Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER:
Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008
|
|
|
The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019
|
|
|
Accelerating your Database Modernization journey with Deloitte on AWS
sponsored by Amazon Web Services
EBOOK:
Unfortunately, the requested content appears to be unavailable. The server returned a 404 Not Found error for the URL. This may indicate that the white paper on AWS Database Modernization has been moved or removed. For the most up-to-date information on AWS database solutions, read the full white paper if it becomes available again.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
Security Products for Protection: Endpoint and Anti-Malware
sponsored by Carbon Black
EGUIDE:
Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.
Posted: 08 Feb 2021 | Published: 21 Aug 2017
|
|
|
Web security: Important but often overlooked
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 08 Feb 2021 | Published: 24 Nov 2017
|
|
|
Using Threat Intelligence to Improve Your Security Posture
sponsored by ESET
WHITE PAPER:
Threat intelligence helps organizations address cybersecurity risks by prioritizing and mitigating threats. This whitepaper explores types of threat intelligence, its sources, and how it's applied to improve security. Learn to leverage threat intelligence to strengthen your organization's defenses against evolving cyber threats.
Posted: 27 Feb 2025 | Published: 27 Feb 2025
|
|
|
How Van Horn Improves Employee Training By 20%
sponsored by T-Mobile for Business
CASE STUDY:
“Amaze Our Customers”: This is Van Horn Automotive Group’s philosophy. To continue fulfilling that mission, Van Horn set out to transform its communications system. This case study maps out the journey, breaking down how, in addition to modernizing its communications, Van Horn improved its onboarding training. Read on for more details.
Posted: 18 Jul 2024 | Published: 18 Jul 2024
|
|
|
Unified Communications: One Simple Tool to Help Avoid the Hang-Ups of Legacy Voice Systems
sponsored by T-Mobile for Business
ANALYST REPORT:
As SMBs grapple with increasingly competitive situations where connectivity between employees and customers is essential, unified communications (UC) solutions have risen to the occasion. Further explore the role UC plays in reducing the need for dedicated internal resources and cutting costs for SMBs in this IDC report.
Posted: 20 Jun 2023 | Published: 20 Jun 2024
|
|
|
Prevention first: Leveraging Cyber Threat Intelligence for Proactive Defense
sponsored by ESET
WHITE PAPER:
This white paper explores the role of cyber threat intelligence in proactive defense strategies. It examines challenges, benefits of prevention-first approaches, and how ESET's Threat Intelligence solutions enhance security. Learn to leverage CTI for effective threat mitigation and risk reduction. Read the full white paper for insights.
Posted: 27 Feb 2025 | Published: 27 Feb 2025
|
|
|
The Secure Coding Handbook
sponsored by Veracode
EBOOK:
This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
Posted: 06 Jun 2023 | Published: 06 Jun 2023
|
|
|
Hacking the Human Operating System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 08 Feb 2021 | Published: 27 Feb 2017
|
|
|
The Benefits of AI and Automation for SMBs and How 5G Can Help Amplify Them
sponsored by T-Mobile for Business
ANALYST REPORT:
34% of all U.S. SMBs listed process automation as one of their top 5 forward-looking technology investments for the next 12 months, according to IDC research. This report explores how SMBs can amplify the benefits of automation and AI with help from 5G. Read on to access the analyst insights.
Posted: 12 Jul 2024 | Published: 31 Oct 2024
|
|
|
Effectively leveraging cloud-based contracts
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Cloud contracts offer great benefits, but they can put organisations at significantly greater risk than conventional IT service contracts. This report by consultant Bob Fawthrop explains how to mitigate the risks.
Posted: 08 Feb 2021 | Published: 18 Jan 2017
|
|
|
How Business Travelers and Remote Workers Benefit from Connectivity on the Go
sponsored by T-Mobile for Business
ANALYST REPORT:
This white paper addresses considerations for SMBs to maintain secure, productive remote work, including:How to overcome challenges of public Wi-Fi and BYOD for mobile workBenefits of 5G for consistent coverage and enhanced securityRead the white paper now.
