Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER:
Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
How to solve overlapping IPs, NAT, and other challenges at scale in the cloud
sponsored by Aviatrix Systems
WEBCAST:
Organizations building their enterprise workloads and applications in the cloud have extensive requirements to make them available to various kinds of consumers. Meeting these requirements can bring equally extensive challenges. Watch this webinar to learn how to solve overlapping IPs, NAT and other challenges at scale.
Posted: 01 Nov 2021 | Premiered: Sep 7, 2021
|
|
|
Merging Businesses Together is Challenging and Fraught with Complexity S
sponsored by Aviatrix Systems
PRODUCT OVERVIEW:
Merging networks during M&A can be complex, but Aviatrix simplifies the process. Their secure connectivity and onboarding solution provides a unified data plane, advanced routing and NAT capabilities, and robust security - enabling seamless integration of merged networks. Read the full solution brief to learn more.
Posted: 12 Sep 2024 | Published: 13 Sep 2024
|
|
|
Reducing Cloud Costs with Distributed Networking and Network Security Convergence
sponsored by Aviatrix Systems
WHITE PAPER:
How can you optimize your cloud while reducing cloud costs? By converging networking and network security in the cloud, this white paper argues. To learn all about this strategy, keep reading.
Posted: 06 Mar 2024 | Published: 06 Mar 2024
|
|
|
Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017
|
|
|
A reference architecture for the IoE
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT:
Analyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).
Posted: 08 Feb 2021 | Published: 03 Oct 2016
|
|
|
The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 08 Feb 2021 | Published: 09 May 2017
|
|
|
Computer Weekly – 5 September 2023: Met Police data platform goes £64m over budget
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we reveal a £64m cost over-run for the Metropolitan Police's new record management system. Our latest buyer's guide looks at the issues around integrating SaaS applications. And a leading flash storage firm says the age of spinning disk drives is almost over – are they right? Read the issue now.
Posted: 01 Sep 2023 | Published: 05 Sep 2023
|
|
|
Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022
|
|
|
Computer Weekly – 26 November 2024: The 50 most influential women in UK technology
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we reveal the most influential women in UK technology for 2024. Read an interview with the winner, co-CEO of Tech She Can, Sheridan Ash. And meet this year's rising stars – six women with a bright future in IT leadership. Read the issue now.
Posted: 25 Nov 2024 | Published: 26 Nov 2024
|
|
|
Containerized Deployments On Amazon Web Services
sponsored by TIBCO
DATA SHEET:
Preparing your organization for the cloud requires a level of security and agility that some enterprises find difficult to maintain. Check out this data sheet to examine how your enterprise can safely and swiftly launch into the cloud leveraging containerized deployments on Amazon Web Services (AWS).
Posted: 09 Jun 2022 | Published: 10 Jun 2022
|
|
|
Kubernetes Networking and Cilium
sponsored by Cisco
EBOOK:
Kubernetes networking can be daunting, even for seasoned network engineers. This e-book provides a detailed instruction manual on Kubernetes networking fundamentals, Cilium, and advanced features like load balancing, security, and observability. Download the e-book to master Kubernetes networking.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
Computer Weekly – 26 September 2017: Building on legacy IT
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, experts at VMworld 2017 discussed how to adapt legacy IT to make the most of modern technology – we listened in. Artificial intelligence is touted as an aid to decision-making, but it needs to be handled with care. And we learn how Wales has become a hotspot for cyber security innovation. Read the issue now.
Posted: 08 Feb 2021 | Published: 22 Sep 2017
|
|
|
Scale And Succeed With Isovalent: Top 3 Use Cases For Your Kubernetes Journey
sponsored by Cisco
WHITE PAPER:
Explore how Isovalent's enterprise solutions can future-proof your Kubernetes infrastructure, reduce tool sprawl, and accelerate your path to platform maturity and compliance. Learn more by reading the full White Paper.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
How to Build a Secure Financial Services Platform
sponsored by Cisco
EBOOK:
Secure your financial services platform with advanced networking, security, and observability features. Learn how Cilium and Tetragon can help you reduce risk, maintain compliance, and build a future-proof infrastructure. Read the full Product Overview.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
Moving Beyond Fragmented Cloud Security with Unified SASE
sponsored by Fortinet, Inc.
