ComputerWeekly.com Research Library

Powered by Bitpipe.com

High Level Data Link Control Protocol White Papers

  • Seven Steps to Achieving Better Requirements Engineering in Your Organization

    Sponsored by: IBM

    Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.

  • The OSI Model: Understanding the Seven Layers of Computer Networks

    Sponsored by: Global Knowledge

    This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.

  • SOA Best Practices: The BPEL Cookbook

    Sponsored by: Oracle Corporation

    The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.

  • Demystifying IT Network Cabling Specifications from 5e to 7A

    Sponsored by: Siemon Company

    This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.

  • SOA Platforms - Evolving to Meet Stringent Market Realities

    Sponsored by: Fiorano Software, Inc.

    This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.

  • Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value

    Sponsored by: Accenture

    Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.

  • Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals

    Sponsored by: Enterprise Management Associates (EMA)

    Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.

  • DataOps: The Missing Link in Your Industrial Data Architecture

    Sponsored by: HighByte

    How can your business simplify data contextualization to maximize the value of your technology investments? By leveraging DataOps to define standard models and establish and manage integrations, operational teams can provide data to the systems and business users who are requesting it in a more efficient and managed way. Read on to learn more.

  • An OT - Cyber Physical Security Journey eBook for the US Federal Government

    Sponsored by: Merlin International

    To discover a 4-step roadmap for securing your cyber-physical systems (CPS), tap into this 10-page white paper.

  • How to Defend Against Look-Alike Domain Threats

    Sponsored by: Fortra

    This playbook breaks down the domain lifecycle, how look-alike domains are used to enable cyberthreats, and best practices for collecting, curating, and mitigating domain threats. Read the full guide to learn how to defend your organization against look-alike domain attacks.

  • Accelerating Cloud Migration for VMware Customers

    Sponsored by: Nutanix

    As VMware customers face uncertainty due to the Broadcom acquisition, many are accelerating cloud migration to mitigate risk and increase agility. This white paper explores challenges and solutions for lifting and shifting VMware workloads to the cloud with Nutanix. Read on now to learn how you can simplify your cloud migration.

  • Strengthen Data Pipeline Orchestration.

    Sponsored by: BMC Software

    Orchestrate data pipelines with Control-M's file transfer capabilities. Securely manage external file transfers, ensure compliance, and provide a seamless user experience. Learn how Control-M can streamline your data workflows in this white paper.

  • Building an Identity Security Program

    Sponsored by: Cisco

    This e-book provides a blueprint for CISOs to build an effective identity security program. Learn about the four pillars of identity security, key business outcomes, and performance indicators to measure success. Download the e-book to secure your workforce identities and keep your organization safe.

  • The Cybersecurity Investment gap: Navigating the Shifting Threat Landscape

    Sponsored by: One Identity

    The cybersecurity investment gap is widening as the threat landscape rapidly evolves. This white paper explores the expanding attack surface, rising breach costs, and limitations of current security strategies. Learn how to build a more proactive, unified security approach to protect your organization.

  • Beyond the Firewall

    Sponsored by: Pure Storage

    This white paper uncovers insights from leading CISOs on today's top security challenges, including third-party breaches, resource constraints, and evolving attack tactics. Inside, you'll find out how CISOs can build more resilient, responsive security strategies. Read on now to learn more.

  • Perfecting Cyber Resilience

    Sponsored by: Pure Storage

    When it comes to improving cyber resilience, CISOs face a host of challenges, including balancing security and performance, managing proliferating IoT devices and more. Yet, the modern cyber landscape necessitates a modern CISO strategy. In this white paper, discover the 6 tenets that such a strategy comprises.

  • Empowering the Workforce with Seamless Single Sign-On (SSO)

    Sponsored by: WatchGuard Technologies, Inc.

    Discover how single sign-on (SSO) can enhance security and productivity by enabling seamless access to multiple applications with a single set of credentials. Learn how SSO can reduce password fatigue, protect remote employees, and improve compliance. Read the white paper to learn more.

  • Empowering the Workforce with Seamless Single Sign-On (SSO)

    Sponsored by: WatchGuard Technologies, Inc.

