Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
How the application integration landscape is changing
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we discover how the industry is trying to make it possible to link applications together in order to share resources with ease. We take a look at how technologies like Distributed Computing and the Common Object Model have been refined into web services, service-oriented architecture and composable applications and microservices.
Posted: 08 Feb 2021 | Published: 19 Mar 2018
|
|
|
The great IAM - time to modernise?
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?
Posted: 08 Feb 2021 | Published: 05 Apr 2019
|
|
|
Strategies for Creating Tech Marketing Content that Delivers Results
sponsored by Enterprise Strategy Group
ESG WHITE PAPER:
For tech organizations, it can be tricky to know what types of content are going to deliver results. So, how can you create the marketing and sales material that meets your objectives while still piquing the interests of your audiences? Browse this guide to learn more.
Posted: 06 Oct 2023 | Published: 06 Oct 2023
|
|
|
10 Steps to Enhance the Agility, Security and Performance of Active Directory
sponsored by One Identity
WHITE PAPER:
Microsoft Active Directory (AD) and Azure AD (AAD) bring organization and standards to how identity and account data is managed and stored. One Identity Active Roles unifies your AD and AAD environments and enables identity and account data to be managed with agility, security and speed. Read on to learn more.
Posted: 06 Jun 2024 | Published: 06 Jun 2024
|
|
|
The Devsecops Guide To Managing Open-Source Risk
sponsored by Contrast Security
EBOOK:
As open-source software adoption grows, so do associated risks. This e-book examines how to establish visibility, manage policies, automate controls, and prioritize remediations to securely leverage open source without impacting DevOps. Read the full e-book to learn more.
Posted: 18 Dec 2024 | Published: 18 Dec 2024
|
|
|
The Devsecops Guide To Managing Open-Source Risk
sponsored by Contrast Security
EBOOK:
As open-source software adoption grows, so do associated risks. This e-book examines how to establish visibility, manage policies, automate controls, and prioritize remediations to securely leverage open source without impacting DevOps. Read the full e-book to learn more.
Posted: 11 Sep 2024 | Published: 11 Sep 2024
|
|
|
Escaping legacy – removing a major roadblock to a digital future
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Core legacy systems inhibit businesses' ability to meet changing customer demands in the digital age. The scale and nature of the problem is such that it needs to be addressed now.
Posted: 08 Feb 2021 | Published: 31 Aug 2016
|
|
|
Hacking the Human Operating System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 08 Feb 2021 | Published: 27 Feb 2017
|
|
|
Predictive analytics gains evermore accuracy in guiding enterprises forward
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Predictive analytics can help businesses look for meaningful patterns in data, then build models that forecast what is likely to happen in the future.
Posted: 26 Jul 2022 | Published: 26 Jul 2022
|
|
|
Computer Weekly - 14 July 2020: Is digital art coming of age during lockdown?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as the pandemic forces many sectors into a business rethink, digital art is hoping to capitalise on changing times. Chinese supplier Lenovo is dominating the supercomputer market – we examine how it got there. And as datacentre engineers become key workers, we look at the health and safety issues. Read the issue now.
Posted: 08 Feb 2021 | Published: 14 Jul 2020
|
|
|
Container Technology Energizes Edge Computing
sponsored by Wind River
WHITE PAPER:
The security, portability, and agility of container technology complement the proven capabilities of the real-time operating system (RTOS), VxWorks, now available for containerized deployments at the intelligent edge. Download this white paper to learn more.
Posted: 04 Jan 2025 | Published: 01 Dec 2023
|
|
|
Observability for Large Language Models
sponsored by Honeycomb
EBOOK:
“As organizations eagerly embrace the potential of LLMs,” this e-book explains, “the need to understand their behavior in production and use that understanding to improve development with them has become apparent.” Step in observability, here to help you develop and deepen your understanding of LLMs. Read on to learn more.
Posted: 09 Apr 2024 | Published: 10 Apr 2024
|
|
|
Computer Weekly - 16 March 2021: Containers play a key role in post-pandemic IT architectures
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, our latest buyer's guide examines the key role that container technology will play in post-pandemic IT architectures. The UK government is under fire for its opaque approach to gigabit broadband strategy. And we assess the storage options for the growing volumes of unstructured data. Read the issue now.
