Telnet Protocol White Papers
-
Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.
-
Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
-
Computer Weekly - 28 September 2021: Chancellor Rishi Sunak talks tech
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to the Chancellor of the Exchequer about his plans to support innovation and growth in the UK tech sector. Composable IT is the latest trend in building software to support business change. And Halfords built its own service management software – and now is selling it to other retailers. Read the issue now.
-
Computer Weekly – 15 December 2020: How security will be different after Covid-19
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
-
CW APAC: Expert advice on zero-trust security
Sponsored by: TechTarget ComputerWeekly.comZero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
-
CW EMEA - May 2023: The future of work
Sponsored by: TechTarget ComputerWeekly.comIn this month's CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now.
-
E-Book: Strategic guide to insider threat detection and breach response
Sponsored by: TechTarget SecurityData loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.
-
E-Guide: Prioritizing Application Security Concerns
Sponsored by: TechTarget SecurityApplication security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
-
9 Advantages to Using Remote Support Tools for an IT Support Company/Consultant
Sponsored by: GFI SoftwareWith the imminent announcement of GFI MAX Remote Management’s new and greatly improved remote support tool ‘Take Control’ – it’s time to take a close look at the world of Remote IT Support.
-
A special issue covering the information security market
Sponsored by: MicroScopeA special issue covering the opportunities for resellers selling big data hinfrastructure, accessories and management tools.
-
An Introduction to Quantum Lifecycle Management
Sponsored by: TechTarget ComputerWeekly.comThis report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
-
AT&T Virtual Tunneling Service
Sponsored by: AT&T CorpAT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.
-
Built-in Self-test (BIST) Using Boundary Scan
Sponsored by: Texas Instruments, Inc.This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
-
Business Continuity Management Systems
Sponsored by: TechTarget ComputerWeekly.comBrush-up you knowledge of the practical aspects of business continuity management with this book extract.
-
Cisco Any Device: Planning a Productive, Secure and Competitive Future
Sponsored by: CiscoDiscover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
-
Cruise Industry Leader Carnival Australia Improves IT Productivity and Reduces IT Costs by Optimizing Satellite WAN with Silver Peak
Sponsored by: Silver PeakThis case study demonstrates how Carnival Australia was able to achieve necessary improvements using Silver Peak’s data center class WAN optimization appliances to optimize satellite connections and address the network-induced latency, bandwidth limitations, and packet-loss issues on the WAN.
-
Demystifying IT Network Cabling Specifications from 5e to 7A
Sponsored by: Siemon CompanyThis paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
-
E-Book: Standardizing Business Continuity
Sponsored by: IBMDownload this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
-
Enable an Empowered and Distributed Workforce Through Managed Remote Services
Sponsored by: AT&T CorpTo react quickly to customers’ needs, organizations are decentralizing their workforce and shifting them into the flow of their customers’ lives.
-
Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance
Sponsored by: CitrixThis white paper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
-
Enabling Seamless Remote Access to 3D Applications and Data through Virtualization
Sponsored by: CitrixThis whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
-
Ericom Desktop Virtualization Solutions
Sponsored by: Ericom SoftwareEricom virtualization solutions enable you to administer virtual desktops from a centralized location, reducing the cost and complexity of virtual desktop deployment and upkeep. Supported virtualization servers include VMware, Microsoft and others.
-
Establishing an Effective Application Strategy for your Mobile Enterprise
Sponsored by: IBMThe explosion of enterprise applications has made it possible for many employees to work anywhere, anytime. IT is pressed to deliver security-rich applications across platforms and devices. This white paper provides an overview to help you establish an effective mobile application strategy.
-
Facilitating “sound practices” in risk management with IBM OpenPages ORM
Sponsored by: IBMThis white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
-
Field Service Mobility Best Practices
Sponsored by: NetMotion WirelessDelivering applications and data to mobile workers is a key initiative among modern organizations. Mobile field initiatives offer tangible benefits, such as improved customer service and productivity. Learn how a virtual private network (VPN) helps achieve a seamless deployment while providing reliable network connections for mobile workers.