Group 3 Protocol Reports

Enhanced faxing and PDF creation with 2007 Microsoft Office System & Exchange Server 2007
sponsored by Equisys Inc.
WHITE PAPER: Learn the limitations of fax implementations and how to overcome them, problems with document creation and delivery, and factors to consider if you decide to use a third party.
Posted: 20 Feb 2008 | Published: 20 Feb 2008

Equisys Inc.

Luxury Hotel Corporation Takes Next Step towards a Paperless Business
sponsored by Captaris, Inc.
CASE STUDY: Read this white paper to find out how your company can benefit from implementing the paperless fax process as well.
Posted: 19 Oct 2007 | Published: 01 Oct 2007

Captaris, Inc.

Fax Purchasing Decision: Fax Server or Fax Service?
sponsored by Esker Inc.
WHITE PAPER: This white paper discusses the pros and cons of different faxing systems and will guide you through the process of choosing the right system for your company.
Posted: 09 Jul 2007 | Published: 01 Jul 2007

Esker Inc.

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

TechTarget ComputerWeekly.com

CW Benelux - May-July 2019: A new vision for hackers
sponsored by TechTarget ComputerWeekly.com
EZINE: With canal bridges, healthcare products, bicycles, ship components, buildings and even prosthetic body parts already in the scope of 3D printing, it's facinating to imagine how far the technology can go. Printing spaceships is no longer a fantasy. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 May 2019

TechTarget ComputerWeekly.com

7 best practices for Web3 security risk mitigation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Web3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

TechTarget ComputerWeekly.com

A Complete Solution for Healthcare Mobility with SMG3 RX
sponsored by Zebra Technologies
VIDEO: To find out how you can supercharge and scale your healthcare organization’s mobile-device strategy, tune into this video for insights from Director of Sales at Strategic Mobility Group, Eric Holmes.
Posted: 01 Oct 2024 | Premiered: 02 Oct 2024

TOPICS:  .NET
Zebra Technologies

Mastering FIX Monitoring for unparalleled trading performance
sponsored by ITRS Group Limited
WEBCAST: In this webinar, discover how to optimize trading systems with unrivaled visibility through the partnership of ITRS and Luxoft. Revolutionize your trading systems for success with proactive, advanced monitoring solutions specifically designed for capital markets.
Posted: 21 Feb 2024 | Premiered: Feb 21, 2024

TOPICS:  .NET
ITRS Group Limited

Computer Weekly – 3 September 2019: From IT disaster to digital innovation at RBS
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we meet the man brought in to turn around the technology at RBS Group after its catastrophic IT outage. We examine the latest best practice in securing mobile devices in the enterprise. And we look at progress towards "passwordless" security. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Sep 2019

TechTarget ComputerWeekly.com

Secure remote IT support in 3 steps
sponsored by TeamViewer
WHITE PAPER: As an IT security expert, you know that the challenges of protecting connected enterprises are evolving. To provide borderless access effectively, you need a powerful remote connectivity solution. But how do you get buy-in from leadership? Read this white paper to take the first step to toward secure remote IT support.
Posted: 02 May 2024 | Published: 02 May 2024

TOPICS:  .NET
TeamViewer

Enterprise Strategy Group The Inevitable Rise of AIOps
sponsored by AWS & ProsperOps
ESG SHOWCASE: Traditional, manual IT operations are struggling to keep pace with analyzing the current explosion of data. Download this Enterprise Strategy Group Showcase now to learn how you can implement AIOps and enjoy the benefits and efficiency that AI brings to IT operations management.
Posted: 09 Sep 2024 | Published: 10 Sep 2024

TOPICS:  .NET
AWS & ProsperOps

Computer Weekly – 3 September 2024: The politics of techno-refusal
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we learn about the politics of techno-refusal and what can be learned from the sabotage of tech infrastructure in the 1980s. Following the controversy around Broadcom's purchase of VMware, we examine alternative virtualisation solutions. And our latest buyer's guide looks at the state of SD-WAN. Read the issue now.
Posted: 02 Sep 2024 | Published: 03 Sep 2024

TechTarget ComputerWeekly.com

How to Implement an OSS Governance Program
sponsored by Anaconda
WHITE PAPER: Just like all software, open-source carries risk, and many data science teams still lack security protocols. For some, there simply aren’t security protocols or governance tools for open-source software (OSS). Read on to learn about 6 steps you can take to build an OSS governance program that works for data science and set your team up for success.
Posted: 10 Jul 2023 | Published: 11 Jul 2023

