SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Secure Optimized Data Protection for Remote Offices
sponsored by Symantec Corporation
WHITE PAPER:
Learn how to protect remote office data while simplifying backup and recovery tasks. Be better prepared for and recover more easily from equipment failure, virus attack or accidental loss of vital files.
Posted: 24 Apr 2006 | Published: 01 Feb 2006
|
|
|
The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019
|
|
|
What’s Your Login Worth? Less Than a Latte
sponsored by CyberArk
WHITE PAPER:
Fact: Attackers can buy stolen credentials on the dark web for less than a cup of coffee. In this insightful piece by Archit Lohokare, General Manager of Workforce Solutions at CyberArk, learn how a bold new approach to identity security can secure your workforce from the first touchpoint to the last mile of the digital journey.
Posted: 02 Dec 2024 | Published: 02 Dec 2024
|
|
|
Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022
|
|
|
The State of Homegrown Authentication Report: 2025
sponsored by FusionAuth
RESEARCH CONTENT:
The inaugural State of Homegrown Authentication report reveals authentication insights, including about how teams are building login systems. Read the full research for detailed findings on authentication stacks and team dynamics.
Posted: 17 Apr 2025 | Published: 17 Apr 2025
|
|
|
Securing Access for High Risk Workforce Users
sponsored by CyberArk
WEBCAST:
Join this session to uncover how modern privilege has evolved, how attackers are exploiting workforce identities, and what you can do to strengthen security and keep high-risk users protected.
Posted: 25 Mar 2025 | Premiered: Mar 25, 2025
|
|
|
Empowering the Workforce with Seamless Single Sign-On (SSO)
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER:
Discover how single sign-on (SSO) can enhance security and productivity by enabling seamless access to multiple applications with a single set of credentials. Learn how SSO can reduce password fatigue, protect remote employees, and improve compliance. Read the white paper to learn more.
Posted: 11 Dec 2024 | Published: 11 Dec 2024
|
|
|
Empowering the Workforce with Seamless Single Sign-On (SSO)
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER:
Discover how single sign-on (SSO) can enhance security and productivity by enabling seamless access to multiple applications with a single set of credentials. Learn how SSO can reduce password fatigue, protect remote employees, and improve compliance. Read the white paper to learn more.
Posted: 18 Dec 2024 | Published: 11 Dec 2024
|
|
|
6 user authentication types to secure networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.
Posted: 15 Mar 2023 | Published: 16 Mar 2023
|
|
|
Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 06 May 2021 | Published: 06 May 2021
|
|
|
Digital secure remote payment: How Apple Pay can change the future of remote payments
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
Posted: 08 Feb 2021 | Published: 27 Mar 2018
|
|
|
How virtual desktops simplify end user computing during lockdown
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.
Posted: 15 Mar 2021 | Published: 19 Feb 2021
|
|
|
Computer Weekly – 29 April 2025: Making divorce digital
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to the CEO of the National Family Mediation charity about its tech overhaul and how divorce is going digital. The government's One Login digital identity system is under scrutiny over security problems – we examine the issues. Read the issue now.
Posted: 28 Apr 2025 | Published: 29 Apr 2025
|
|
|
The Modern Guide To OAuth
sponsored by FusionAuth
EBOOK:
This guide explores OAuth 2.0 implementation, covering authorization modes, grants, and real-world uses. It provides code examples and insights into secure authentication workflows for web and mobile apps. Learn to handle tokens, refresh access, and implement device authorization. Read this e-book to master OAuth and build secure applications.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Aug 2020
|
|
|
NVMe flash storage 101
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
Posted: 08 Feb 2021 | Published: 31 Mar 2017
|
|
|
Attack Surface Management
sponsored by Palo Alto Networks
EBOOK:
With more cloud environments and digital assets in play than ever before, the enterprise attack surface has become increasingly complex and difficult to manage. This Attack Surface Management (ASM) for Dummies, e-book presents a coherent overview of ASM. Download now to unlock the extensive e-book and all the insights contained within it.
Posted: 07 Apr 2023 | Published: 08 Apr 2023
|
|
|
MicroScope – May 2020: Staying connected
sponsored by MicroScope
EZINE:
In this issue, read about how the channel is helping customers stay connected during the pandemic, with Covid-19 raising hardware as businesses aim to provide technology for home workers. Also discover the benefits of SD-WAN and learn about the top compliance concerns for the coming year
Posted: 08 Feb 2021 | Published: 01 May 2020
|
|
|
Best practices for remote data backups
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This guide provides tips and best practices for your organisation's offsite data backups. It addresses questions you need to ask to determine which remote backup approach is the right fit for your organisation. In this e-guide, discover which remote backup strategy is right for your organisation.
Posted: 08 Feb 2021 | Published: 24 Feb 2020
|
|
|
Computer Weekly – 30 August 2016: Get protected
sponsored by TechTarget ComputerWeekly.com
EZINE:
It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 08 Feb 2021 | Published: 30 Aug 2016
|
|
|
NVMe promises blisteringly fast flash performance
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this guide we look at the architectural issues blocking agreement on NVMe, the fundamentals that underlie NVMe and its blistering performance, the key NVMe product deployments available, and ask what will become of the storage features associated with the storage controller.
Posted: 08 Feb 2021 | Published: 10 Apr 2018
|
|
|
Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
Posted: 08 Feb 2021 | Published: 21 Sep 2020
|
|
|
CW EMEA - May 2023: The future of work
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this month's CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now.
Posted: 10 May 2023 | Published: 11 May 2023
|
|
|
Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Dec 2020
|
|
|
CW APAC: Expert advice on zero-trust security
sponsored by TechTarget ComputerWeekly.com
EZINE:
Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 08 Feb 2021 | Published: 19 Nov 2020
|
|
|
Why Okta for Identity
sponsored by Okta
WHITE PAPER:
A unified identity platform is the only technology that spans an organization’s entire IT and security stack, validating and securing access to appropriate resources for users anywhere, on any device. Read on now to learn how Okta can help contribute to key business goals, including agility, efficiency, security, and growth.
Posted: 08 Apr 2025 | Published: 08 Apr 2025
|
|