V.21 Standards Reports

How to Slash Corporate Fax Telephone Charges 20 - 80%: Overview of V.34 Faxing and JBIG Document Compression
sponsored by FaxBack, Inc.
WHITE PAPER: An in-depth look at V.34 high-speed fax and JBIG document compression technology...designed to save companies significant money in reducing fax telephone charges.
Posted: 18 Sep 2003 | Published: 01 May 2004

FaxBack, Inc.

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Successful Mobile Deployments Require Robust Security
sponsored by Lopez Research
WHITE PAPER: Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 20 May 2009 | Published: 20 May 2009

Lopez Research

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Simplify policy adoption in Terraform with pre-written Sentinel policies for AWS
sponsored by Hashicorp & AWS
BLOG: HashiCorp and AWS have released pre-written Sentinel policy sets for AWS to simplify policy adoption in Terraform. These policies help organizations comply with standards like CIS benchmarks, reducing barriers to policy as code workflows. Read on now to learn how you can enhance security, compliance, and efficiency across AWS services.
Posted: 07 May 2025 | Published: 07 May 2025

TOPICS:  .NET
Hashicorp & AWS

CW Middle East July to Sept 2016
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.
Posted: 08 Feb 2021 | Published: 18 Jul 2016

TechTarget ComputerWeekly.com

Future of Work
sponsored by TechTarget ComputerWeekly.com
BOOK: In this extract from his book, The Future of Work, Jacob Morgan looks at the five key factors shaping the way we work.
Posted: 08 Feb 2021 | Published: 09 Feb 2015

TechTarget ComputerWeekly.com

The AI Disruption: Challenges and Guidance for Data Center Design
sponsored by Schneider Electric
WHITE PAPER: Artificial intelligence (AI) deployments are taking up an increasingly large portion of data center workloads. This paper explains relevant attributes and trends of AI workloads and describes the resulting data center challenges, including Guidance for how to address these challenges. Read on to learn more.
Posted: 25 Jan 2024 | Published: 26 Jan 2024

TOPICS:  .NET
Schneider Electric

Avon calling: what happens when lockdown eliminates your business model?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, global beauty brand Avon explains how it coped with a lockdown dilemma – a door-to-door sales model when its reps couldn't leave home. Our buyer's guide examines the use of artificial intelligence in IT security. And we analyse the government's decision to strip Huawei from the UK's 5G network. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Jan 2021

TechTarget ComputerWeekly.com

Avon calling: what happens when lockdown eliminates your business model?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, global beauty brand Avon explains how it coped with a lockdown dilemma – a door-to-door sales model when its reps couldn't leave home. Our buyer's guide examines the use of artificial intelligence in IT security. And we analyse the government's decision to strip Huawei from the UK's 5G network. Read the issue now.
Posted: 08 Feb 2021 | Published: 21 Jul 2020

TechTarget ComputerWeekly.com

Is Your Development Team Ready to Meet New PCI-DSS Requirements?
sponsored by Security Journey
WHITE PAPER: With PCI DSS version 4.0 in force, organizations must adopt secure practices to protect payment card data. This white paper outlines six steps for PCI DSS compliance, including defining roles, evaluating knowledge gaps, and building training programs. Read the full white paper to secure your development team and build a strong security culture.
Posted: 16 Jan 2025 | Published: 16 Jan 2025

Security Journey

Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE: David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

Tech Trends 2025
sponsored by Info-Tech Research Group
WHITE PAPER: The future of IT is arriving faster than ever. Tech Trends 2025 from Info-Tech Research Group highlights six disruptive forces that will redefine technology leadership—from AI sovereignty to quantum computing risks. Read on now.
Posted: 02 May 2025 | Published: 02 May 2025

Info-Tech Research Group

Top 10 Concerns Of Leveraging AI In Healthcare
sponsored by Surgical Safety Technologies
WHITE PAPER: AI benefits healthcare, but concerns about accuracy, bias, and ethics remain. This paper explores 10 key issues, from data security to information overload, and solutions through careful implementation and standards. Discover how AI can improve healthcare while preserving human expertise and patient safety.
Posted: 22 Mar 2025 | Published: 22 Mar 2025

Surgical Safety Technologies

The currency of trust: why banks and insurers must make customer data safer and more secure
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
Posted: 08 Feb 2021 | Published: 25 Apr 2017

