Download the Fall 2009 edition of Perform Magazine
By: Actuate View more from Actuate >>
Download this next:
How to prepare your network for IoT data challenges
By: TechTarget ComputerWeekly.com
Type: eGuide
This e-guide outlines how business requirements will affect your IoT network build, takes a deep dive into specific IoT network architecture and explores IoT topology options.
These are also closely related to: "Download the Fall 2009 edition of Perform Magazine"
-
Ultimate IoT implementation guide for businesses
By: T-Mobile for Business
Type: eGuide
IoT isn't a single device, software, or technology. It is an amalgam of devices, networks, computing resources and software tools and stacks.
So, for the IT administrators, architects, developers, and CIOs looking to develop a thorough understanding of what the internet of things actually is, the prospect of sorting through what IoT is and isn’t can seem daunting.
Fortunately, IoT implementation is far easier than many may think.
Read on through this e-guide for the ultimate IoT implementation guide, including how IoT operates; its uses, requirements, and tradeoffs; and how to get started implementing internet of things devices and infrastructures.
-
Ultimate IoT implementation guide for businesses
By: TechTarget ComputerWeekly.com
Type: eGuide
The internet of things provides organizations with real-time information and business insights that, when acted upon, can ultimately make them more efficient.
IT administrators, architects, developers and CIOs considering an internet of things deployment must have a thorough understanding of what the internet of things is, how it operates, its uses, requirements, tradeoffs and how to implement internet of things devices and infrastructures.
In this e-guide, learn the requirements and use best practices for a successful deployment.
Find more content like what you just read:
-
11 top IoT online courses to boost your career
By: TechTarget ComputerWeekly.com
Type: Infographic
Recent research revealed the increasing importance of IoT in industrial applications, predicting that investment in IoT will soon overtake main technologies such as cloud computing, big data analytics and next-generation security. In this infographic, we selected 11 options for learning about IoT, from introductory to advanced levels.
-
9 IpaaS use cases for the enterprise
By: TechTarget ComputerWeekly.com
Type: eGuide
iPaaS has gained significant traction in recent years to provide a common foundation for many complex and diverse business integrations. IPaaS provides an array of readily available integrations with tools for users to assemble custom integrations and data flows. Here are 9 examples to help you understand how it all works.
-
Royal Holloway: Securing connected and autonomous vehicles
By: TechTarget ComputerWeekly.com
Type: Research Content
This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
-
Efficiently and more easily manage stored data with Cobalt Iron Compass
By: Cobalt Iron
Type: Analyst Report
Check out this analyst report to discover what makes Cobalt Iron’s Compass solution North American Data Backup Product Leadership Award material.
-
5G security: Dangers, recommendations & more
By: Reply
Type: White Paper
Supply chain risks, interdependencies with critical systems: these are two of the five major threats to 5G security that this white paper breaks down. To learn all about those dangers and how to face them, download the paper.
-
ESG: AWS Sustainability Solutions for Retail and CPG
By: AWS
Type: eBook
Read this eBook to understand how technology and data are driving the future of sustainability in retail, how AWS helps retailers and CPG companies reach sustainability goals, and how retail companies have successfully implemented AWS solutions like carbon tracking, digital twin technology, and Augmented Reality (AR).
-
Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.
-
All-Flash: The Essential Guide
By: TechTarget ComputerWeekly.com
Type: eGuide
This guide offers a comprehensive survey of the all-flash array market. We look at all-flash products from the big six storage vendors and the startups and specialists. Plus, we give the lowdown on all-flash vs hybrid flash arrays and all-flash vs server-side PCIe SSD.
-
Global Connectivity Index 2016
By: TechTarget ComputerWeekly.com
Type: Research Content
The Global Connectivity Index (GCI) 2016 from Huawei measures the progress of 50 nations in investing in and deploying Information and Communications Technology (ICT) to achieve economic digitisation
-
Creating a Compliance Culture: Best Practices
By: TechTarget Security
Type: eGuide
Check out this E-Guide and learn key tips on how to make sure your compliance culture is operating efficiently.
-
How to overcome the complexities of logistics services
By: Blue Yonder
Type: White Paper
When it comes to logistics and shipping, it’s a fact that transportation management is growing more complex by the day and has become even more essential to the success of many businesses. To ensure that the entire transportation lifecycle is optimized, you need a robust, cloud-based transportation management platform. Read on to learn more.
-
FedRAMP compliant UC
By: ARG, Inc.
Type: Case Study
A top 10 federal defense contractor with over 20,000 employees was managing a complex environment with large Avaya and Cisco footprints for PBX and contact center. They required a FedRAMP environment that provided a seamless consolidation of collaboration, conferencing and voice. Download this case study to learn how they got it.
