Transmission and Distribution Reports

IT/OT convergence is necessary, but not so simple
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.
Posted: 08 Feb 2021 | Published: 14 Aug 2020

TechTarget ComputerWeekly.com

Leading Energy Utility Company Increases Efficiency Through PeopleSoft Financials and HRMS Systems Upgrades
sponsored by Hexaware Technologies
WHITE PAPER: Explore the four phases of the lifecycle for the upgrade methodology of an on-site delivery model that provides upgrade services to enable one organization to achieve its business objects.
Posted: 10 Apr 2008 | Published: 01 Apr 2008

Hexaware Technologies

3-Phase Power in the Data Center
sponsored by Server Technology, Inc.
WHITE PAPER: Greater equipment densities and power demands are driving the need for 3-phase power in the equipment cabinet. This white paper explains 3-phase power, its advantages and the cost savings associated with using it in the data center.
Posted: 04 Sep 2007 | Published: 01 Sep 2007

Server Technology, Inc.

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

TechTarget ComputerWeekly.com

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 Mar 2018

TechTarget ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Achieve A Flexible, Scalable Grid With Cloud-Enabled Software
sponsored by GE Vernova & AWS
WHITE PAPER: Cloud deployment enables grid software to scale and adapt to the energy transition. Learn how GE Vernova's GridOS cloud-enabled software can help utilities orchestrate a more flexible, sustainable grid. Read the E-Book to discover the benefits.
Posted: 24 Jan 2025 | Published: 23 Jan 2025

GE Vernova & AWS

Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

TechTarget ComputerWeekly.com

The NIS2 Era: Are you ready for it?
sponsored by Fortinet and NTT
WHITE PAPER: The NIS2 Directive aims to improve digital resilience and cybersecurity for critical infrastructure in Europe. Learn how to secure operational technology (OT) assets, manage cyber risks, and comply with stricter requirements. Read the full white paper to prepare your organization for the NIS2 era.
Posted: 24 Jan 2025 | Published: 30 Oct 2024

Fortinet and NTT

Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
sponsored by TechTarget ComputerWeekly.com
RESOURCE: Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
Posted: 08 Feb 2021 | Published: 06 Jul 2020

TechTarget ComputerWeekly.com

Publishing Test
sponsored by Lead Approval II Test Org
ANALYST BRIEF: Publishing Test
Posted: 08 Nov 2018 | Published: 08 Nov 2018

TOPICS:  .NET
All resources sponsored by Lead Approval II Test Org

Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to cloud bursting
sponsored by TechTarget ComputerWeekly.com
EBOOK: Cloud ideas expand. In this 12-page buyer's guide, Computer Weekly looks at the benefits and complexities of cloud bursting and the role of on-premise IT.
Posted: 08 Feb 2021 | Published: 25 Oct 2016

TechTarget ComputerWeekly.com

Veeam Cloud Connect: The complete suite for backup and replication to Covenco's cloud.
sponsored by Covenco
PRODUCT OVERVIEW: Veeam Cloud Connect offers a secure, seamless solution for off-site backup and disaster recovery. It enables easy, encrypted data transfer to Covenco's cloud, with features like insider protection, WAN acceleration, and policy-based management. Read the full datasheet to learn how Veeam Cloud Connect can protect your critical assets.
Posted: 07 Feb 2025 | Published: 07 Feb 2025

Covenco

More Data, More Challenges: Navigating the Changing Data Backup Landscape
sponsored by Rubrik
WHITE PAPER: As data volumes continue to increase exponentially, cloud migration projects have accelerated—meaning that organizations have a myriad of backlogged data management, backup, and protection projects. Download this expert guide to discover the various opportunities and challenges changing data frameworks and backup expectations are creating.
Posted: 27 Jul 2021 | Published: 15 Jul 2021

Rubrik

Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018

TOPICS:  Telephones | VoIP
TechTarget ComputerWeekly.com

CW ANZ, November 2018: Exploring blockchain
sponsored by TechTarget ComputerWeekly.com
EZINE: Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.
Posted: 08 Feb 2021 | Published: 07 Nov 2018

TechTarget ComputerWeekly.com

Taming the AI-enabled Edge with HCI-based Cloud Architectures
sponsored by Nutanix
WHITE PAPER: As edge computing and AI adoption surge, managing distributed edge infrastructure poses unique challenges. Discover how Nutanix's hyper-converged cloud platform simplifies edge computing with easy deployment, scalability, security, and remote management. Read the full white paper to see how Nutanix can streamline your edge computing initiatives.
Posted: 04 Feb 2025 | Published: 04 Feb 2025