TechTarget ComputerWeekly.com

Power Distribution Units
sponsored by Panduit
PRODUCT OVERVIEW: Panduit's Power Distribution Units offer versatile solutions for data centers, from basic to intelligent PDUs with advanced monitoring. Features include high-temperature operation, hot-swappable controllers, and integration with Cisco Nexus Dashboard for energy management. Discover how Panduit PDUs enhance efficiency and protect infrastructure.
Posted: 18 Mar 2025 | Published: 18 Mar 2025

Panduit

How do Iconic Business Models such as Airbnb Emerge?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Brands such as Airbnb disrupt industries and change how consumers think about the market, according to this research from Cass Business School, City University London.
Posted: 08 Feb 2021 | Published: 16 Mar 2016

TechTarget ComputerWeekly.com

The Modern Guide To OAuth
sponsored by FusionAuth
EBOOK: This guide explores OAuth 2.0 implementation, covering authorization modes, grants, and real-world uses. It provides code examples and insights into secure authentication workflows for web and mobile apps. Learn to handle tokens, refresh access, and implement device authorization. Read this e-book to master OAuth and build secure applications.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

FusionAuth

Why cloud? Why now? A Qlik Cloud Comparison Guide
sponsored by Qlik
EBOOK: Discover the advantages of a modern, AI-powered cloud analytics platform. This Qlik Cloud Comparison Guide highlights key differences from on-premises solutions, including enhanced security, data management, AI-powered analytics, machine learning, and automation. See how Qlik Cloud elevates your analytics. Read the Qlik Cloud Comparison Guide
Posted: 13 Sep 2024 | Published: 14 Sep 2024

Qlik

Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Nov 2016

TechTarget ComputerWeekly.com

A Study on Secure Coding Training
sponsored by Security Journey
RESEARCH CONTENT: Regulations on software security are rising, with bodies like the White House, CISA, and SEC taking action. This study examines secure coding training, revealing many organizations lack a strong security culture and rely too much on tools instead of training developers. Learn to build a proactive, security-focused approach in this White Paper.
Posted: 16 Jan 2025 | Published: 16 Jan 2025

Security Journey

Managing M&A Risk
sponsored by Tanium
WHITE PAPER: To optimally manage cyber risk in the mergers and acquisitions process, acquiring organizations need a rapid, accurate way to map all the endpoint assets in a target company. Read about how this is done in Managing M&A Risk: How Endpoint Visibility Can Deliver Critical Advantages.
Posted: 26 Jan 2023 | Published: 27 Jan 2023

TOPICS:  .NET
Tanium

The Business Value of Dell PowerFlex
sponsored by Dell Technologies
WHITE PAPER: In this IDC white paper, discover why IDC calculates that users of Dell PowerFlex will realize an average benefit of $7.24 million and a 276% return on investment (ROI) over a three-year time frame.
Posted: 06 May 2024 | Published: 06 May 2024

TOPICS:  .NET
Dell Technologies

API Security & Compliance: Implicit and explicit requirements for data protection
sponsored by Akamai
WHITE PAPER: This white paper explores the nature of growing API risks, highlights six examples of regulations and frameworks that require API protections (either explicitly or implicitly), and offers advice on how to meet compliance requirements through API security best practices.
Posted: 14 May 2025 | Published: 14 May 2025

Akamai

Luminis Health improves throughput & access at one of the nation’s busiest ERs
sponsored by Fabric Health
CASE STUDY: Luminis Health faced rising wait times and staff burnout post-pandemic. To address these challenges, they partnered with Fabric to digitally transform their emergency department by digitizing the patient intake process, educating patients about their visit, and improving follow-up scheduling and PCP attachment.
Posted: 29 Aug 2024 | Published: 29 Aug 2024

Fabric Health

Computer Weekly - 21 September 2021: The cities planning for ethical use of AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now.
Posted: 21 Sep 2021 | Published: 21 Sep 2021

TechTarget ComputerWeekly.com

The Power Of Patient Insights In Modern Healthcare
sponsored by Dovetail
EBOOK: Discover how healthcare organizations balance patient privacy with patient research to improve outcomes. This e-book explores AI integration in research, patient journey mapping, and strategies for protecting data while gaining insights. Learn how Dovetail helps providers create a patient-centered approach.
Posted: 02 Apr 2025 | Published: 02 Apr 2025

Dovetail

Computer Weekly - 15 September 2020: How data has helped in the fight against coronavirus
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the Office for National Statistics about the important role data plays in the battle against Covid-19. We also look at the speedy deployment of the Scottish contact-tracing app and report on a discussion about the UK government's delayed response to its digital identity consultation. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Sep 2020

TechTarget ComputerWeekly.com

Security Think Tank: Biden's Cyber Security Plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TechTarget ComputerWeekly.com