-
E-Guide: How to tie SIM to identity management for security effectiveness
By: TechTarget Security
Type: eGuide
Security information management systems and identity and access management systems were originally created to work independently, but combining these two disparate technologies presents greater security effectiveness and control.
-
Top 10 ASEAN stories of 2018
By: TechTarget ComputerWeekly.com
Type: eGuide
In this review of the top Computer Weekly articles focused on IT in ASEAN, we look at Ascend Money's adoption of OpenShift, Go-Jek's experience with the cloud and Singapore's approach to the internet-of-things, among other developments.
-
E-Guide: Uniting SIM and IAM to Boost Security
By: TechTarget Security
Type: eGuide
When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
-
OWASP Top Ten: How to keep up
By: Contrast Security
Type: eBook
The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast’s observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.
-
Keeping up CX with cloud contact center solutions
By: InflowCX
Type: Case Study
When this home retailer began to struggle with the limitations of their on-premises contact center system, they sought out a cloud-based solution that could offer them the self-service capabilities and omnichannel services they needed. That’s when they found InflowCX. Browse this white paper to hear the full story.
-
Sensible one-page thoughts on managing performance
By: TechTarget ComputerWeekly.com
Type: eGuide
Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of short, digestible articles, written especially for Computer Weekly.
-
AI & Data Analytics in Financial Services: A Use Case Library
By: Dataiku
Type: eBook
In this 41-page e-book, you’ll discover a library of use cases for analytics and AI designed to help financial services organizations get ahead in their data journey. Read on to learn how you can develop a competitive advantage across all the different functions of your organization.
-
Buyer’s guide to evaluating SASE clouds
By: Netskope
Type: Analyst Report
Broadband-Testing is an independent testing operation which provides vendor-neutral evaluations of tech solutions. This report presents a scorecard for comparing SASE clouds and acts as a first step in the vendor evaluation process. Read on to learn more.
-
Premier Fortune 500® Technology Company Saves 30% on IT
By: ARG, Inc.
Type: Case Study
Mergers and acquisitions create turmoil in organization’s IT. To help a Fortune 500 company smooth their transition after acquiring a new organization, they turned to ARG. Access the case study here to learn how they more than doubled their initial goal to reduce network spending by 15%.
-
Pipeline-native scanning for modern application development
By: Contrast Security
Type: White Paper
Tap into this white paper to learn about an approach to application security that uses demand-driven static analysis to automatically triage vulnerabilities according to next-step actions within a modern development environment.
-
Proactive Security: Software vulnerability management and beyond
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
-
Digital experience focus broadens to encompass employees
By: TechTarget ComputerWeekly.com
Type: eGuide
This e-guide to employee experience includes a podcast discussion about the evolution of employee experience management. Also, we explore how advanced companies are responding to skills shortages and millennial employee attitudes by listening harder to their workforces.
-
34-page report: Software supply chain landscape
By: JFrog
Type: Research Content
To understand the state of the software supply chain landscape in 2024, tap into this 34-page research report.
-
IT investments: 1,500 organizations’ obstacles & experiences
By: ARG, Inc.
Type: Research Content
To understand the top obstacles to maximizing the value of your organization’s IT investments, review this 19-page report, which is informed by the survey results of 1,500 ARG clients.
-
ESG Report: Analyzing the economic benefits of cyber resilience with Commvault Cloud
By: Commvault
Type: ESG Economic Validation Report
Enterprise Strategy Group analyzed Commvault Cloud, powered by Metallic AI, and interviewed current customers to understand its impact on IT and business goals. The analysis revealed potential financial benefits in 3 areas: cost efficiency, increased agility, and reduced risk. Download the report now to learn more.
-
How CPM Software Points to Future Financial Risks and Opportunities
By: TechTarget HR Software
Type: eGuide
This expert e-guide from SearchFinancialApplications.com discusses why corporate performance management (CPM) software has become a financial planning necessity.
-
Key data governance considerations: Picking the right tool for you
By: Veritas
Type: eGuide
In this expert e-guide, we explore key evaluation factors for selecting the right data governance tool to suit the needs of your organization. Find out which metrics matter most when it comes to picking your tool, like handling metadata objects, managing data quality, addressing unstructured data, and more.
-
CW APAC: Buyer's Guide to human capital management
By: TechTarget ComputerWeekly.com
Type: Ezine
In this buyer's guide, focused on human capital management (HCM) in the Asia-Pacific region, we look at the advantages of HCM software in recruitment, the importance of listening to staff and the considerations that should be made when using work algorithms.
