TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER:
Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER:
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019
|
|
|
How to Implement an OSS Governance Program
sponsored by Anaconda
WHITE PAPER:
Just like all software, open-source carries risk, and many data science teams still lack security protocols. For some, there simply aren’t security protocols or governance tools for open-source software (OSS). Read on to learn about 6 steps you can take to build an OSS governance program that works for data science and set your team up for success.
Posted: 10 Jul 2023 | Published: 11 Jul 2023
|
|
|
Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022
|
|
|
The Observability Pipeline: Should You Build Your Own Observability Pipeline?
sponsored by Cribl.io
BUYER'S GUIDE:
This buyer’s guide explores alternative build strategies for implementing an observability pipeline on top of other popular open-source projects like Fluentd, Logstash, or Apache NiFi, and compares that to an out-of-the-box approach. Access the guide.
Posted: 06 Feb 2024 | Published: 07 Feb 2024
|
|
|
Your guide to the open source universe
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Open source used to be an alternative to commercial off –the-shelf software. Today, the largest commercial software providers are big supporters of open source technologies.
Posted: 08 Feb 2021 | Published: 29 Aug 2017
|
|
|
How Service Providers Can Be Successful With NFV Open Source
sponsored by netElastic Systems
EGUIDE:
Learn how to have a successful transition to NFV open source by gaining valuable insight on how open source for NFV applications will require service providers to adopt new ways of designing, deploying and supporting their network infrastructure.
Posted: 08 Feb 2021 | Published: 06 Dec 2017
|
|
|
Why Your Operating System Still Matters
sponsored by Red Hat
EBOOK:
In this e-book, discover an extensive overview of why the operating system—and specifically the Linux operating system—still matters today and how it meets modern IT and business demands.
Posted: 26 Jun 2024 | Published: 26 Jun 2024
|
|
|
Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019
|
|
|
Percona: Open-source, containers, and pandemics
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide: We explore how Percona have navigated themselves and the open-source industry through the pandemic. We also dive into Percona's advice about containerisation in enterprises.
Posted: 13 May 2021 | Published: 13 May 2021
|
|
|
CW Benelux November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE:
The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up.
Posted: 08 Feb 2021 | Published: 09 Nov 2017
|
|
|
A Computer Weekly Buyer's Guide to Enterprise Open Source
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this 13-page buyer's guide, Computer Weekly looks at open source technology. Discover more about why open source has become the infrastructure choice over commercial software; the due diligence required to reap the rewards of open source and how to choose the best fit for your needs.
Posted: 08 Feb 2021 | Published: 23 Feb 2016
|
|
|
Computer Weekly – 22 January 2019: Moving beyond network boundaries
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Jan 2019
|
|
|
CW ASEAN: Connect your people
sponsored by TechTarget ComputerWeekly.com
EZINE:
Unified collaboration (UC) is transforming the way business is done globally. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises are embracing UC tools, factors that organizations should consider when developing a UC strategy, and the emergence of startups that have been shaking up the marketplace.
Posted: 08 Feb 2021 | Published: 11 May 2018
|
|
|
Top 10 ASEAN IT stories of 2020
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The booming digital economies of Southeast Asia showed much resilience in 2020, from tapping open source, data analytics and DevOps, to fending off cyber criminals who came knocking on their doors, all in the midst of an unprecedented pandemic. Here are Computer Weekly's top 10 ASEAN IT stories of 2020:
Posted: 08 Feb 2021 | Published: 11 Jan 2021
|
|
|
Enterprise Guide to Open-Source Security with Python, R, and Anaconda
sponsored by Anaconda
EBOOK:
Open-source software offers many benefits, but also introduces new security risks. This guide covers best practices for managing open-source packages, dependencies, and vulnerabilities to secure your Python and R software supply chain. Access the e-book now to learn more.
Posted: 19 Jul 2024 | Published: 22 Jul 2024
|
|
|
Mastering FIX Monitoring for unparalleled trading performance
sponsored by ITRS Group Limited
WEBCAST:
In this webinar, discover how to optimize trading systems with unrivaled visibility through the partnership of ITRS and Luxoft. Revolutionize your trading systems for success with proactive, advanced monitoring solutions specifically designed for capital markets.
Posted: 21 Feb 2024 | Premiered: Feb 21, 2024
|
|
|
Infographic: 5 essential open source cybersecurity tools for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.
Posted: 17 Feb 2022 | Published: 17 Feb 2022
|
|
|
AI to advance Swedish military systems
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The rapid advance of artificial intelligence (AI) and machine learning is poised to play an ever-increasing role in the development of next-generation military systems. Swedish report into use of artificial intelligence in military systems reveals opportunities and concerns. Read the story now.
Posted: 08 Feb 2021 | Published: 19 Aug 2019
|
|
|
CW Middle East - April-June 2022: UAE and UK researchers work on 'trustworthy' cloud OS for datacentres
sponsored by TechTarget ComputerWeekly.com
EZINE:
Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.
Posted: 22 Mar 2022 | Published: 07 Apr 2022
|
|
|
A Computer Weekly buyer's guide to NoSQL
sponsored by TechTarget ComputerWeekly.com
EBOOK:
There's a lot of data out there, much of which doesn't need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer's guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used.
Posted: 08 Feb 2021 | Published: 28 Jul 2016
|
|
|
Meta-analysis: 70% reduction in HAPI incidence across 19K+ patients with this monitoring system
sponsored by Smith + Nephew
WHITE PAPER:
This meta-analysis tracks results across eight studies covering more than 34,711 patients, 19,136 of whom were monitored using the LEAF◊ Patient Monitoring System.
Posted: 01 Aug 2023 | Published: 16 Feb 2023
|
|
|
How open source is spurring digital transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
From Linux to Kubernetes, open source has been key to efforts by organisations across APAC to transform digitally. In this e-guide, read how Malaysia's AmBank is using open source to engineer its software from the ground-up, ANZ Bank's move to Red Hat OpenShift, and what suppliers are doing to support deployments of containerised applications.
Posted: 14 May 2021 | Published: 14 May 2021
|
|
|
Testing New Publishing System
sponsored by ERROR TEST
WHITE PAPER:
Preparing this resource to be approved and published when we do the switch to the new publishing system.
Posted: 15 Mar 2021 | Published: 15 Mar 2021
|
|
|
Hacking the Human Operating System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 08 Feb 2021 | Published: 27 Feb 2017
|
|
|
NVMe flash storage 101
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
Posted: 08 Feb 2021 | Published: 31 Mar 2017
|
|