IT/OT convergence is necessary, but not so simple
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.
Posted: 08 Feb 2021 | Published: 14 Aug 2020
|
|
|
Leading Energy Utility Company Increases Efficiency Through PeopleSoft Financials and HRMS Systems Upgrades
sponsored by Hexaware Technologies
WHITE PAPER:
Explore the four phases of the lifecycle for the upgrade methodology of an on-site delivery model that provides upgrade services to enable one organization to achieve its business objects.
Posted: 10 Apr 2008 | Published: 01 Apr 2008
|
|
|
3-Phase Power in the Data Center
sponsored by Server Technology, Inc.
WHITE PAPER:
Greater equipment densities and power demands are driving the need for 3-phase power in the equipment cabinet. This white paper explains 3-phase power, its advantages and the cost savings associated with using it in the data center.
Posted: 04 Sep 2007 | Published: 01 Sep 2007
|
|
|
Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021
|
|
|
Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 Mar 2018
|
|
|
Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER:
SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007
|
|
|
Achieve A Flexible, Scalable Grid With Cloud-Enabled Software
sponsored by GE Vernova & AWS
WHITE PAPER:
Cloud deployment enables grid software to scale and adapt to the energy transition. Learn how GE Vernova's GridOS cloud-enabled software can help utilities orchestrate a more flexible, sustainable grid. Read the E-Book to discover the benefits.
Posted: 24 Jan 2025 | Published: 23 Jan 2025
|
|
|
Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022
|
|
|
The NIS2 Era: Are you ready for it?
sponsored by Fortinet and NTT
WHITE PAPER:
The NIS2 Directive aims to improve digital resilience and cybersecurity for critical infrastructure in Europe. Learn how to secure operational technology (OT) assets, manage cyber risks, and comply with stricter requirements. Read the full white paper to prepare your organization for the NIS2 era.
Posted: 24 Jan 2025 | Published: 30 Oct 2024
|
|
|
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
sponsored by TechTarget ComputerWeekly.com
RESOURCE:
Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
Posted: 08 Feb 2021 | Published: 06 Jul 2020
|
|
|
Publishing Test
sponsored by Lead Approval II Test Org
ANALYST BRIEF:
Publishing Test
Posted: 08 Nov 2018 | Published: 08 Nov 2018
|
All resources sponsored by Lead Approval II Test Org
|
|
Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018
|
|
|
A Computer Weekly buyer's guide to cloud bursting
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Cloud ideas expand. In this 12-page buyer's guide, Computer Weekly looks at the benefits and complexities of cloud bursting and the role of on-premise IT.
Posted: 08 Feb 2021 | Published: 25 Oct 2016
|
|
|
Veeam Cloud Connect: The complete suite for backup and replication to Covenco's cloud.
sponsored by Covenco
PRODUCT OVERVIEW:
Veeam Cloud Connect offers a secure, seamless solution for off-site backup and disaster recovery. It enables easy, encrypted data transfer to Covenco's cloud, with features like insider protection, WAN acceleration, and policy-based management. Read the full datasheet to learn how Veeam Cloud Connect can protect your critical assets.
Posted: 07 Feb 2025 | Published: 07 Feb 2025
|
|
|
More Data, More Challenges: Navigating the Changing Data Backup Landscape
sponsored by Rubrik
WHITE PAPER:
As data volumes continue to increase exponentially, cloud migration projects have accelerated—meaning that organizations have a myriad of backlogged data management, backup, and protection projects. Download this expert guide to discover the various opportunities and challenges changing data frameworks and backup expectations are creating.
Posted: 27 Jul 2021 | Published: 15 Jul 2021
|
|
|
Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018
|
|
|
CW ANZ, November 2018: Exploring blockchain
sponsored by TechTarget ComputerWeekly.com
EZINE:
Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.
Posted: 08 Feb 2021 | Published: 07 Nov 2018
|
|
|
Taming the AI-enabled Edge with HCI-based Cloud Architectures
sponsored by Nutanix
WHITE PAPER:
As edge computing and AI adoption surge, managing distributed edge infrastructure poses unique challenges. Discover how Nutanix's hyper-converged cloud platform simplifies edge computing with easy deployment, scalability, security, and remote management. Read the full white paper to see how Nutanix can streamline your edge computing initiatives.
Posted: 04 Feb 2025 | Published: 04 Feb 2025
|
|
|
Coip® Platform Zero Trust Mapping To The CISA Zero Trust Maturity Model
sponsored by Zentera Systems Inc.
