Web Services Security: What's Required to Secure a Service-Oriented Architecture
sponsored by Oracle Corporation
WHITE PAPER:
This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment.
Posted: 16 Mar 2009 | Published: 01 Jan 2008
|
|
|
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER:
The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005
|
|
|
ML Model Outperforms Standard Methods for Detecting Heart Attacks
sponsored by XtelligentMedia Healthcare
EGUIDE:
Researchers have developed a machine learning (ML) tool capable of using electrocardiogram (ECG) readings to detect and classify heart attacks more quickly and accurately than standard approaches. The model was able to accurately reclassify 1 in 3 patients with chest pain based on heart attack risk. Download the article to read more.
Posted: 19 Jul 2023 | Published: 19 Jul 2023
|
|
|
How To Know If Your Organization Is Ready For Data Governance Software
sponsored by Veritas
EGUIDE:
It's important to ensure your organization is ready for a governance tool, or your software purchase is likely to fall flat. This e-guide takes a look at three different scenarios where data governance tools are often used to help you determine if your organization is ready for data governance software.
Posted: 08 Feb 2021 | Published: 05 Oct 2016
|
|
|
Computer Weekly – 12 February 2019: The Met Office storms ahead on data analytics
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, find out how the Met Office takes 2TB of weather data every hour and turns it into useful business insight. We examine whether Amazon's presence in the retail market is putting off other retailers from using its public cloud services. And we look at the new 802.11ax wireless networking standard. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Feb 2019
|
|
|
DataOps: The Missing Link in Your Industrial Data Architecture
sponsored by HighByte
WHITE PAPER:
How can your business simplify data contextualization to maximize the value of your technology investments? By leveraging DataOps to define standard models and establish and manage integrations, operational teams can provide data to the systems and business users who are requesting it in a more efficient and managed way. Read on to learn more.
Posted: 26 Oct 2023 | Published: 26 Oct 2023
|
|
|
Elevate your Software Testing with Generative AI
sponsored by Reply
BLOG:
Discover how Generative AI can elevate your software testing with Concept Reply's testing assistant agent. This AI-powered solution can enhance efficiency, precision, and quality assurance throughout the testing lifecycle. Read the white paper to learn more.
Posted: 30 Jul 2024 | Published: 30 Jul 2024
|
|
|
How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER:
Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020
|
|
|
Computer Weekly 50th anniversary special
sponsored by TechTarget ComputerWeekly.com
EZINE:
It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.
Posted: 08 Feb 2021 | Published: 22 Sep 2016
|
|
|
Proactive Security: Software vulnerability management and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
Posted: 08 Feb 2021 | Published: 17 May 2019
|
|
|
8 Traits Of Next Generation Insurers
sponsored by Hyland Software
EBOOK:
As the insurance industry continues to change rapidly, it has become business-critical for workers to adapt to the new standards of service presented by customers and other top organizations. However, many insurers can be daunted by this new wave of expectations and struggle to know where to begin. Browse this guide to learn more.
Posted: 01 Jul 2023 | Published: 01 Jul 2023
|
|
|
Maximizing Compliance with Call Recording Software
sponsored by Luware
WHITE PAPER:
Call recording software is crucial for businesses to comply with legal requirements. This white paper covers best practices like data encryption, audits, and storage and consent standards. Learn to implement call recording strategies to improve customer interactions and dispute resolution. Discover the benefits of compliant call recording.
Posted: 29 Jan 2025 | Published: 29 Jan 2025
|
|
|
Sustainable Devices for Positive Impact
sponsored by Dell Technologies and Intel
EGUIDE:
Download this eGuide and learn how Dell and Intel help organizations be more sustainable.
Posted: 10 May 2023 | Published: 10 May 2023
|
|
|
First edition of Computer Weekly 1966
sponsored by TechTarget ComputerWeekly.com
EBOOK:
To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.
Posted: 08 Feb 2021 | Published: 09 Sep 2016
|
|
|
Building a Cyberresilient Data Recovery Strategy
sponsored by Veeam Software
WHITE PAPER:
Building a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk. Read this new white paper and learn how.
Posted: 17 Oct 2024 | Published: 18 Oct 2024
|
|
|
Emerging Trends and New Developments in Software-Defined Networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, Computer Weekly sits down with with senior IT managers from a number of multi-national companies to discuss the latest trends and newest developments in the world of software-defined networks.
