Relational Modeling with UML
sponsored by IBM Software Group
WHITE PAPER:
This white paper explains the basic concepts behind relational modeling, how it applies to databases and how it is implemented using UML.
Posted: 20 Jun 2007 | Published: 01 Jan 2003
|
|
|
7 Types of Hard CISSP Exam Questions and How to Approach Them
sponsored by Global Knowledge
WHITE PAPER:
Learn about the seven types of hard questions you are likely to see on the CISSP examination and the best approaches for solving them.
Posted: 03 Apr 2006 | Published: 01 Mar 2006
|
|
|
The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER:
Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008
|
|
|
Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER:
The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008
|
|
|
Managing Storage: Trends, Challenges, and Options
sponsored by EMC Corporation
WHITE PAPER:
With the explosion of data, storage environments are becoming more complex. Poorly designed storage infrastructures are putting companies at risk. Download this study to learn how storage managers built stronger storage management teams and environments.
Posted: 31 Jul 2006 | Published: 01 Jul 2006
|
|
|
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER:
The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005
|
|
|
Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server
sponsored by Veritas
WHITE PAPER:
Learn about a comprehensive technology for customers that want quick recovery and off-host backup support. Eliminate backup windows, reduce the performance load on application servers, and quickly bring applications back online after data c...
Posted: 19 Nov 2007 | Published: 01 Mar 2007
|
|
|
Observability engineering
sponsored by Honeycomb
EBOOK:
Observability is critical for managing today's software.This O'Reilly e-book presents 321 pages of expert insights on the state of observability engineering, giving you the information you need to understand the most prevalent trends and strategies. Read on to learn more.
Posted: 17 Sep 2024 | Published: 17 Sep 2024
|
|
|
The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022
|
|
|
Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
sponsored by TechTarget ComputerWeekly.com
RESOURCE:
This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
Posted: 08 Feb 2021 | Published: 06 Nov 2019
|
|
|
Index Engines’ CyberSense Validated 99.99% Effective In Detecting Ransomware Corruption
sponsored by Index Engines
ESG TECHNICAL VALIDATION REPORT:
This Enterprise Strategy Group technical analysis validates that Index Engines' CyberSense AI-powered data analysis can detect ransomware corruption in backups with 99.99% accuracy. The report concludes it is an effective solution for organizations seeking to improve ransomware detection. Read the ESG report to learn more.
Posted: 03 Oct 2024 | Published: 03 Oct 2024
|
|
|
Improve cyber resiliency and protect data from cyber ransomware threats by using an isolated vault, AI-based ML analytics software, and more
sponsored by Index Engines
WHITE PAPER:
Improve cyber resilience and protect data from ransomware threats with Dell PowerProtect Cyber Recovery's isolated vault, AI-based analytics, and recovery capabilities. Download this white paper to learn how you can strengthen your data protection strategy.
Posted: 31 Oct 2024 | Published: 01 Nov 2024
|
|
|
IDC: Business Value of Google Cloud VMware Engine Report
sponsored by Google
WHITE PAPER:
Digital business leaders are relying more heavily on multicloud environments to meet the requirements of specific workloads with the best choice of infrastructure and cloud services. However, managing disparate environments adds complexity, which can be difficult for many workloads.
Posted: 29 May 2024 | Published: 29 May 2024
|
|
|
Bolster your data protection plan with a fast-acting, more robust cyber recovery solution
sponsored by Index Engines
WHITE PAPER:
Dell PowerProtect Cyber Recovery offers physical isolation and deep ransomware scanning. It can provide fast recovery with options to restore data to production or recovery environments. Read the full white paper to learn how Dell's solution could bolster your data protection plan.
Posted: 31 Oct 2024 | Published: 01 Nov 2024
|
|
|
AI tools for software developers: Part One
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?
Posted: 08 Feb 2021 | Published: 11 Jun 2019
|
|
|
Think Big, Start Small, Scale Fast: The Data Engineering Workbook
sponsored by HighByte
EBOOK:
In this interactive workbook, you’ll discover 10 steps accompanied by some brief questions that are designed to help industrial leaders learn how they can leverage data engineering strategies to get the most out of their data. Read on to learn how you can unlock hidden business value.
Posted: 19 Dec 2023 | Published: 20 Dec 2023
|
|
|
It Leaders Are Considering A New Support And Services Model
sponsored by Rimini Street
RESEARCH CONTENT:
CIOs and CTOs face challenges with their IT support, noting issues like poor accountability and expertise. They're exploring a shift to a single provider for support and managed services. Discover their priorities and the advantages of this IT model in the full report.
Posted: 16 Aug 2024 | Published: 16 Aug 2024
|
|
|
HighByte Intelligence Hub version 3.2: A complete UNS and data engineering toolset
sponsored by HighByte
WHITE PAPER:
In this white paper, you’ll discover a software solution designed to provide organizations will all the necessary components to build and manage a Unified Namespace (UNS). Read on to learn how you can maximize the value and accessibility of your industrial data.
Posted: 22 Dec 2023 | Published: 22 Dec 2023
|
|
|
Computer Weekly - 29 October 2019: IR35 reforms - the difficult decisions facing IT contractors
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.