    Discover how single sign-on (SSO) can enhance security and productivity by enabling seamless access to multiple applications with a single set of credentials. Learn how SSO can reduce password fatigue, protect remote employees, and improve compliance. Read the white paper to learn more.

  • 5 Security Measures to keep your business safe from Ransomware

    Sponsored by: Checkpoint Software Technologies

    Today’s threat landscape is unlike anything seen before. This white paper looks at the current threat landscape, analyzing what the unprecedented scope of threats means for modern security, and providing 5 key security measures that you can implement to better prepare against ransomware and other attacks. Read on to discover more.

  • Physician Burnout and Moral Injury: Addressing a Growing Crisis

    Sponsored by: Quality Reviews

    It’s no secret that it’s hard to be a physician in the US. A growing physician crisis can be attributed to burnout and its effects, but many healthcare organizations fail to recognize the role of moral injury as well. In this white paper, discover how moral injury differs from burnout and learn how you can combat it with effective solutions.

  • Getting To The Ground Truth With Gravwell Packet Capture

    Sponsored by: Gravwell

    Explore how to effectively capture and analyze network packets at scale in OT environments. Learn how to accelerate queries, extract valuable insights, and export packet data for further analysis. Read the full white paper to discover the power of packet capture at scale.

  • How to Manage SAP User Accounts and Access Rights with Identity Manager

    Sponsored by: One Identity

    Learn how Identity Manager can streamline user administration for the SAP ecosystem, including on-premises and cloud offerings. Manage user identities, privileges and security across the enterprise with integrated IAM. Read this white paper to see the benefits.

  • Preventing Domain Impersonation: How to Stop Look-Alike Domains and Spoofing

    Sponsored by: Fortra

    Domain impersonation is a growing threat for organizations, with cybercriminals using look-alike domains and email spoofing to steal data and damage reputations. Learn how to effectively monitor, detect, and mitigate domain impersonation risks in this White Paper.

  • Why Modern IAM Is Crucial For Identity Security

    Sponsored by: CyberArk

    As cyber threats evolve, so must your approach to securing access. Read this white paper now to discover how modern IAM, with intelligent privilege controls, empowers IT professionals to protect sensitive data and applications while enabling seamless, secure access.

  • How OpenTelemetry and Semantic Telemetry Will Reshape Observability

    Sponsored by: Honeycomb

    This white paper explores how OpenTelemetry and semantic telemetry are reshaping observability. It discusses the challenges of traditional telemetry, the benefits of semantic data, and how OpenTelemetry addresses the tradeoffs in observability. Read the full white paper to learn how these innovations can transform your observability practices.

  • Your Hybrid Infrastructure Is Under Attack

    Sponsored by: Palo Alto Networks

    In a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.

  • Decoding AI and Machine Learning in risk-based Authentication: What you need to know.

    Sponsored by: One Identity

    Explore how AI and machine learning enhance risk-based authentication to balance security and usability. Learn how context-aware authentication can protect against threats while providing a seamless user experience. Download the white paper to discover the benefits of AI-powered authentication.

  • Controlling and Managing Privileged Access

    Sponsored by: One Identity

    Download this report and learn the risks associated with privileged access, and explains how solutions from One Identity mitigate those risks with granular access control and accountability.

  • Chapter 1: Security and Risk Management

    Sponsored by: McGraw Hill

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

  • How to Implement an OSS Governance Program

    Sponsored by: Anaconda

    Just like all software, open-source carries risk, and many data science teams still lack security protocols. For some, there simply aren’t security protocols or governance tools for open-source software (OSS). Read on to learn about 6 steps you can take to build an OSS governance program that works for data science and set your team up for success.

  • Legacy PKI Migration

    Sponsored by: CyberArk

    Public Key Infrastructures (PKIs) are a foundational and critical element of every organization's cybersecurity. But legacy PKIs are too antiquated for today's lightning-fast, hyperconnected business world. Read this white paper to explore why the answer to your broken legacy PKI may be a PKI-as-a-service solution.

  • Making The Case: The ROI Of Demand Management

    Sponsored by: SAS

    This white paper explores how to quantify the return on investment (ROI) from improving demand planning. It provides templates to document the impact of demand planning on business decisions and calculate the financial benefits. Read on to learn how to build a compelling case for investing in demand planning improvements.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.