensions
sponsored by Dell Technologies & Intel
WHITE PAPER: This technical white paper offers guidance on implementing strong security measures and achieving peak performance for AI workloads. It focuses on two features provided by the 5th generation Intel® Xeon® processor: implementing advanced security measures using Intel® TDX and leveraging an AI accelerator called Intel® AMX.
Posted: 26 Feb 2025 | Published: 21 Feb 2025

Dell Technologies & Intel

Securing AI workloads on Dell PowerEdge with Intel® Xeon® processors using Intel® Trust Domain Extensions
sponsored by Dell Technologies & Intel
WHITE PAPER: This technical white paper offers guidance on implementing strong security measures and achieving peak performance for AI workloads. It focuses on two features provided by the 5th generation Intel® Xeon® processor: implementing advanced security measures using Intel® TDX and leveraging an AI accelerator called Intel® AMX.
Posted: 21 Feb 2025 | Published: 21 Feb 2025

Dell Technologies & Intel

AI Model Comparison: How to choose the best AI for you
sponsored by Luware
BUYER'S GUIDE: Explore a comprehensive comparison of AI models to find the best fit for your business needs. Discover key factors like accuracy, speed, scalability, and cost. Learn how leading AI models from Microsoft, Google, and AWS performed in a real-world email analysis scenario. Read the full Buyer's Guide to make an informed decision.
Posted: 20 Feb 2025 | Published: 21 Feb 2025

Luware

A Computer Weekly buyer's guide to perimeterless network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 08 Feb 2021 | Published: 05 Feb 2019

TechTarget ComputerWeekly.com

The Big Book of Genai 5 Ways to Leverage Your data to build Production-Quality GenAl Applications
sponsored by DataBricks
EBOOK: This 118-page e-book is a thorough guide to deploying GenAI applications. It details the entire GenAI process, from using foundation models to custom model pretraining and fine-tuning. Access the full e-book now to learn how you can unlock the potential of GenAI for your organization.
Posted: 07 May 2024 | Published: 21 Feb 2025

TOPICS:  .NET
DataBricks

Financial Planning's Transitional Phase: What to Expect
sponsored by Centage
EGUIDE: CFOs are transitioning away from spreadsheets to budgeting, planning and forecasting (BP&F) software. Change is difficult, but necessary to success. Learn why Hames Corp. CFO Max Rule considers himself a "change agent" and what that means, and discover the importance of BP&F software for streamlining business processes.
Posted: 08 Feb 2021 | Published: 29 Sep 2016

Centage

Identity Security for Software Development
sponsored by CyberArk
EBOOK: Whether you’re just starting your coding journey or a seasoned veteran, this e-book serves as a comprehensive resource for those who want to develop a deep understanding of secure coding principles and best practices. Read the O’Reilly e-book to understand today’s identity security and secure development essentials.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

CyberArk

Human-like AI quest drives general AI development efforts
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While AI technologies can do things humans can't, they're currently limited to specific and straightforward tasks. A big goal for developers is to create human-like AI tools that think the way people do. This guide compiles stories on the push toward human-like AI and the challenges that AI vendors and users must overcome.
Posted: 08 Feb 2021 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com