Open Systems Interconnection Protocols White Papers

(View All Report Types)
The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER: Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Router Essentials
sponsored by Global Knowledge
WHITE PAPER: Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

How to Implement an OSS Governance Program
sponsored by Anaconda
WHITE PAPER: Just like all software, open-source carries risk, and many data science teams still lack security protocols. For some, there simply aren’t security protocols or governance tools for open-source software (OSS). Read on to learn about 6 steps you can take to build an OSS governance program that works for data science and set your team up for success.
Posted: 10 Jul 2023 | Published: 11 Jul 2023

TOPICS:  .NET
Anaconda

Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

TechTarget ComputerWeekly.com

7 types of networks and their use cases
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A computer network is an interconnected system of devices, represented as network nodes, that share information, data and resources among each other. Not all networks are the same. In this e-guide, learn about the seven most common types of networks, their benefits and use cases.
Posted: 06 Jul 2022 | Published: 06 Jul 2022

TechTarget ComputerWeekly.com

Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019

TechTarget ComputerWeekly.com

NVMe flash storage 101
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
Posted: 08 Feb 2021 | Published: 31 Mar 2017

TechTarget ComputerWeekly.com

Computer Weekly – 22 January 2019: Moving beyond network boundaries
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Jan 2019

TechTarget ComputerWeekly.com

Computer Weekly - 7 July 2020: The privacy challenges of easing lockdown
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Jul 2020

TechTarget ComputerWeekly.com

Why Your Operating System Still Matters
sponsored by Red Hat
EBOOK: In this e-book, discover an extensive overview of why the operating system—and specifically the Linux operating system—still matters today and how it meets modern IT and business demands.
Posted: 26 Jun 2024 | Published: 26 Jun 2024

TOPICS:  .NET
Red Hat

The Path to Secure and Productive Work in Financial Institutions
sponsored by Island
INFOGRAPHIC: As financial services organizations face challenges like interconnected systems, evolving regulations, and sophisticated cyberattacks, they must balance productivity, security, and compliance. Learn how the Enterprise Browser can help address these critical issues in the infographic.
Posted: 07 Feb 2025 | Published: 07 Feb 2025

Island

CW Benelux November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up.
Posted: 08 Feb 2021 | Published: 09 Nov 2017

TechTarget ComputerWeekly.com

Aerospace And Defense Mercury Systems
sponsored by SWPL
CASE STUDY: Mercury Systems used Mendix's low-code platform to create a digital thread linking manufacturing systems across the product lifecycle. By centralizing data from various tools, they developed 20 applications to boost transparency, speed delivery, and drive innovation. Learn how their portal provides engineers with comprehensive product views.
Posted: 03 Apr 2025 | Published: 03 Apr 2025

SWPL

A Computer Weekly buyer's guide to deep learning
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Deep learning can help companies operate faster and more efficiently. In this 13-page buyer'sguide, Computer Weekly looks at the advanced tools available for developers building intelligentapps, the frameworks that can be used and the kit that can enhance a programmer's toolbox.
Posted: 08 Feb 2021 | Published: 28 Feb 2019

TechTarget ComputerWeekly.com

Zero Trust Strategies for Branches Campuses Factories
sponsored by Zscaler
EBOOK: Lateral movement is a critical security threat in interconnected IoT and OT environments. Traditional solutions like firewalls and VLANs leave gaps. Zscaler Zero Trust Device Segmentation offers an agentless approach, isolating each device in its own "network of one," preventing threat spread. Read this e-book now to learn more.
Posted: 09 Apr 2025 | Published: 15 Apr 2025

Zscaler

Enterprise Guide to Open-Source Security with Python, R, and Anaconda
sponsored by Anaconda
EBOOK: Open-source software offers many benefits, but also introduces new security risks. This guide covers best practices for managing open-source packages, dependencies, and vulnerabilities to secure your Python and R software supply chain. Access the e-book now to learn more.
Posted: 19 Jul 2024 | Published: 22 Jul 2024

Anaconda

Digital secure remote payment: How Apple Pay can change the future of remote payments
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
Posted: 08 Feb 2021 | Published: 27 Mar 2018

TechTarget ComputerWeekly.com

Top 10 ASEAN IT stories of 2020
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The booming digital economies of Southeast Asia showed much resilience in 2020, from tapping open source, data analytics and DevOps, to fending off cyber criminals who came knocking on their doors, all in the midst of an unprecedented pandemic. Here are Computer Weekly's top 10 ASEAN IT stories of 2020:
Posted: 08 Feb 2021 | Published: 11 Jan 2021

TechTarget ComputerWeekly.com

Trend Watch: Generative AI in APAC
sponsored by TechTarget ComputerWeekly.com
EZINE: Organisations are starting to incorporate generative AI into their everyday processes. In this handbook, focused on GenAI in the Asia-Pacific region, Computer Weekly looks at how it's being deployed in healthcare, Australia's GenAI journey, the technology's relationship with the cloud and Red Hat's issues with source code.
Posted: 17 Nov 2023 | Published: 17 Nov 2023

TechTarget ComputerWeekly.com

Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

Infographic: 5 essential open source cybersecurity tools for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.
Posted: 17 Feb 2022 | Published: 17 Feb 2022

TechTarget ComputerWeekly.com

AI to advance Swedish military systems
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rapid advance of artificial intelligence (AI) and machine learning is poised to play an ever-increasing role in the development of next-generation military systems. Swedish report into use of artificial intelligence in military systems reveals opportunities and concerns. Read the story now.
Posted: 08 Feb 2021 | Published: 19 Aug 2019

TechTarget ComputerWeekly.com

Datacentre Management: The latest thinking on good datacentre management practice
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we've pulled together some of the latest thinking on good datacentre management practice, while shining a light on the tools and technologies that are on the market (or in the pipeline) that can help enterprises run their facilities with greater ease and agility.
Posted: 08 Feb 2021 | Published: 06 Nov 2017

TechTarget ComputerWeekly.com

How open source is spurring digital transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: From Linux to Kubernetes, open source has been key to efforts by organisations across APAC to transform digitally. In this e-guide, read how Malaysia's AmBank is using open source to engineer its software from the ground-up, ANZ Bank's move to Red Hat OpenShift, and what suppliers are doing to support deployments of containerised applications.
Posted: 14 May 2021 | Published: 14 May 2021

TechTarget ComputerWeekly.com

CrowdStrike outage explained: What happened and what can we learn?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A botched content update released by CrowdStrike in July 2024 led to a massive IT outage affecting about 8.5 million Windows systems worldwide. In this e-guide, learn more about how the outage occurred, its impact on organisations around the globe, and what you can do to mitigate the risks of similar incidents in future.
Posted: 04 Aug 2024 | Published: 05 Aug 2024

TechTarget ComputerWeekly.com

Hacking the Human Operating System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 08 Feb 2021 | Published: 27 Feb 2017

TechTarget ComputerWeekly.com