NAT White Papers

(View All Report Types)
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola Solutions

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

How to solve overlapping IPs, NAT, and other challenges at scale in the cloud
sponsored by Aviatrix Systems
WEBCAST: Organizations building their enterprise workloads and applications in the cloud have extensive requirements to make them available to various kinds of consumers. Meeting these requirements can bring equally extensive challenges. Watch this webinar to learn how to solve overlapping IPs, NAT and other challenges at scale.
Posted: 01 Nov 2021 | Premiered: Sep 7, 2021

TOPICS:  .NET
Aviatrix Systems

Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017

TechTarget ComputerWeekly.com

A reference architecture for the IoE
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Analyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).
Posted: 08 Feb 2021 | Published: 03 Oct 2016

TechTarget ComputerWeekly.com

Session Border Controllers
sponsored by Ribbon Communications
EBOOK: What are session border controllers (SBCs), and how do they function in a communications strategy? For answers, and for a deep dive on SBCs, tap into this 47-page e-book.
Posted: 31 Jan 2024 | Published: 31 Jan 2024

TOPICS:  .NET
Ribbon Communications

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 08 Feb 2021 | Published: 09 May 2017

TechTarget ComputerWeekly.com

Computer Weekly – 5 September 2023: Met Police data platform goes £64m over budget
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal a £64m cost over-run for the Metropolitan Police's new record management system. Our latest buyer's guide looks at the issues around integrating SaaS applications. And a leading flash storage firm says the age of spinning disk drives is almost over – are they right? Read the issue now.
Posted: 01 Sep 2023 | Published: 05 Sep 2023

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

Containerized Deployments On Amazon Web Services
sponsored by TIBCO
DATA SHEET: Preparing your organization for the cloud requires a level of security and agility that some enterprises find difficult to maintain. Check out this data sheet to examine how your enterprise can safely and swiftly launch into the cloud leveraging containerized deployments on Amazon Web Services (AWS).
Posted: 09 Jun 2022 | Published: 10 Jun 2022

TOPICS:  .NET
TIBCO

Computer Weekly – 26 September 2017: Building on legacy IT
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, experts at VMworld 2017 discussed how to adapt legacy IT to make the most of modern technology – we listened in. Artificial intelligence is touted as an aid to decision-making, but it needs to be handled with care. And we learn how Wales has become a hotspot for cyber security innovation. Read the issue now.
Posted: 08 Feb 2021 | Published: 22 Sep 2017

TechTarget ComputerWeekly.com

Moving Beyond Fragmented Cloud Security with Unified SASE
sponsored by Fortinet, Inc.
WHITE PAPER: As organizations adopt hybrid work and multi-cloud environments, fragmented cloud security adds complexity. Unified SASE offers a consolidated approach. Read the full white paper to learn more.
Posted: 10 Sep 2024 | Published: 11 Sep 2024

Fortinet, Inc.

Rumble Cloud’s Pricing Predictability vs. the Big 3 Clouds’ Pricing Volatility
sponsored by Rumble Cloud
WHITE PAPER: Explore the predictability of Rumble Cloud's cloud pricing with this white paper. Learn how to plan for and manage your cloud costs effectively. Read the full white paper to discover strategies for cloud pricing transparency.
Posted: 02 Aug 2024 | Published: 03 Aug 2024

Rumble Cloud

Enhance Cloud Networking with Rumble Cloud's OpenStack Solution
sponsored by Rumble Cloud
EBOOK: An organization’s cloud infrastructure is only as strong as its cloud networking enables it to be. Rumble Cloud, built on OpenStack, offers comprehensive networking solutions that cater to diverse business needs. Download this e-book to explore Rumble Cloud’s networking.
Posted: 19 Jun 2024 | Published: 19 Jun 2024

TOPICS:  .NET
Rumble Cloud

Enable Deep Visibility for Applications, Users, and Devices With FortiGate Next-Generation Firewalls
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW: With the death of the network perimeter, cybercriminals have proven that every asset is a potential entry point for an attack. FortiGate Next-Generation Firewalls
Posted: 29 Mar 2023 | Published: 29 Mar 2023

TOPICS:  .NET
Fortinet, Inc.