WHITE PAPER:
This white paper maps Zentera's CoIP Platform to the CISA Zero Trust Maturity Model, demonstrating how the platform can help organizations rapidly transition to a Zero Trust security model. Learn more by reading the full white paper.
Posted: 13 Sep 2024 | Published: 13 Sep 2024
|
|
|
Jargon Buster Guide to Post Quantum Cryptography
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
Posted: 08 Feb 2021 | Published: 02 Oct 2018
|
|
|
The essential guide to understanding AI for SMB and Mid Market leaders in Australia and New Zealand
sponsored by Schneider Electric
WHITE PAPER:
In this white paper, explore the most important trends of AI workloads and today’s top data center challenges, and discover essential guidance to address these challenges for each physical infrastructure category—including power, cooling, racks, and software management, and more.
Posted: 18 Jun 2024 | Published: 18 Jun 2024
|
|
|
Bonding, slicing, and zero trust in a 5G world
sponsored by Ericsson
WHITE PAPER:
As enterprise networks evolve with 5G and hybrid work, SD-WAN must adapt to increase resiliency, security, and simplicity. Discover how modern SD-WAN solutions can optimize cellular connectivity, leverage zero trust principles, and integrate with SASE to enhance network performance. Read the white paper to learn more.
Posted: 18 Dec 2024 | Published: 19 Dec 2024
|
|
|
Container Technology Energizes Edge Computing
sponsored by Wind River
WHITE PAPER:
The security, portability, and agility of container technology complement the proven capabilities of the real-time operating system (RTOS), VxWorks, now available for containerized deployments at the intelligent edge. Download this white paper to learn more.
Posted: 04 Jan 2025 | Published: 01 Dec 2023
|
|
|
Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 08 Feb 2021 | Published: 02 Sep 2016
|
|
|
Atlassian Cloud Architecture And Operational Practices
sponsored by Atlassian
WHITE PAPER:
This white paper explores Atlassian's cloud architecture and operational practices, including their use of AWS, availability zones, data backups, and security controls. Read on now to learn how Atlassian ensures tenant separation and data encryption to safeguard customer data in the cloud.
Posted: 24 Oct 2024 | Published: 24 Oct 2024
|
|
|
A Computer Weekly e-guide on Network Visibility, Performance and Monitoring
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.
Posted: 06 Jul 2021 | Published: 06 Jul 2021
|
|
|
Solution Brief
sponsored by HighByte
PRODUCT OVERVIEW:
HighByte Intelligence Hub is an Industrial DataOps software solution that accelerates the use of operational data by contextualizing, standardizing, and securing information. Read the solution brief to learn how to deliver trusted, ready-to-use data across your business with this solution.
Posted: 21 Dec 2023 | Published: 21 Dec 2023
|
|
|
Want to Secure Your Hybrid Workforce with ZTNA?
sponsored by Zscaler
EBOOK:
Given the crowded nature of the zero trust network access (ZTNA) market, security professionals are forced to decipher what makes one ZTNA product stand apart from the rest. To find out 10 key, standout features of a ZTNA solution, review this e-book.
Posted: 13 Aug 2024 | Published: 21 Aug 2024
|
|
|
Security by design: How Verizon approaches 5G security.
sponsored by Verizon
WHITE PAPER:
As 5G enables new capabilities, security is a key design feature. This white paper examines Verizon's approach to 5G security, including enhancements over 4G, private 5G networks, and alignment with CISA guidelines. Read the full white paper to learn how Verizon is securing 5G for public and private sector organizations.
Posted: 19 Nov 2024 | Published: 20 Nov 2024
|
|
|
How to achieve network infrastructure modernization
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Upgrading to advanced network infrastructure involves firms being able to deliver mission-critical services through cloud providers and through their own cloud resources. Increased network infrastructure capacity need has seen deployment of optical networking and advanced network solutions such as software-defined wide area network (SDWAN).
Posted: 04 Jul 2022 | Published: 04 Jul 2022
|
|
|
7 types of networks and their use cases
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
A computer network is an interconnected system of devices, represented as network nodes, that share information, data and resources among each other. Not all networks are the same. In this e-guide, learn about the seven most common types of networks, their benefits and use cases.
Posted: 06 Jul 2022 | Published: 06 Jul 2022
|
|