Posted: 16 Jul 2024 | Published: 16 Jul 2024
|
|
|
The Modern Guide To OAuth
sponsored by FusionAuth
EBOOK:
This guide explores OAuth 2.0 implementation, covering authorization modes, grants, and real-world uses. It provides code examples and insights into secure authentication workflows for web and mobile apps. Learn to handle tokens, refresh access, and implement device authorization. Read this e-book to master OAuth and build secure applications.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
Payroll legislation: how ADP takes the stress out of compliance (IN)
sponsored by ADP
EBOOK:
Today’s financial and HR leaders expect challenges when it comes to compliance, especially when expanding into new markets. However, few have sufficient guidance for entering these new landscapes. Browse this guide to learn more.
Posted: 02 Feb 2024 | Published: 02 Feb 2024
|
|
|
Payroll legislation: how ADP takes the stress out of compliance (HK)
sponsored by ADP
EBOOK:
Today’s financial and HR leaders expect challenges when it comes to compliance, especially when expanding into new markets. However, few have sufficient guidance for entering these new landscapes. Browse this guide to learn more.
Posted: 02 Feb 2024 | Published: 02 Feb 2024
|
|
|
Payroll legislation: how ADP takes the stress out of compliance (SG)
sponsored by ADP
EBOOK:
Today’s financial and HR leaders expect challenges when it comes to compliance, especially when expanding into new markets. However, few have sufficient guidance for entering these new landscapes. Browse this guide to learn more.
Posted: 02 Feb 2024 | Published: 02 Feb 2024
|
|
|
Payroll legislation: how ADP takes the stress out of compliance (PH)
sponsored by ADP
EBOOK:
Today’s financial and HR leaders expect challenges when it comes to compliance, especially when expanding into new markets. However, few have sufficient guidance for entering these new landscapes. Browse this guide to learn more.
Posted: 02 Feb 2024 | Published: 02 Feb 2024
|
|
|
Payroll legislation: how ADP takes the stress out of compliance (AU)
sponsored by ADP
EBOOK:
Today’s financial and HR leaders expect challenges when it comes to compliance, especially when expanding into new markets. However, few have sufficient guidance for entering these new landscapes. Browse this guide to learn more.
Posted: 02 Feb 2024 | Published: 02 Feb 2024
|
|
|
Endpoint Security Evaluation Guide
sponsored by Malwarebytes
WHITE PAPER:
This e-book provides a comprehensive guide to evaluating endpoint security solutions. It covers 11 critical criteria for effective protection, including preventing zero-day threats, blocking phishing and ransomware, and ensuring low performance impact. Read the full guide to learn how to select the right endpoint security for your organization.
Posted: 23 Jan 2025 | Published: 23 Jan 2025
|
|
|
A GUIDE TO January 2025 Migrating from Citrix to Azure Virtual Desktop with Nerdio
sponsored by Nerdio
EBOOK:
This guide outlines migrating from Citrix to Azure Virtual Desktop with Nerdio, covering licensing differences, architectural comparisons, image management, and connectivity options. Learn to streamline your migration, reduce costs, and leverage Azure's cloud infrastructure. Read the full ebook for a comprehensive roadmap.
Posted: 03 Mar 2025 | Published: 04 Mar 2025
|
|
|
Extracting actionable data from banking malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 08 Feb 2021 | Published: 17 Aug 2016
|
|
|
Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 08 Feb 2021 | Published: 28 Feb 2018
|
|
|
The sped-up deployment of IoT on the back of "failure free" 5G
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Research in November 2021 from Inmarsat Enterprise found that as many as 84% of businesses gave sped up deployment of IoT, or plan to, because of Covid. In this guide, learn how businesses implementing IoT technologies are getting ahead of the competition across their value chains.
Posted: 10 Dec 2021 | Published: 10 Dec 2021
|
|
|
Network Threat Trends Research Report
sponsored by Palo Alto Networks
RESEARCH CONTENT:
Understanding threat actors’ preferred methods and malware families can give you insights into how to set up your defenses and best protect your organization. In this report, explore current trends in malware and the evolving threat landscape with exhaustive research from the Palo Alto Networks Unit 42 research team.
Posted: 27 Dec 2024 | Published: 28 Dec 2024
|
|