Open Shortest Path First Protocol White Papers

(View All Report Types)
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Router Essentials
sponsored by Global Knowledge
WHITE PAPER: Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Emerging Multicast VPN Applications
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
Posted: 25 Nov 2008 | Published: 25 Nov 2008

Juniper Networks, Inc.

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Application Delivery Network Buyers' Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 15 Mar 2021 | Published: 18 Feb 2021

TechTarget ComputerWeekly.com

Computer Weekly – 21 August 2018: Delivering the potential of the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we hear from early adopters of internet of things technologies about how to deliver on the potential of IoT. We examine strategies for combining hyper-converged infrastructure and cloud storage to best effect. And we find out how the UK government intends to use data to improve Britain's railways. Read the issue now.
Posted: 08 Feb 2021 | Published: 17 Aug 2018

TechTarget ComputerWeekly.com

A network automation roadmap to reap tech's best benefits
sponsored by TechTarget Networking
EBOOK: A network automation roadmap can help guide organizations through the Wild West of modern networking in order to reap benefits that automation can bring to employees, customers and partners. Reducing labor-intensive tasks does entail changing a network engineer's work, though.
Posted: 09 Sep 2021 | Published: 06 Sep 2021

TechTarget Networking

The IT Leader’s Guide to Securing Work from Anywhere
sponsored by Zscaler
WHITE PAPER: Enable secure work from anywhere with a zero trust approach. Learn how to provide fast, reliable access to apps, prevent data loss, and optimize user experience - all without extending the network perimeter. Read the full white paper to discover how.
Posted: 13 Aug 2024 | Published: 13 Aug 2024

Zscaler

How Security and User Experience Can Power Your Hybrid Workforce’s Productivity
sponsored by Zscaler
WHITE PAPER: While it facilitates great flexibility, hybrid work also opens the door to many security risks for your organization. For insights to help you secure your organization's hybrid workforce and boost productivity, check out this white paper.
Posted: 13 Aug 2024 | Published: 20 Aug 2024

Zscaler

Zero Standing Privilege
sponsored by CyberFOX
WHITE PAPER: Cybersecurity threats are on the rise, and businesses must take action to protect their data. This e-book explores the top cyber risks, the costs of breaches, and how to implement a Zero Trust security model with Privileged Access Management (PAM). Access the e-book to learn how to secure your organization and minimize risk.
Posted: 04 Oct 2024 | Published: 04 Oct 2024

CyberFOX

Next generation network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.
Posted: 08 Feb 2021 | Published: 21 Mar 2018

TechTarget ComputerWeekly.com

The Dark Side of SD Wan
sponsored by Cato Networks
RESOURCE: There’s a glow on the upsides of SD-WAN, but there’s also a “dark side” that must be considered. Companies looking to SD-WAN to replace traditional MPLS have to learn how to design the middle and last miles of their SD-WAN to run reliably and with high availability. View this Cato Networks guide to learn how it’s done.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

TOPICS:  WAN
Cato Networks

PAM Buyer’s Guide
sponsored by StrongDM
WHITE PAPER: Priviliged access management (PAM) was built for a time when it was easy to manage the privileges of a select few, but times have changed. This buyer’s guide analyzes the offerings of legacy PAM players and identifies where their shortcomings can expose enterprises to business and security risks. Read on to learn more.
Posted: 06 Mar 2024 | Published: 06 Mar 2024

TOPICS:  .NET
StrongDM

Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 08 Feb 2021 | Published: 02 Sep 2016

TechTarget ComputerWeekly.com

The Observability Pipeline: Should You Build Your Own Observability Pipeline?
sponsored by Cribl.io
BUYER'S GUIDE: This buyer’s guide explores alternative build strategies for implementing an observability pipeline on top of other popular open-source projects like Fluentd, Logstash, or Apache NiFi, and compares that to an out-of-the-box approach. Access the guide.
Posted: 06 Feb 2024 | Published: 07 Feb 2024

TOPICS:  .NET
Cribl.io

UNIT 42 Managed Services Threat Report Summary
sponsored by Palo Alto Networks
RESEARCH CONTENT: The MITRE Engenuity Unit 42 team identified a sophisticated attack involving APT10 and BlackCat groups. The report details the attack vectors, malware analysis, and recommendations to enhance your security posture. Read the full report to understand the impact and mitigate the risk of similar attacks.
Posted: 05 Oct 2024 | Published: 05 Oct 2024

Palo Alto Networks

CVE-2021-2035 and RDBMS Scheduler Security
sponsored by Spinnaker Support
RESEARCH CONTENT: This white paper analyzes CVE-2021-2035 in Oracle Database's Scheduler. It discusses the attack surface, needed privileges, and defense strategies like limiting scheduler access, setting up SQLNet, and encrypting credentials. Discover how to protect your Oracle Database by reading the complete paper.
Posted: 04 Jun 2024 | Published: 04 Jun 2024

