The Realities of Single Sign-On
sponsored by PistolStar, Inc.
WHITE PAPER:
Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
Posted: 13 Jun 2008 | Published: 01 Jan 2006
|
|
|
Business Intelligence: The Strategic Imperative for CIOs
sponsored by Information Builders
WHITE PAPER:
Business intelligence (BI) allows organizations to integrate applications and databases essential to users and enables analysis of information to optimize decision-making.
Posted: 18 Jun 2008 | Published: 01 Jan 2007
|
|
|
Solve Exchange Storage Problems Once and for All: A New Approach without Stubs or Links
sponsored by Mimosa Systems
WHITE PAPER:
This white paper discusses how Mimosa NearPoint can reduce Exchange storage and keep email accessible to end users, without requiring stub files in Exchange.
Posted: 07 Oct 2008 | Published: 03 Oct 2008
|
|
|
Web Application Security Trends Report Q3-Q4, 2008
sponsored by Cenzic
WHITE PAPER:
Read this white paper to learn how to protect web applications through application security assessment and penetration testing managed services (SaaS) that identify vulnerabilities and allow organizations to stay ahead of hackers.
Posted: 20 May 2009 | Published: 20 May 2009
|
|
|
How to Offer the Strongest SSL Encryption for your Company
sponsored by VeriSign, Inc
WHITE PAPER:
Many IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.
Posted: 01 Mar 2005 | Published: 01 Sep 2006
|
|
|
Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER:
This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009
|
|
|
Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.
Posted: 14 Mar 2022 | Published: 15 Mar 2022
|
|
|
API Management: The role of APis in digital business transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.
Posted: 08 Feb 2021 | Published: 09 Nov 2020
|
|
|
A Computer Weekly buyer's guide to intelligent workload management
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
One huge advantage digital transformation brings with it is the phenomenon of intelligent workload management. In this 17-page buyer's guide, Computer Weekly looks at the various tools available, asset management best practices and the complications to look out for with hybrid and multicloud deployments.
Posted: 08 Feb 2021 | Published: 13 Nov 2020
|
|
|
Computer Weekly – 30 May 2023: Can the UK cash in on chips?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the UK government has committed £1bn to the semiconductor sector – but can it ever compete with the US and China? The potential of 5G networking could transform manufacturing – we examine the implications. Read the issue now.
Posted: 26 May 2023 | Published: 30 May 2023
|
|