Standards Bodies White Papers

(View All Report Types)
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

TechTarget ComputerWeekly.com

CW Benelux - May-July 2019: A new vision for hackers
sponsored by TechTarget ComputerWeekly.com
EZINE: With canal bridges, healthcare products, bicycles, ship components, buildings and even prosthetic body parts already in the scope of 3D printing, it's facinating to imagine how far the technology can go. Printing spaceships is no longer a fantasy. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 May 2019

TechTarget ComputerWeekly.com

Computer Weekly – 16 April 2024: VMware users hit by licence hikes after Broadcom takeover
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, VMware users are facing licence fee increases after the acquisition by Broadcom, with education bodies worst hit – we talk to unhappy customers. Read the issue now.
Posted: 12 Apr 2024 | Published: 16 Apr 2024

TechTarget ComputerWeekly.com

How the City of Williamsburg Uses Auvik to Empower a Small IT Team
sponsored by Auvik Networks, Inc.
CASE STUDY: A governmental body like the City of Williamsburg, Virginia, needs a network that can support critical missions like providing public health access and emergency services. Read this case study to explore how Williamsburg’s IT team improved networking capabilities.
Posted: 12 Dec 2023 | Published: 13 Dec 2023

TOPICS:  .NET
Auvik Networks, Inc.

Computer Weekly – 10 October 2023: Teeing up tech at the Ryder Cup
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at golf's Ryder Cup to see the tech firsts introduced to improve the fan experience. UK tech leaders explain why they feel 'betrayed' by the government's net-zero policy changes. Read the issue now.
Posted: 10 Oct 2023 | Published: 10 Oct 2023

TechTarget ComputerWeekly.com

Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.
Posted: 28 Jan 2022 | Published: 01 Feb 2022

TechTarget ComputerWeekly.com

CIO Trends #2
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs.
Posted: 08 Feb 2021 | Published: 03 Aug 2016

TechTarget ComputerWeekly.com

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Backup Compliance: Everything You Need To Know
sponsored by Scalepad Software
WHITE PAPER: In the event of a data breach or cyberattack, you never want a client to lose their valuable data. That’s why backup monitoring is crucial for maintaining security and compliance. Read on to learn about best practices for meeting compliance standards and mitigating risk for your clients and your organization.
Posted: 18 Apr 2024 | Published: 18 Apr 2024

TOPICS:  .NET
Scalepad Software

CIO Trends #2
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs.
Posted: 08 Feb 2021 | Published: 26 Jul 2016

TOPICS:  CIOs
TechTarget ComputerWeekly.com

NVMe flash storage 101
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
Posted: 08 Feb 2021 | Published: 31 Mar 2017

TechTarget ComputerWeekly.com

CIO Trends Q1 2016
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This guide offers a collection of our most popular articles for IT leaders during the first few months of 2016, examining the changing role of CIOs and how to enhance their relationships with their peers across the business.
Posted: 08 Feb 2021 | Published: 11 Mar 2016

TechTarget ComputerWeekly.com

CIO Trends #2: Nordics
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs. This guide offers a collection of our most popular articles for IT leaders,
Posted: 08 Feb 2021 | Published: 25 Aug 2016

TechTarget ComputerWeekly.com

Navigating Section 524B
sponsored by Wind River
WHITE PAPER: The FDA's new Section 524B mandates cybersecurity requirements for medical devices. This guide covers navigating the regulations, including monitoring vulnerabilities, secure design, patching, and software bill of materials. Read the full guide to learn how to ensure your medical devices meet the new cybersecurity standards.
Posted: 17 Jun 2024 | Published: 17 Jun 2024

Wind River

Top 10 Benelux stories of 2021
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Netherlands, Belgium and Luxembourg also have what is needed for an advanced tech sector. They are relatively rich and have a wealth of human talent and high education standards, with academics in the region setting new ground.  Here are Computer Weekly's top 10 stories about IT in the Benelux region.
Posted: 27 Jan 2022 | Published: 27 Jan 2022

TechTarget ComputerWeekly.com

Fault Managed Power Systems / Class 4 Power
sponsored by Panduit
WHITE PAPER: Fault Managed Power Systems (FMPS) represent a new power distribution technology that was standardized by UL through collaboration with Panduit and other leaders. Read this white paper to learn about how FMPS works and the opportunities they unlock for safely and efficiently distributing significant power across long distances.
Posted: 08 Nov 2023 | Published: 08 Nov 2023

TOPICS:  .NET
Panduit

Multi-pronged approach to cyber security professional development
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
Posted: 08 Feb 2021 | Published: 21 Mar 2019

TechTarget ComputerWeekly.com

CW EMEA - March 2023: How Sweden is accelerating digitisation
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we find out how the CIO at Dutch company SHV Holdings goes about ensuring his group IT department provides the foundations for a wide variety of businesses to thrive digitally. Read the issue now.
Posted: 03 Mar 2023 | Published: 09 Mar 2023

TechTarget ComputerWeekly.com

Definitive Guide To Data Quality
sponsored by Qlik
WHITE PAPER: This comprehensive guide explores factors that contribute to creating high-quality data and offers guidance on how enterprises can ensure their data meets high standards. Download the white paper now to learn how you can prioritize data quality and unlock its full potential.
Posted: 30 Jul 2024 | Published: 12 Aug 2024

Qlik

Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

Computer Weekly – 12 September 2023: The dangers of breaking encryption
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we detail the concerns of IT experts about the UK's Online Safety Bill's proposals to weaken end-to-end message encryption. Our buyer's guide continues to look at the issues around integrating SaaS applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Read the issue now.
Posted: 11 Sep 2023 | Published: 12 Sep 2023

TechTarget ComputerWeekly.com

Computer Weekly – 23 May 2023: How to secure your software supply chain
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
Posted: 19 May 2023 | Published: 23 May 2023

TechTarget ComputerWeekly.com

How Audit Compliance and Cloud Adoption Affects IT Security
sponsored by Dell Software
EGUIDE: Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.
Posted: 08 Feb 2021 | Published: 06 Oct 2016

Dell Software

Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule
sponsored by XtelligentMedia Healthcare
EGUIDE: The collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.
Posted: 23 Jul 2024 | Published: 23 Jul 2024

XtelligentMedia Healthcare

Computer Weekly – 4 July 2023: How data is beating heart disease
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how a new data strategy is helping the British Heart Foundation to raise money and support medical research. We examine the benefits of using AI in advanced malware detection. And we reveal why the Information Commissioner is under fire for weak responses to serious data breaches. Read the issue now.
Posted: 30 Jun 2023 | Published: 04 Jul 2023

TechTarget ComputerWeekly.com