TOPICS:  .NET
Spinnaker Support

The Ciso’s Guide To Overcoming Cybersecurity Challenges
sponsored by Insight
EBOOK: From growing costs and complexity to constantly-evolving cyberthreats, cybersecurity is becoming a bigger challenge for organizations. In this ebook, read tips from a CISO about overcoming the challenges of modern cybersecurity and the traits of a winning strategy for any industry.
Posted: 31 Mar 2023 | Published: 31 Mar 2023

TOPICS:  .NET
Insight

API Management: The role of APis in digital business transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.
Posted: 08 Feb 2021 | Published: 09 Nov 2020

TechTarget ComputerWeekly.com

IT OT Convergence
sponsored by TeamViewer
PRODUCT OVERVIEW: With Industry 4.0 and a growing need to transform existing processes, industrial sectors are transcending towards connected ecosystems. But a convergence of IT and operational technology (OT) isn’t always as easy as it seems. Discover how TeamViewer Tensor addresses this with a unified, single window access to all IT and OT assets in this resource.
Posted: 14 Dec 2023 | Published: 14 Dec 2023

TOPICS:  .NET
TeamViewer

Protecting your organisation from itself
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.
Posted: 08 Feb 2021 | Published: 06 Jan 2017

TechTarget ComputerWeekly.com

CISO Success Stories: How security leaders are tackling evolving cyber threats
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.
Posted: 18 Jan 2024 | Published: 19 Jan 2024

TechTarget ComputerWeekly.com

Top 10 ASEAN IT stories of 2020
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The booming digital economies of Southeast Asia showed much resilience in 2020, from tapping open source, data analytics and DevOps, to fending off cyber criminals who came knocking on their doors, all in the midst of an unprecedented pandemic. Here are Computer Weekly's top 10 ASEAN IT stories of 2020:
Posted: 08 Feb 2021 | Published: 11 Jan 2021

TechTarget ComputerWeekly.com

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
EBOOK: Due to the sensitive data they contain, applications are often the target of cyberattacks – and unfortunately, application security approaches are rarely equipped to handle today’s threats. Read this e-book to learn how to modernize your application security approach.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

TOPICS:  Cybersecurity
Veracode, Inc.

Developing A Strategy For Your Network Modernization
sponsored by Cloudflare
EBOOK: Evaluate the scope of your network modernization project, and consider key use cases like branch connectivity, protecting public-facing infrastructure, simplifying the corporate network, and connecting, and securing public clouds.
Posted: 02 Mar 2024 | Published: 02 Mar 2024

Cloudflare

Data Modeling Guidebook
sponsored by HighByte
EBOOK: Digital transformation is providing an unprecedented amount of predictive insights, but making the best use of this data can be daunting. Check out HighByte’s e-book to gain a better understanding of how data modeling works, what it looks like, how it works with existing standards, and to gather tips on how to establish a data modeling strategy.
Posted: 04 Apr 2022 | Published: 04 Apr 2022

TOPICS:  .NET
HighByte

Migrate from CentOS Linux to Red Hat Enterprise Linux on Microsoft Azure
sponsored by Red Hat
WHITE PAPER: Choose an OS & cloud provider to back your business. Red Hat Enterprise Linux on Azure offers a smart, robust hybrid cloud base. Standardize on one OS for easier management, enhanced security & support. Learn how switching your OS/cloud provider can yield 32% more efficient IT & 24% cost savings in this white paper.
Posted: 27 Dec 2023 | Published: 27 Dec 2023

TOPICS:  .NET
Red Hat

Migrate from CentOS Linux to Red Hat Enterprise Linux on Microsoft Azure
sponsored by Red Hat
PRODUCT OVERVIEW: This product overview explores how to migrate from CentOS Linux to the enterprise-ready Red Hat Enterprise Linux on Microsoft Azure. Read on now to find out how you can gain security, performance, and support benefits while streamlining your cloud journey.
Posted: 09 Sep 2024 | Published: 09 Sep 2024

Red Hat

Mastering Observability and Security Data Mgmt
sponsored by Cribl.io
WHITE PAPER: Observability data is growing exponentially, posing challenges for IT ops, SREs, and security teams. In this e-book, you’ll discover how observability pipelines can abstract data sources, control costs, and boost visibility to help manage explosive data growth. Download to the full e-book now to learn more.
Posted: 08 Jun 2024 | Published: 08 Jun 2024

TOPICS:  .NET
Cribl.io