TOPICS:  .NET
Anaconda

Mapping and Reducing Scope 3 Emissions
sponsored by GEP
WHITE PAPER: Today, procurement organizations face a handful of pressing sustainability issues, the most formidable of them being scope 3 emissions. So, how can companies best address these problems and build an effective, end-to-end emissions reduction framework? Browse this white paper to learn more.
Posted: 06 Feb 2024 | Published: 07 Feb 2024

TOPICS:  .NET
GEP

Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019

TechTarget ComputerWeekly.com

Computer Weekly – 3 July 2018: Future-proofing Gatwick Airport's technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at London Gatwick Airport and talk to its CIO about a critical network upgrade to support passenger growth. Our latest buyer's guide examines automation and intelligent systems management. And we assess the latest technologies for boosting storage performance. Read the issue now.
Posted: 08 Feb 2021 | Published: 29 Jun 2018

TechTarget ComputerWeekly.com

3 Essential Requirements for Flawless Data Protection
sponsored by Zscaler
WHITE PAPER: Now that data has left the data center and is everywhere, spread across a wide array of cloud applications, security is more complex than it used to be. This white paper aims to provide insights into generating greater data security by providing you with 3 essential requirements that could fuel greater data protection. Read on to learn more.
Posted: 22 Nov 2022 | Published: 22 Nov 2022

TOPICS:  .NET
Zscaler

Computer Weekly - 14 September 2021: Is 3D printing about to hit the mainstream?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out about the emerging consumer services using 3D printing and ask if the technology is about to go mainstream. Our latest buyer's guide looks at the importance of sustainable datacentres. And we analyse the risks of increasing contactless card spending limits and whether tech could help. Read the issue now.
Posted: 10 Sep 2021 | Published: 14 Sep 2021

TechTarget ComputerWeekly.com

CIO Trends #3
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This guide offers a collection of our most popular articles for IT leaders during the last part of 2016, looking at what it takes to be a great CIO and how to get the most out of your IT budget.
Posted: 08 Feb 2021 | Published: 12 Dec 2016

TechTarget ComputerWeekly.com

Focus: Diversity
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide focuses on diversity in the workplace and how it can help contribute to better business outcomes.
Posted: 08 Feb 2021 | Published: 23 Oct 2017

TechTarget ComputerWeekly.com

NVMe flash storage 101
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
Posted: 08 Feb 2021 | Published: 31 Mar 2017

TechTarget ComputerWeekly.com

Infographic: 6 file transfer best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.
Posted: 05 May 2022 | Published: 05 May 2022

TechTarget ComputerWeekly.com

How Cimbali Group reduces time-to-resolution by up to 20 percent with TeamViewer
sponsored by TeamViewer
CASE STUDY: One of the world’s most renowned manufacturers of professional coffee machines, Cimbali Group, was looking for digital solutions that could improve the customer experience and, at the same time, improve their time-to-resolution. Understand why they chose TeamViewer to perform remote troubleshooting in this case study.
Posted: 14 Dec 2023 | Published: 14 Dec 2023

TOPICS:  .NET
TeamViewer

CIO Trends #3: Benelux
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this Benelux e-guide we look at how CIOs can succeed in the age of digital transformation. Find out if you have what it takes because the opportunity is massive if you get digital right. There is also some advice for CIOs looking to get more out of their budget so they can fund digital initiatives.
Posted: 08 Feb 2021 | Published: 19 Dec 2016

TechTarget ComputerWeekly.com

3 Critical Elements to a Successful Mobile Strategy
sponsored by Gozio Health
EBOOK: Download this eBook to discover the top 3 elements you should consider when designing the right mobile strategy for your hospital or health system.
Posted: 16 Dec 2023 | Published: 16 Dec 2023

TOPICS:  .NET
Gozio Health

CIO Trends #3: Nordics
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this Nordic e-guide we look at how CIOs can succeed in the age of digital transformation. Find out if you have what it takes because the opportunity is massive if you get digital right. There is also some advice for CIOs looking to get more out of their budget so they can fund digital initiatives.
Posted: 08 Feb 2021 | Published: 19 Dec 2016

TechTarget ComputerWeekly.com

Computer Weekly - 27 October 2020: Pet project: How Pets at Home cares for customers with data analytics
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the chief data officer of Pets at Home, about using data analytics to care for customers. British Airways had its GDPR fine reduced to just £20m – we ask what this means for data protection regulation. And we look at GPT3, the language prediction tool that could revolutionise AI. Read the issue now.
Posted: 08 Feb 2021 | Published: 27 Oct 2020

TechTarget ComputerWeekly.com