Posted: 15 Mar 2021 | Published: 16 Mar 2021
|
|
|
Expert guide: Best enterprise content management software of 2022
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Enterprise content management (ECM) software can be an expensive, heavily involved purchase, so it's important to understand options before arriving at a decision. In this expert guide, we listed 10 important ECM platforms to consider while making a buying decision.
Posted: 17 Feb 2022 | Published: 17 Feb 2022
|
|
|
A Computer Weekly buyer's guide to data visualisation
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Data visualisation is proving its value throughout a period of economic uncertainty. In this 16-page buyer’s guide, Computer Weekly looks at the rise of embedded analytics, the advantages of real-time data and Siemens’ exploration of industrial metaverse use cases
Posted: 27 Mar 2023 | Published: 28 Dec 2022
|
|
|
A Computer Weekly buyer's guide to data protection
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.
Posted: 08 Feb 2021 | Published: 20 Aug 2019
|
|
|
Using digital twins to cut costs and improve safety at Shell
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.
Posted: 08 Feb 2021 | Published: 10 Nov 2020
|
|
|
A-core Fortifies Cybersecurity
sponsored by Bitdefender
CASE STUDY:
After a close call with a ransomware attack, A-Core Concrete Specialists’ IT team decided they needed a more prepared and mature endpoint and email security operation. By partnering with Bitdefender, A-Core were able to combine several of their offerings and create a more secure operation while saving time and energy. Read on to learn more.
Posted: 10 Feb 2023 | Published: 11 Feb 2023
|
|
|
Deep learning for countering energy theft – a hybrid long-short term memory approach
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
Posted: 26 Apr 2022 | Published: 26 Apr 2022
|
|
|
The State of Software Supply Chain Security 2024
sponsored by ReversingLabs
RESEARCH CONTENT:
Over the last 3 years, supply chain attacks rose 1300%. This report is designed to give readers a map with which they can navigate the landscape of software supply chain security, exploring some of the high-level trends in software supply chain threats and how recent attacks provide insight into what’s to come. Read on to learn more.
Posted: 22 Feb 2024 | Published: 22 Feb 2024
|
|
|
Operationalize Application And Data Pipeline Modernization
sponsored by BMC Software
WHITE PAPER:
In this white paper, you'll discover how to accelerate business modernization through application and data workflow orchestration. Then, you'll learn how "freedom within the orchestration framework" empowers teams to innovate securely and efficiently. Read on now to explore Control-M's approach.
Posted: 04 Dec 2024 | Published: 05 Dec 2024
|
|
|
How To Set Up An HR Function: The Essential Guide And Checklist
sponsored by Sage
EBOOK:
This comprehensive guide walks through the essential steps to set up an effective HR function, from defining your business objectives to establishing policies and performance management. Download the e-book to learn how to build a people-focused strategy that supports your company's growth.
Posted: 31 Jul 2024 | Published: 07 Aug 2024
|
|
|
A guide to evaluating ambient and AI clinical solutions
sponsored by Microsoft and Nuance
EBOOK:
As the ambient AI market heats up, healthcare organizations must evaluate vendors' experience, expertise, technology leadership, scalability, and support. Download this eBook to learn the critical factors to consider when selecting an AI clinical partner.
Posted: 24 Sep 2024 | Published: 18 Sep 2024
|
|
|
A Computer Weekly buyer's guide to NoSQL
sponsored by TechTarget ComputerWeekly.com
EBOOK:
There's a lot of data out there, much of which doesn't need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer's guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used.
Posted: 08 Feb 2021 | Published: 28 Jul 2016
|
|
|
How To Combat Modern Cyber Threats
sponsored by Dell Technologies and Intel
EBOOK:
Cyberattacks are inevitable and are growing in volume and sophistication. Endpoint devices, networks and cloud environments have become key targets. This e-book offers IT and security decision-makers guidance on the elements needed for the most effective endpoint defense amidst this evolving threat landscape.
Posted: 18 Nov 2024 | Published: 18 Nov 2024
|
|