-
Beginner's guide to Internet of Things
By: TechTarget ComputerWeekly.com
Type: eGuide
The adoption of IoT in Asia-Pacific has accelerated over the past few years, spurred by growing digitalisation across the region and the desire to improve business processes. In this e-guide, learn more about IoT developments across the region and how to leverage the technology to drive business outcomes.
-
Top vendors in endpoint security heading into 2024
By: Bitdefender
Type: Forrester Research Report
As organizations begin to evaluate new endpoint security platforms, they have various needs to fulfill and a variety of vendors from which to choose. Based on the “must haves” many leaders are looking for in EPP and EDR solutions, discover the top-performing vendors for endpoint security in the last quarter of 2023 in this Forrester report.
-
CISSP Exam Guide Chapter 1 sample download
By: McGraw Hill
Type: White Paper
In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
-
Computer Weekly – 16 August 2022: Broadband reaches for the stars – the new space race
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at the latest space race, as satellite firms compete to provide high-speed connectivity. Is the datacentre sector hindering house building in the UK? We find out what's really going on. And we talk to the IT director of the Mercedes Formula One team about how data helps to win races. Read the issue now.
-
How to Navigate the CPM Market
By: TechTarget HR Software
Type: eGuide
In this e-guide, you will learn of the effect that in-memory computing capabilities and industry-specific approaches are having on the corporate performance management (CPM) software market, the difference between tactical and strategic CPM, why strategic CPM modules are gaining popularity, and more!
-
A Finance Leader's Guide to Automating Analytics
By: Alteryx
Type: eBook
This 38-page e-book from O’Reilly maps out the role of the modern CFO and explains how finance leaders can do more with less. Inside, you’ll discover how analytics automation can help finance leaders transform their analytics from manual and error-prone to fully automated with complete visibility. Read on to learn more.
-
Hybrid cloud requires a stable foundation: Here’s how Linux helps
By: Red Hat and Intel
Type: Analyst Report
This IDC report highlights 5 key reasons why Enterprise Linux is becoming more relevant for hybrid cloud. Tap into the report to unlock these insights, which are informed by the IDC survey responses of cloud buyers last year.
-
10 Essential Capabilities of a Best-of-Breed SOAR
By: Splunk
Type: White Paper
Overwhelmed security teams have turned to security orchestration, automation and response (SOAR) as a remedy — but not all SOAR solutions are created equal. This white paper outlines 10 essential capabilities that should be top-of-mind when evaluating SOAR technology.
-
Next step app development: Microservices
By: TechTarget ComputerWeekly.com
Type: eGuide
Adopting a microservices approach to application development is increasingly considered an essential part of any bid to modernise the legacy IT setup an organisation relies on.
-
Your path to a mature AppSec program
By: Veracode, Inc.
Type: eBook
Due to the sensitive data they contain, applications are often the target of cyberattacks – and unfortunately, application security approaches are rarely equipped to handle today’s threats. Read this e-book to learn how to modernize your application security approach.
-
How to Scale Your IaC Security Program
By: Palo Alto Networks
Type: eBook
If you have to shore up your cloud infrastructure security after you’ve already embedded IaC into your workflows, there are a few common challenges you’ll face—cloud infrastructure drift and misconfigured open source IaC components among them. Overcome these IaC challenges by reading this e-book.
-
9 Tips to Recession-Proof Your Infrastructure
By: Nobl9
Type: White Paper
This white paper will present 9 practical ideas you can implement to recession-proof your cloud infrastructure.
-
The digital enterprise: Moving from experimentation to transformation
By: TechTarget ComputerWeekly.com
Type: Research Content
This in-depth report from the World Economic Forum explains how companies can make sure their digital transformation projects are a success.
-
E-government benchmark 2016
By: TechTarget ComputerWeekly.com
Type: Essential Guide
The results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.
-
DevSecOps: A comprehensive guide
By: Contrast Security
Type: eGuide
Read this DevSecOps Buyer’s Guide and get the comprehensive checklist you need to assess, vet, and purchase a DevSecOps platform that delivers accurate, continuous, and integrated security monitoring and remediation.
-
Computer Weekly Buyer's Guide: Service Integration & Asset Management
By: TechTarget ComputerWeekly.com
Type: Ezine
In this 13-page buyer's guide, Computer Weekly looks at the effects on the IT department of technology commoditisation, open source and software as a service, the trend of insourcing IT, and the concept of service integration and management for outsourced services.
-
Ensuring Business Reliability and Reputation Through Service-Level Objectives
By: Nobl9
Type: White Paper
Discover in this white paper why, instead of building their own SLO solutions in-house, many companies can benefit from working with vendors that deliver simplified, prebuilt platforms.