Micro Electro-mechanical Devices White Papers

(View All Report Types)
CW Europe – June-August 2019: Why are Dutch companies slow to take up the advantages of IoT?
sponsored by TechTarget ComputerWeekly.com
EZINE: Rapid adoption of the latest technologies is not only being encouraged by governments, but driven by them. Being the first country to set up the ideal environment for a new technology has huge economic advantages.
Posted: 08 Feb 2021 | Published: 13 Jun 2019

TechTarget ComputerWeekly.com

Zero Trust Demystified: Pragmatic Guidance on Best Practices and Pitfalls to Strengthen Your Security
sponsored by Progress Software Corporation
WHITE PAPER: This whitepaper aims to demystify Zero Trust, empowering IT executives, practitioners, and engineers to navigate through the best practices while skillfully evading potential pitfalls. Read the white paper.
Posted: 17 May 2024 | Published: 17 May 2024

TOPICS:  .NET
Progress Software Corporation

All-Flash: The Essential Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This guide offers a comprehensive survey of the all-flash array market. We look at all-flash products from the big six storage vendors and the startups and specialists. Plus, we give the lowdown on all-flash vs hybrid flash arrays and all-flash vs server-side PCIe SSD.
Posted: 08 Feb 2021 | Published: 19 Aug 2016

TechTarget ComputerWeekly.com

Edge and Industrial IoT at Scale
sponsored by SUSE
EBOOK: In this 57-page Gorilla Guide you’ll learn how to employ best practices in edge computing that include the use of open source platforms, the integration of information technology (IT) and operations technology (OT) and the use of validated designs. Access the guide.
Posted: 02 May 2024 | Published: 02 May 2024

TOPICS:  .NET
SUSE

Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.
Posted: 08 Feb 2021 | Published: 24 May 2019

TechTarget ComputerWeekly.com

Critical Scalability: Trend Micro Security Predictions for 2024
sponsored by Trend Micro
RESEARCH CONTENT: To review security predictions for 2024 – which concern generative AI, machine learning models and much more – tap into this 19-page research report by Trend Micro.
Posted: 05 Apr 2024 | Published: 05 Apr 2024

TOPICS:  .NET
Trend Micro

Why zero trust is IT security's best hope
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.
Posted: 08 Feb 2021 | Published: 21 Feb 2020

TechTarget ComputerWeekly.com

MicroScope – February 2020: The power to transform
sponsored by MicroScope
EZINE: In this issue, MicroScope asks experts what to expect in 2020, and the channel shares why change is necessary to thrive in different business environments
Posted: 08 Feb 2021 | Published: 03 Feb 2020

MicroScope

NVMe flash storage 101
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
Posted: 08 Feb 2021 | Published: 31 Mar 2017

TechTarget ComputerWeekly.com

INNOVATION How SF6 Alternatives And Digital Technologies Combine To Empower Electricity Decarbonization And Efficiency
sponsored by Schneider Electric
WHITE PAPER: Read this 22-page e-book to understand how the combination of removing the sulfur hexafluoride greenhouse gas (SF6) from networks and the deployment of connected digital technologies can help you make meaningful progress toward electricity decarbonization and efficiency.
Posted: 02 Jul 2024 | Published: 02 Jul 2024

Schneider Electric

Trust no one: Why zero trust security is taking the world by storm
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.
Posted: 18 Feb 2022 | Published: 18 Feb 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to edge datacentres
sponsored by TechTarget ComputerWeekly.com
EBOOK: Edge datacentres seem set for a post-pandemic resurgence. In this 17-page buyer's guide, Computer Weekly looks at what makes them such an appealing option, the role infrastructure as code has to play and what's driving company adoption.
Posted: 12 May 2022 | Published: 12 May 2022