Nutanix

Coip® Platform Zero Trust Mapping To The CISA Zero Trust Maturity Model
sponsored by Zentera Systems Inc.
WHITE PAPER: This white paper maps Zentera's CoIP Platform to the CISA Zero Trust Maturity Model, demonstrating how the platform can help organizations rapidly transition to a Zero Trust security model. Learn more by reading the full white paper.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Jargon Buster Guide to Post Quantum Cryptography
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
Posted: 08 Feb 2021 | Published: 02 Oct 2018

TechTarget ComputerWeekly.com

The essential guide to understanding AI for SMB and Mid Market leaders in Australia and New Zealand
sponsored by Schneider Electric
WHITE PAPER: In this white paper, explore the most important trends of AI workloads and today’s top data center challenges, and discover essential guidance to address these challenges for each physical infrastructure category—including power, cooling, racks, and software management, and more.
Posted: 18 Jun 2024 | Published: 18 Jun 2024

TOPICS:  .NET
Schneider Electric

Bonding, slicing, and zero trust in a 5G world
sponsored by Ericsson
WHITE PAPER: As enterprise networks evolve with 5G and hybrid work, SD-WAN must adapt to increase resiliency, security, and simplicity. Discover how modern SD-WAN solutions can optimize cellular connectivity, leverage zero trust principles, and integrate with SASE to enhance network performance. Read the white paper to learn more.
Posted: 18 Dec 2024 | Published: 19 Dec 2024

Ericsson

Container Technology Energizes Edge Computing
sponsored by Wind River
WHITE PAPER: The security, portability, and agility of container technology complement the proven capabilities of the real-time operating system (RTOS), VxWorks, now available for containerized deployments at the intelligent edge. Download this white paper to learn more.
Posted: 04 Jan 2025 | Published: 01 Dec 2023

TOPICS:  .NET
Wind River

Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 08 Feb 2021 | Published: 02 Sep 2016

TechTarget ComputerWeekly.com

Atlassian Cloud Architecture And Operational Practices
sponsored by Atlassian
WHITE PAPER: This white paper explores Atlassian's cloud architecture and operational practices, including their use of AWS, availability zones, data backups, and security controls. Read on now to learn how Atlassian ensures tenant separation and data encryption to safeguard customer data in the cloud.
Posted: 24 Oct 2024 | Published: 24 Oct 2024

Atlassian

A Computer Weekly e-guide on Network Visibility, Performance and Monitoring
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.
Posted: 06 Jul 2021 | Published: 06 Jul 2021

TechTarget ComputerWeekly.com

Solution Brief
sponsored by HighByte
PRODUCT OVERVIEW: HighByte Intelligence Hub is an Industrial DataOps software solution that accelerates the use of operational data by contextualizing, standardizing, and securing information. Read the solution brief to learn how to deliver trusted, ready-to-use data across your business with this solution.
Posted: 21 Dec 2023 | Published: 21 Dec 2023

TOPICS:  .NET
HighByte

Want to Secure Your Hybrid Workforce with ZTNA?
sponsored by Zscaler
EBOOK: Given the crowded nature of the zero trust network access (ZTNA) market, security professionals are forced to decipher what makes one ZTNA product stand apart from the rest. To find out 10 key, standout features of a ZTNA solution, review this e-book.
Posted: 13 Aug 2024 | Published: 21 Aug 2024

Zscaler

Security by design: How Verizon approaches 5G security.
sponsored by Verizon
WHITE PAPER: As 5G enables new capabilities, security is a key design feature. This white paper examines Verizon's approach to 5G security, including enhancements over 4G, private 5G networks, and alignment with CISA guidelines. Read the full white paper to learn how Verizon is securing 5G for public and private sector organizations.
Posted: 19 Nov 2024 | Published: 20 Nov 2024

Verizon

How to achieve network infrastructure modernization
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Upgrading to advanced network infrastructure involves firms being able to deliver mission-critical services through cloud providers and through their own cloud resources. Increased network infrastructure capacity need has seen deployment of optical networking and advanced network solutions such as software-defined wide area network (SDWAN).
Posted: 04 Jul 2022 | Published: 04 Jul 2022

TechTarget ComputerWeekly.com

7 types of networks and their use cases
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A computer network is an interconnected system of devices, represented as network nodes, that share information, data and resources among each other. Not all networks are the same. In this e-guide, learn about the seven most common types of networks, their benefits and use cases.
Posted: 06 Jul 2022 | Published: 06 Jul 2022

TechTarget ComputerWeekly.com