Manufacturing Applications Protocol Reports

Focus: Network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 08 Feb 2021 | Published: 24 Apr 2017

TechTarget ComputerWeekly.com

How to enhance your network for the future
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
Posted: 08 Feb 2021 | Published: 15 Aug 2016

TechTarget ComputerWeekly.com

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER: Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

LANSA

Computer Weekly – 19 March 2013: Delivering software development success
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
Posted: 18 Mar 2013 | Published: 19 Mar 2013

TechTarget ComputerWeekly.com

Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software

E-Book: Standardizing Business Continuity
sponsored by IBM
EBOOK: Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
Posted: 15 Dec 2010 | Published: 15 Dec 2010

IBM

How SSL-Encrypted Web Connections are Intercepted
sponsored by TechTarget Security
EGUIDE: In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012

TechTarget Security

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Dual Stack Network
sponsored by Cisco Systems, Inc.
DATA SHEET: In order to ensure business continuity and future growth, all organizations need to carefully plan for coexistence between IPv4 and IPv6. A combination of both native IPv4 and IPv6, better known as dual stack, is the recommended coexistence strategy for enterprise networks. Continue reading to learn more.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Cisco Systems, Inc.