TechTarget ComputerWeekly.com

Digital Remote Monitoring And Dispatch Services’ Impact On Edge Computing And Data Centers
sponsored by Schneider Electric
WHITE PAPER: Digital remote monitoring services are transforming edge computing and data centers. New technologies like AI and machine learning enable proactive maintenance, reduced downtime, lower costs. Read this analyst report to learn requirements of next-gen monitoring platforms. Access the full report to optimize operations.
Posted: 29 Mar 2024 | Published: 29 Mar 2024

TOPICS:  .NET
Schneider Electric

Buyer’s Guide to Unified SASE
sponsored by Fortinet, Inc.
BUYER'S GUIDE: This 20-page buyer's guide helps organizations understand key requirements and questions to ask SASE vendors to support use cases like secure remote access, SaaS access and more. Read on to learn how to evaluate SASE solutions.
Posted: 27 Jun 2024 | Published: 02 Aug 2024

Fortinet, Inc.

The importance of assuring the digital experience in delivering business services Spotlight Paper by Bloor Author Daniel Howard March 2023 Software AG CONNX and StreamSets Data Integration
sponsored by Cisco
EBOOK: To mitigate risk, organizations must take complete ownership of the entire service delivery chain that their business relies on. In this eBook, discover how your organization can implement a continuous approach to the service lifecycle, leveraging automated incident analysis, diagnostics, remediation, forecasting, and recommendations.
Posted: 11 Oct 2024 | Published: 11 Oct 2024

Cisco

MicroScope: Grasp the social networking opportunity
sponsored by MicroScope
EZINE: An issue looking at the issues around social media, the growth in unclouding and some security industry predictions for the year ahead.
Posted: 08 Feb 2021 | Published: 02 Jan 2018

MicroScope

Privileged Access Management
sponsored by One Identity
ANALYST REPORT: Read this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  Access Control
One Identity

Computer Weekly – 20 October 2020: Why is IBM splitting in two and what does it mean for CIOs?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.
Posted: 08 Feb 2021 | Published: 20 Oct 2020

TechTarget ComputerWeekly.com

How to prepare your network for IoT data challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide outlines how business requirements will affect your IoT network build, takes a deep dive into specific IoT network architecture and explores IoT topology options.
Posted: 08 Feb 2021 | Published: 03 Oct 2019

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to blockchain technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 08 Feb 2021 | Published: 16 Oct 2019

TechTarget ComputerWeekly.com

Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

Top 10 cloud stories 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While cloud has established itself as the preferred way for many enterprises to consume IT resources, organisations in some vertical markets have taken markedly longer to come round to its charms. With this as a backdrop, Computer Weekly takes a look at the top 10 cloud stories of 2018.
Posted: 08 Feb 2021 | Published: 03 Jan 2019

TechTarget ComputerWeekly.com

Higher Education eBook
sponsored by Schneider Electric
EBOOK: Aging data centers and outdated systems aren’t equipped to provide a modern experience for students and faculty members. So how can you evolve out of your complex, legacy infrastructure? This e-book explores higher education trends driving modernization and the steps you can take to get there. Read on to learn more.
Posted: 07 Jun 2023 | Published: 07 Jun 2023

TOPICS:  .NET
Schneider Electric

A Computer Weekly Buyer's Guide to Next-Generation Storage
sponsored by TechTarget ComputerWeekly.com
EBOOK: Storage needs are ever increasing—and data volumes constantly expanding. How are today's systems accommodating these capacity demands? In this buyer's guide, Computer Weekly experts look at the evolution of storage systems and how they meet processing demands, the continuing role of all-flash arrays, and how to buy the best storage investment.
Posted: 08 Feb 2021 | Published: 11 Apr 2017

TechTarget ComputerWeekly.com

How Modern DCIM Addresses CIO Management Challenges within Distributed, Hybrid IT Environments
sponsored by Schneider Electric
WHITE PAPER: In this white paper, explore the evolution of enterprise IT portfolios and corresponding management challenges... and how DCIM software can help maintain the foundation for hybrid data center environments with distributed IT infrastructure.
Posted: 09 Mar 2023 | Published: 09 Mar 2023

TOPICS:  .NET
Schneider Electric