Posted: 08 Feb 2021 | Published: 29 Oct 2019
|
|
|
Evolve Faster Than the Threat
sponsored by Sonatype
WHITE PAPER:
This white paper examines cyber threats to software supply chains and open source components, noting the increased attack surface due to third-party code use. It recommends automating open source governance in the development lifecycle to mitigate risks. Read the white paper here.
Posted: 23 Mar 2024 | Published: 23 Mar 2024
|
|
|
2024 Assessment Report
sponsored by Bitdefender
RESEARCH CONTENT:
Cybersecurity threats are evolving, with AI-powered attacks and cloud security challenges at the forefront. This report examines the state of cloud security, the impact of AI, and the need for proactive, multilayered defense strategies. Download the report to gain insights into navigating these new cybersecurity frontiers.
Posted: 04 Jul 2024 | Published: 04 Jul 2024
|
|
|
A guide to continuous software delivery
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Software empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.
Posted: 30 Aug 2022 | Published: 30 Aug 2022
|
|
|
Cisco ThousandEyes End User Monitoring: Third-party analysis
sponsored by Cisco ThousandEyes
FORRESTER TOTAL ECONOMIC IMPACT REPORT:
This white paper examines the total economic impact of Cisco ThousandEyes End User Monitoring. Learn how ThousandEyes can help you secure remote access, improve productivity, and enhance IT efficiency. Read the full Forrester Total Economic Index to discover the benefits.
Posted: 08 Aug 2024 | Published: 08 Aug 2024
|
|
|
CW APAC: Tech career guide – women in IT
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, focused on tech careers for women in the Asia-Pacific region, Computer Weekly looks at what can be done to attract more women into software development.
Posted: 13 Dec 2022 | Published: 15 Dec 2022
|
|
|
Put AI To Work For People Leverage The Power of Artificial Intelligence to Transform Business
sponsored by ServiceNow
ANALYST REPORT:
Discover how generative AI can transform your business processes. Learn to leverage AI for faster summarization, personalization, and better decision-making. Explore the benefits and best practices for implementing AI solutions. Read the full Analyst Report.
Posted: 23 Aug 2024 | Published: 23 Aug 2024
|
|
|
Computer Weekly – 18 October 2016: Singapore aims to become a digital leader
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how the city-state of Singapore is investing in skills and technology to become a leading digital nation. We examine how to prevent legacy IT becoming a hindrance to digital transformation. And we look at the impact of controversial new tax rules on the UK's IT contractor community. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Oct 2016
|
|
|
eBook Copilot for Microsoft
sponsored by Zones, Inc.
PRODUCT OVERVIEW:
Discover how Microsoft Copilot can enhance productivity across your Microsoft 365 apps, from streamlining executive workflows to empowering sales and marketing teams. Learn how this AI-powered tool can transform your business. Read the e-book to explore the full potential of Copilot.
Posted: 05 Aug 2024 | Published: 06 Aug 2024
|
|
|
The Complete Secure Access Service Edge (SASE) Guide
sponsored by Fortinet, Inc.
TECHTARGET MEDIA:
This guide explores the Secure Access Service Edge (SASE) architecture, including how it differs from SD-WAN and security service edge (SSE). Learn about the benefits, challenges, and use cases of SASE to determine if it's the right choice for your organization. Read the full guide to understand this cloud-based network security model.
Posted: 09 Aug 2024 | Published: 09 Aug 2024
|
|
|
Pulsant Case Study
sponsored by Morpheus Data
CASE STUDY:
Pulsant, a UK infrastructure provider, adopted Morpheus to manage its hybrid cloud services. This enabled them to automate provisioning, reduce technical debt, and offer clients greater flexibility in accessing cloud resources. Read the full case study to learn how Pulsant transformed its cloud operations.
Posted: 17 Jul 2024 | Published: 18 Jul 2024
|
|
|
Private/Hybrid Cloud – Data Center Solutions
sponsored by Morpheus Data
ANALYST REPORT:
The report analyzes the evolving private/hybrid cloud management and resiliency platform markets, highlighting key trends like AI/ML integration and cloud cost optimization. It provides insights into leading vendors and their capabilities to help enterprises make informed decisions. Read the full report to learn more.
Posted: 24 Jul 2024 | Published: 24 Jul 2024
|
|
|
CW Middle East July-Sept 2019: SAP project drives digital transformation for Saudi Arabia's largest auto company
sponsored by TechTarget ComputerWeekly.com
EZINE:
It's not just the countries of the Middle East that have a plan when it comes to digital transformation. Private businesses are also overhauling their systems. One such company is the automotive division of Saudi Arabia's Abdul Latif Jameel Company (ALJC), which has completed one of the biggest SAP projects ever undertaken in the auto sector.
Posted: 08 Feb 2021 | Published: 11 Jul 2019
|
|
|
CW APAC - June 2021: Career guide to cloud computing
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, Computer Weekly looks at the skills required for cloud professionals to succeed in an evolving industry, the risk to jobs posed by automation and the disciplines being taught at Future Tech Academy
Posted: 21 Jun 2021 | Published: 21 Jun 2021
|
|