You’re Under SIP Attack: Limiting SIP Vulnerabilities
sponsored by Ribbon Communications
WHITE PAPER: Without the necessary expertise, monitoring, and management, companies could be leaving their network vulnerable to exploitation through their VoIP communications. Read this white paper to understand hackers’ tactics and motivations to help your enterprise operators secure their networks from attack.
Posted: 31 Jan 2024 | Published: 31 Jan 2024

TOPICS:  .NET
Ribbon Communications

An Integrated Approach to Managing Edge using GitOps, Fleet and Akri
sponsored by SUSE
WHITE PAPER: This white paper provides an overview of how GitOps, Fleet, and Akri can help manage edge infrastructure at scale. This integrated approach automates deployments, reduces errors, and improves visibility across diverse edge environments. Read the full research content to learn more.
Posted: 01 May 2024 | Published: 01 May 2024

TOPICS:  .NET
SUSE

Migrate to AWS using Ansible Automation Platform
sponsored by Red Hat
PRODUCT OVERVIEW: Streamline cloud migration and management with Ansible Automation Platform on AWS. Orchestrate, operationalize, and govern cloud workflows across your hybrid environment. Learn how to automate deployment, migration, and ongoing operations with Ansible validated content for AWS.[Read the full overview]
Posted: 13 Jun 2024 | Published: 13 Jun 2024

Red Hat

Red Hat Ansible Automaton Platform
sponsored by Red Hat
EBOOK: In this e-book, discover everything you need to get started with Ansible Automation Platform, including key automation concepts, product features and capabilities, use cases for gaining value quickly, and strategies for implementing organization-wide automation.
Posted: 25 Jun 2024 | Published: 25 Jun 2024

TOPICS:  .NET
Red Hat

The SUSE Guide to Edge Computing in a Cloud Native World 2022
sponsored by SUSE
EBOOK: What really is edge computing? And how are near edge, far edge and tiny edge different? This guide explains what edge computing means for your business and how you can take advantage of it in a cloud native world. Read it here.
Posted: 19 Sep 2022 | Published: 20 Sep 2022

TOPICS:  .NET
SUSE

UCaaS Buyers’ Checklist
sponsored by 8x8
PRODUCT OVERVIEW: The best unified communications as a service (UCaaS) tools offer a range of transformative capabilities, from personalized meeting rooms to built-in security and encryption. Use this checklist to benchmark the most important features against your organization’s UCaaS requirements.
Posted: 31 May 2024 | Published: 31 May 2024

TOPICS:  .NET
8x8

A Computer Weekly e-guide to SASE
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 29 Jul 2021 | Published: 28 Jul 2021

TechTarget ComputerWeekly.com

A Computer Weekly Buyer's Guide to Internet of Things Security
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.
Posted: 08 Feb 2021 | Published: 07 Feb 2017

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to big data architecture
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Big data architecture is increasingly proving its worth in business. In this 14-page buyer's guide, Computer Weekly looks at the storage needs that come with artificial intelligence, how to get the most out of data and what it can do to enhance a company's performance.
Posted: 08 Feb 2021 | Published: 10 Sep 2019

TechTarget ComputerWeekly.com

Computer Weekly buyer's guide to mobile app development
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
Posted: 08 Feb 2021 | Published: 27 Feb 2018

TechTarget ComputerWeekly.com

Computer Weekly – 29 January 2019: A vintage digital transformation for Majestic Wines
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the digital transformation of retailer Majestic Wines and find out how buying rival Naked Wines led to a cloud overhaul of the firm's IT. We look at the challenges for IT managers as they prepare for the end of Windows 7 support. And our buyer's guide discusses deep learning technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Jan 2019

TechTarget ComputerWeekly.com

The Buyer’s Guide to SASE Use Cases
sponsored by Cloudflare
WHITE PAPER: If you are responsible for your organization’s digital modernization strategy, optimizing IT costs, delivering highly-performant and secure modern networks, or improving threat resilience, read The Buyer’s Guide to SASE Use Cases now.
Posted: 25 Sep 2024 | Published: 25 Sep 2024

TOPICS:  .NET
Cloudflare