Enhanced faxing and PDF creation with 2007 Microsoft Office System & Exchange Server 2007
sponsored by Equisys Inc.
WHITE PAPER:
Learn the limitations of fax implementations and how to overcome them, problems with document creation and delivery, and factors to consider if you decide to use a third party.
Posted: 20 Feb 2008 | Published: 20 Feb 2008
|
|
|
Fax Purchasing Decision: Fax Server or Fax Service?
sponsored by Esker Inc.
WHITE PAPER:
This white paper discusses the pros and cons of different faxing systems and will guide you through the process of choosing the right system for your company.
Posted: 09 Jul 2007 | Published: 01 Jul 2007
|
|
|
Luxury Hotel Corporation Takes Next Step towards a Paperless Business
sponsored by Captaris, Inc.
CASE STUDY:
Read this white paper to find out how your company can benefit from implementing the paperless fax process as well.
Posted: 19 Oct 2007 | Published: 01 Oct 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018
|
|
|
Attack Surface Management
sponsored by Palo Alto Networks
EBOOK:
With more cloud environments and digital assets in play than ever before, the enterprise attack surface has become increasingly complex and difficult to manage. This Attack Surface Management (ASM) for Dummies, e-book presents a coherent overview of ASM. Download now to unlock the extensive e-book and all the insights contained within it.
Posted: 07 Apr 2023 | Published: 08 Apr 2023
|
|
|
Jargon Buster Guide to Unified Communications
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.
Posted: 08 Feb 2021 | Published: 26 Oct 2017
|
|
|
VoIP has never lost its voice: How to get the most out of your business communications
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In today's comms world, and especially with regard to hybrid working, a communications identity has now become a unified calling and collaboration endpoint, one which is part of a suite of business services spanning voice, security and network-as-a-service solutions to power the mobile workforce.
Posted: 06 Jul 2022 | Published: 06 Jul 2022
|
|
|
Print security: An imperative in the IoT era
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT:
Analyst group Quocirca gives the perspective on the risks and best practices of print security.
Posted: 08 Feb 2021 | Published: 10 Jul 2017
|
|
|
Web security: Important but often overlooked
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 08 Feb 2021 | Published: 24 Nov 2017
|
|
|
Top IT predictions in APAC in 2025
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Enterprises across the Asia-Pacific region are expected to focus on securing their AI workloads, invest in energy efficient infrastructure and rethink their platform strategy, in the new year. In this round-up, we review the key IT trends, including AI and other developments, that are likely to shape the industry in APAC in 2025.
Posted: 17 Dec 2024 | Published: 17 Dec 2024
|
|
|
IT Infrastructure Monitoring
sponsored by Progress Software Corporation WhatsUp Gold
EBOOK:
Understanding IT infrastructure monitoring (ITIM) is vital for business continuity. This guide shows how ITIM prevents outages, automates resolutions, and offers insights via dashboards and reports. Discover how proper monitoring saves time and resources. Read this e-book to master ITIM implementation.
Posted: 02 May 2023 | Published: 18 Apr 2025
|
All resources sponsored by Progress Software Corporation WhatsUp Gold
|
|
The Power Of Patient Insights In Modern Healthcare
sponsored by Dovetail
EBOOK:
Discover how healthcare organizations balance patient privacy with patient research to improve outcomes. This e-book explores AI integration in research, patient journey mapping, and strategies for protecting data while gaining insights. Learn how Dovetail helps providers create a patient-centered approach.
Posted: 02 Apr 2025 | Published: 02 Apr 2025
|
|
|
Hacking the Human Operating System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 08 Feb 2021 | Published: 27 Feb 2017
|
|
|
A Computer Weekly buyer's guide to supply chain resilience
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The Covid-19 pandemic has put the limits of the supply chain to the test. In this 18-page buyer's guide, Computer Weekly looks at how supply chain management has changed since, what action has been taken to handle it, and why data and automation is enhancing adaptability.
Posted: 08 Feb 2021 | Published: 06 Nov 2020
|
|
|
Software Firewalls
sponsored by Palo Alto Networks
EBOOK:
In this free Software Firewalls for dummies e-book, discover everything you need to know about today’s demands for software firewalls and zero trust, and find out the 10 essential questions you need to ask your software firewall vendor.
Posted: 08 Apr 2024 | Published: 09 Apr 2024
|
|
|
A Computer Weekly E-Guide on Wired and Wireless LAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
When looking the way in which the Covid-19 pandemic has changed business life, a number of key areas have come to the fore: SD WAN, SASE and in particular digital transformation are key examples of that. Yet very little of the discourse includes something that is still really at the heart of the vast majority of firms: The local area network (LAN).
Posted: 07 Jul 2021 | Published: 07 Jul 2021
|
|
|
How to Manage SAP User Accounts and Access Rights with Identity Manager
sponsored by One Identity
WHITE PAPER:
Learn how Identity Manager can streamline user administration for the SAP ecosystem, including on-premises and cloud offerings. Manage user identities, privileges and security across the enterprise with integrated IAM. Read this white paper to see the benefits.
Posted: 05 Jun 2024 | Published: 05 Jun 2024
|
|
|
The future of storage
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 Oct 2020
|
|
|
Fraud management: A perennial business issue
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
Posted: 06 Jul 2021 | Published: 06 Jul 2021
|
|
|
Maximising return on digital investments
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
What impact do digital technology transformations have on productivity? This in-depth study from the World Economic Forum offers some answers.
Posted: 08 Feb 2021 | Published: 22 May 2018
|
|
|
Strengthen data privacy with strategies for managing crypto keys
sponsored by Entrust, Inc.
EBOOK:
Effective key management is crucial for data security as encryption grows. This guide covers key lifecycle components, strategies, and secrets management in zero trust environments. Learn to protect sensitive data, ensure compliance, and prepare for quantum computing challenges. Read this eBook to enhance your key management strategy.
Posted: 18 Apr 2025 | Published: 08 Apr 2025
|
|
|
The digital enterprise: Moving from experimentation to transformation
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This in-depth report from the World Economic Forum explains how companies can make sure their digital transformation projects are a success.
Posted: 08 Feb 2021 | Published: 27 Sep 2018
|
|
|
CW APAC – Trend Watch: CIO trends 2025
sponsored by TechTarget ComputerWeekly.com
EZINE:
It will be no surprise to see artificial intelligence high on the agenda for 2025. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at how banks are navigating technology, the continued importance of cyber security, and how enterprises can cement their AI future.
Posted: 20 Feb 2025 | Published: 20 Feb 2025
|
|
|
The Aragon Research Globe for the Intelligent Contact Center, 2025
sponsored by Avaya
RESEARCH CONTENT:
Aragon Research's Globe for Intelligent Contact Center examines 15 major vendors in AI-driven transformation. Read the full report to see how virtual agents are revolutionizing customer experience and support.
Posted: 27 Mar 2025 | Published: 28 Mar 2025
|
|
|
What the future holds for cloud management in APAC
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we dish out useful tips from APAC organisations that have successfully migrated to the cloud, the thinking behind their approaches to cloud migration and what they are doing to not only keep the lights on, but also raise their game in areas such as cloud data management and cloud security.
Posted: 07 Dec 2021 | Published: 07 Dec 2021
|
|
|
Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environmentsts
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Jan 2021
|
|
|
Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environments
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 28 Jul 2020
|
|
|
World Economic Forum Global Risks Report 2018
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.
Posted: 08 Feb 2021 | Published: 17 Jan 2018
|
|