High Level Data Link Control Protocol Research
-
Using Oracle BI with Oracle E-Business Suite
Sponsored by: Noetix CorporationThis webcast gives an overview of the Oracle E-Business Suite and demonstrates how to integrate Oracle BI suite with the Oracle EBS using Noetix software offerings.
-
The OSI Model: Understanding the Seven Layers of Computer Networks
Sponsored by: Global KnowledgeThis paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
-
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
Sponsored by: AccentureMaster data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
-
Seven Steps to Achieving Better Requirements Engineering in Your Organization
Sponsored by: IBMRequirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
-
Demystifying IT Network Cabling Specifications from 5e to 7A
Sponsored by: Siemon CompanyThis paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
-
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
Sponsored by: Enterprise Management Associates (EMA)Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
-
SOA Best Practices: The BPEL Cookbook
Sponsored by: Oracle CorporationThe Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
-
SOA Platforms - Evolving to Meet Stringent Market Realities
Sponsored by: Fiorano Software, Inc.This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
-
The great IAM - time to modernise?
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?
-
DataOps: The Missing Link in Your Industrial Data Architecture
Sponsored by: HighByteHow can your business simplify data contextualization to maximize the value of your technology investments? By leveraging DataOps to define standard models and establish and manage integrations, operational teams can provide data to the systems and business users who are requesting it in a more efficient and managed way. Read on to learn more.
-
Email security: Never more important
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
-
Kubernetes Traffic Engineering for Network Engineers: Cilium Best Practices
Sponsored by: CiscoTraffic engineering in Kubernetes optimizes network performance, security, and costs. This paper explores using Cilium, a leading cloud-native networking solution, for advanced traffic routing in Kubernetes. Learn techniques for managing traffic flows. Discover how to build a resilient, high-performance Kubernetes network.
-
Bluetooth Low Energy: The IoT battle
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
-
An OT - Cyber Physical Security Journey eBook for the US Federal Government
Sponsored by: Merlin InternationalTo discover a 4-step roadmap for securing your cyber-physical systems (CPS), tap into this 10-page white paper.
-
Simplify desktop management and reduce costs by up to 40%
Sponsored by: DellEMC and Intel®This white paper goes over what organizations have to gain - and lose - from virtual desktop technology.
-
8 secure file transfer services for the enterprise
Sponsored by: TechTarget ComputerWeekly.comToday's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
-
Manufacturing: Step Into the Future of Industrial Security
Sponsored by: VerkadaStreamline manufacturing security and operations with Verkada's comprehensive platform. Enhance site security, optimize workflows, and ensure workplace safety - all from a centralized cloud-based system. Read the full White Paper to learn how Verkada can benefit your manufacturing business.
-
Mastering Cilium for Kubernetes Compliance
Sponsored by: CiscoCilium simplifies Kubernetes compliance with advanced networking, security, and observability features. Learn how Cilium addresses NIST 800-53 and 800-190 controls for access control, auditing, and incident response in this white paper.
-
How to Defend Against Look-Alike Domain Threats
Sponsored by: FortraThis playbook breaks down the domain lifecycle, how look-alike domains are used to enable cyberthreats, and best practices for collecting, curating, and mitigating domain threats. Read the full guide to learn how to defend your organization against look-alike domain attacks.
-
Jargon Buster Guide to Voice over IP (VoIP)
Sponsored by: TechTarget ComputerWeekly.comIn this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
-
How To Combat Modern Cyber Threats
Sponsored by: Dell Technologies and IntelCyberattacks are inevitable and are growing in volume and sophistication. Endpoint devices, networks and cloud environments have become key targets. This e-book offers IT and security decision-makers guidance on the elements needed for the most effective endpoint defense amidst this evolving threat landscape.
-
Essential Guide: Securing hybrid IT infrastructure
Sponsored by: TechTarget ComputerWeekly.comIn this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
-
Compliance with EU DORA
Sponsored by: DigiCertThe EU's Digital Operational Resilience Act (DORA) aims to rationalise information and communication technology risk management across the financial system. With fines for non-compliance, your company must create a plan to close any gaps. Download this product overview to learn how DigiCert ONE helps organisations comply with DORA.
-
Using digital twins to cut costs and improve safety at Shell
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.
-
10 Essential Use Cases for Attack Surface Management
Sponsored by: Palo Alto NetworksDiscover 10 essential use cases for attack surface management to secure your complex, evolving attack surface. Learn how Cortex Xpanse can help you prevent ransomware, eliminate shadow IT, respond to zero-days, and more. Read the full e-book to take a proactive approach to attack surface management.
-
CDN Buyer’s Guide
Sponsored by: FastlyMany CDNs offer the same types of services, but they're not all the same. This Buyer’s Guide can help you distinguish the best from the rest. Download it now to explore the key factors to consider when selecting a CDN, essential questions to ask to ensure you get the most out of your CDN, and more.
-
A network automation roadmap to reap tech's best benefits
Sponsored by: TechTarget NetworkingA network automation roadmap can help guide organizations through the Wild West of modern networking in order to reap benefits that automation can bring to employees, customers and partners. Reducing labor-intensive tasks does entail changing a network engineer's work, though.
-
Cloud computing storage key management
Sponsored by: TechTarget ComputerWeekly.comJagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
-
A Computer Weekly e-guide to WAN & applications services
Sponsored by: TechTarget ComputerWeekly.comOne of the key technology trends of the last five years, if not longer, has been the migration from networks based on multiprotocol label switching (MPLS) to the more agile and affordable alternative, wide-area networking (WAN) technologies and in particular software-defined (SD-WAN).
-
A Computer Weekly buyer's guide to anti-ransomware
Sponsored by: TechTarget ComputerWeekly.comThe threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.
-
The exploitation of flaws in the HTTPS protocol
Sponsored by: TechTarget ComputerWeekly.comFor both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
-
Data Modeling Guidebook
Sponsored by: HighByteDigital transformation is providing an unprecedented amount of predictive insights, but making the best use of this data can be daunting. Check out HighByte’s e-book to gain a better understanding of how data modeling works, what it looks like, how it works with existing standards, and to gather tips on how to establish a data modeling strategy.
-
A Computer Weekly E-guide to NAS
Sponsored by: TechTarget ComputerWeekly.comIn the guide we look at the fundamentals of NAS and the use cases it best suits, the range of file access storage products available including in the cloud and in hybrid operation between cloud and datacentre. We also examine the question of NAS backup, looking at the challenges that have accompanied it and the solutions available.