Posted: 08 Feb 2021 | Published: 23 Oct 2017
|
|
|
Organizations Largely Unprepared for the Advent of 90-Day TLS Certificates
sponsored by CyberArk
RESEARCH CONTENT:
CyberArk surveyed 800 security leaders to gauge their readiness for a 90-day TLS certificate standard, and uncovered their greatest management challenges and concerns about how this bold browser move could break businesses. Continue on to unlock the 20-page report.
Posted: 27 Dec 2024 | Published: 27 Dec 2024
|
|
|
Why Organizations Should Implement a Work Management Strategy
sponsored by Atlassian
ESG SHOWCASE:
This analyst report from ESG examines Atlassian's Jira Work Management platform. Learn how this solution can improve team collaboration and productivity. Read the full report to discover more.
Posted: 14 Aug 2024 | Published: 15 Aug 2024
|
|
|
The Digital Transformation Agenda
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This survey of business leaders by the Economist Intelligence Unit for Pegasystems finds that businesses are mostly confident they will reach their digital transformation agendas, but senior business leaders need to be more closely involved.
Posted: 08 Feb 2021 | Published: 09 Jan 2017
|
|
|
Safeguard Your Organization: Top 6 Questions You Should Be Asking About Product Security
sponsored by Security Journey
WHITE PAPER:
Safeguard your organization from security vulnerabilities. Learn the top 6 questions to ask about product security, including ensuring resilient code, integrating security best practices, and equipping your team with secure coding skills. Read the white paper to build a culture of security.
Posted: 16 Jan 2025 | Published: 16 Jan 2025
|
|
|
Solution Brief
sponsored by HighByte
PRODUCT OVERVIEW:
HighByte Intelligence Hub is an Industrial DataOps software solution that accelerates the use of operational data by contextualizing, standardizing, and securing information. Read the solution brief to learn how to deliver trusted, ready-to-use data across your business with this solution.
Posted: 21 Dec 2023 | Published: 21 Dec 2023
|
|
|
Software Security is a Team Sport Become an Elite Organization with Secure Cloud Development Collaboration
sponsored by Veracode, Inc.
EBOOK:
In this 18-page e-book, learn why secure software development is a team sport, how to integrate security into development in 6 steps, and more.
Posted: 05 Sep 2024 | Published: 19 Sep 2024
|
|
|
Understanding Gmail And Yahoo’s New Standards For Senders
sponsored by Sinch
WHITE PAPER:
Gmail and Yahoo are changing email-sending requirements in 2024. Learn how to ensure your domain settings, unsubscribe links, and spam rates align with the new protocols to avoid getting blocked from major inboxes. Access the guide to understand the remediation steps.
Posted: 29 May 2024 | Published: 29 May 2024
|
|
|
Assess & Manage Commercial Software Risk
sponsored by Reversinglabs
WHITE PAPER:
How do you know the commercial software you bring into your organization is safe? Download this paper to understand new regulations targeting software supply chain security, learn why classic approaches won’t solve this issue, and discover how to identify malware and tampering in software before you deploy it.
Posted: 24 Jan 2025 | Published: 24 Jan 2025
|
|
|
How DirectTrust is Improving the Usability and Interoperability of Health Data
sponsored by XtelligentMedia Healthcare
EGUIDE:
DirectTrust is looking to improve the usability of the Direct standard for use cases such as closed-loop referrals and ADT notifications to drive health data interoperability.
Posted: 03 Apr 2024 | Published: 04 Apr 2024
|
|
|
How DirectTrust is Improving the Usability and Interoperability of Health Data
sponsored by XtelligentMedia Healthcare
EGUIDE:
DirectTrust is looking to improve the usability of the Direct standard for use cases such as closed-loop referrals and ADT notifications to drive health data interoperability.
Posted: 27 Mar 2024 | Published: 27 Mar 2024
|
|
|
Assess & Manage Commercial Software Risk
sponsored by ReversingLabs
WHITE PAPER:
Enterprises face growing risks and regulatory demands to secure third-party software. Spectra Assure's white paper details how its binary analysis identifies threats like malware and vulnerabilities in commercial software without source code. Discover risk management strategies by reading the full paper.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|