WHITE PAPER:
As organizations adopt hybrid work and multi-cloud environments, fragmented cloud security adds complexity. Unified SASE offers a consolidated approach. Read the full white paper to learn more.
Posted: 10 Sep 2024 | Published: 11 Sep 2024
|
|
|
Business to Business Connectivity Has Never Been More Complex
sponsored by Aviatrix Systems
PRODUCT OVERVIEW:
Secure B2B partner connectivity is crucial for businesses to stay agile and competitive. Aviatrix's solution simplifies this complex challenge by providing advanced networking, security, and operational capabilities in the cloud. Learn how Aviatrix can revolutionize your B2B connectivity. Read the full solution brief.
Posted: 12 Sep 2024 | Published: 13 Sep 2024
|
|
|
Supermicro H14 Hyper DP Consolidation TCO
sponsored by Supermicro
ANALYST REPORT:
Migrating from 5-year-old Supermicro Ultra DP servers to new Supermicro H14 Hyper DP servers with AMD EPYC 9475F processors can cut TCO by up to 61.8%. In this report by Principled Technologies, discover how this upgrade could save your organization up to $2.8M over five years.
Posted: 02 May 2025 | Published: 03 May 2025
|
|
|
Liberate Data and Modernize your Network for AI and LLM with Aviatrix
sponsored by Aviatrix Systems
PRODUCT OVERVIEW:
Aviatrix's cloud networking platform enables enterprises to secure and optimize hybrid networks for AI and large language model workloads. It provides high-performance encryption, deep observability, and cost savings. Learn more about Aviatrix's cloud networking solutions.
Posted: 12 Sep 2024 | Published: 13 Sep 2024
|
|
|
Kubernetes Traffic Engineering for Network Engineers: Cilium Best Practices
sponsored by Cisco
EBOOK:
Traffic engineering in Kubernetes optimizes network performance, security, and costs. This paper explores using Cilium, a leading cloud-native networking solution, for advanced traffic routing in Kubernetes. Learn techniques for managing traffic flows. Discover how to build a resilient, high-performance Kubernetes network.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
Top 10 Concerns Of Leveraging AI In Healthcare
sponsored by Surgical Safety Technologies
WHITE PAPER:
AI benefits healthcare, but concerns about accuracy, bias, and ethics remain. This paper explores 10 key issues, from data security to information overload, and solutions through careful implementation and standards. Discover how AI can improve healthcare while preserving human expertise and patient safety.
Posted: 22 Mar 2025 | Published: 22 Mar 2025
|
|
|
Software Firewalls
sponsored by Palo Alto Networks
EBOOK:
In this free Software Firewalls for dummies e-book, discover everything you need to know about today’s demands for software firewalls and zero trust, and find out the 10 essential questions you need to ask your software firewall vendor.
Posted: 08 Apr 2024 | Published: 09 Apr 2024
|
|
|
Rethink Enterprise SD-WAN Security with Zero Trust
sponsored by Zscaler
WHITE PAPER:
As networks struggle with modern demands, enterprises are looking beyond legacy WANs. Zero Trust SD-WAN offers a security-first approach, eliminating implicit trust, and simplifying branch connectivity without losing performance. Read on now to discover how a platform approach to zero-trust networking can transform your security posture.
Posted: 09 Apr 2025 | Published: 10 Apr 2025
|
|
|
Securing Egress Traffic in the Public Cloud
sponsored by Zscaler
WHITE PAPER:
As cloud deployments grow, securing egress traffic from workloads becomes challenging. Legacy security models create visibility gaps and complexity. This guide explores essential capabilities for cloud workload security, like TLS inspection, threat protection, and multi-cloud support. Read on now to learn how you can better protect cloud workloads.
Posted: 09 Apr 2025 | Published: 17 Apr 2025
|
|
|
A Computer Weekly e-guide to SASE
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 29 Jul 2021 | Published: 28 Jul 2021
|
|
|
A Computer Weekly Buyer's Guide to Internet of Things Security
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.
Posted: 08 Feb 2021 | Published: 07 Feb 2017
|
|