IEC White Papers

(View All Report Types)
The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Complying With IEC62443 A Product Security Perspective
sponsored by Cybellum
WHITE PAPER: IEC 62443 is a comprehensive framework of standards for securing Industrial Automation and Control Systems, including specific sections relevant to product security professionals. Use this white paper as a reference to better understand this IEC 62443 with regards to product security and where your adherence stands.
Posted: 01 May 2024 | Published: 01 May 2024

TOPICS:  .NET
Cybellum

Israel Electric Corporation Moves Toward Smarter Maintenance
sponsored by IBM
CASE STUDY: This use case describes how Israel's largest electricity provider utilizes IBM's predictive analytics software to monitor its turbine performance in real time, enabling the company to discover and resolve anomalies before outages occur.
Posted: 25 Feb 2015 | Published: 30 Sep 2013

IBM

Guide: IAM, Third-Party IoT Risk, Cybersecurity Frameworks and CISO Best Practices
sponsored by Beta Systems
EGUIDE: Read this guide to explore trends in identity and access management (IAM) and third-party IoT risk, best practices for fitting NIST and ISO/IEC JTC 1 frameworks into your security program and the importance of cyber literacy, as well as finding the right security talent, for CISOs.
Posted: 01 Feb 2022 | Published: 01 Feb 2022

TOPICS:  .NET
Beta Systems

Industrial Cybersecurity: Monitoring & Anomaly Detection
sponsored by Cisco
RESOURCE: Industrial control systems (ICS) are all around us: in water, in gas, and electricity distribution networks, running power plants and critical infrastructure, in production lines and transportation networks, and more.
Posted: 27 Jan 2020 | Published: 27 Jan 2020

Cisco

Storage Capacity 101 to Post-Grad in a Flash
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: In this report from Quocirca, analyst Clive Longbottom explains why you don't always get what you think you're getting with flash storage.
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

Plugging Into Zero Clients Powers Investment Programme
sponsored by Dell
CASE STUDY: Discover how a VDI solution enabled improvement of a desktop environment by centralizing data to tighten security.
Posted: 14 Nov 2014 | Published: 31 Oct 2014

Dell

Cloud Security Frameworks and 10 IAM Tools for Network Security
sponsored by Nexum
EGUIDE: Cloud security and identity and access management (IAM) are two necessary tenets of a secure organization. Make sure you understand the specifics of each by reading this guide that explores these two separate but important topics in detail, covering cloud security frameworks and 10 IAM tools for network security.
Posted: 07 Dec 2021 | Published: 01 Dec 2021

TOPICS:  .NET
Nexum

Mobile NFC in Transport
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

TechTarget ComputerWeekly.com

Critical Power and IT Data continuity for Healthcare
sponsored by Schneider Electric
EBOOK: Discover in this product overview how Schneider Electric can help you navigate the power and digital solutions landscape to prepare your organization for a future of safe, efficient, and patient-centered healthcare.
Posted: 16 May 2024 | Published: 16 May 2024

TOPICS:  .NET
Schneider Electric

Building a Cybersecurity Strategy for the Digital Economy
sponsored by Schneider Electric
EBOOK: Download this e-book for help establishing a pragmatic approach for creating a multi-layered cybersecurity strategy to help you reduce your business and digital risks.
Posted: 23 May 2024 | Published: 23 May 2024

TOPICS:  .NET
Schneider Electric

Prefabricated and Micro Datacentres: The Essential Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As debate continues to rage about what role private, enterprise-owned datacentres will play in firms' IT strategies in the years to come, what is becoming clear is that they type of facilities companies rely on are sure to change in line with their evolving business needs.
Posted: 08 Feb 2021 | Published: 26 Sep 2016

TechTarget ComputerWeekly.com

Secure Power Solutions For Rail And Urban Transportation
sponsored by Schneider Electric
WHITE PAPER: Today’s rail and urban transportation systems are more high-tech than ever. Schneider Electric’s comprehensive Data Center Infrastructure Management (DCIM) solution, EcoStruxure IT, ensures business continuity by enabling secure monitoring, management, in the cloud, and at the edge. Download now to learn more.
Posted: 09 May 2024 | Published: 09 May 2024

TOPICS:  .NET
Schneider Electric

Why You Need A Next-Generation Firewall
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett Packard Enterprise

Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Enterprise

How Financial Services Leaders are Ramping Up Innovation While Staying Secure
sponsored by Slack
WHITE PAPER: See how Asia-Pacific financial services leaders are combining operational agility with AI-powered productivity while bolstering security and compliance.
Posted: 20 Dec 2023 | Published: 20 Dec 2023

TOPICS:  IT Management
Slack

How Financial Services Leaders are Ramping Up Innovation While Staying Secure
sponsored by Slack
WHITE PAPER: See how Asia-Pacific financial services leaders are combining operational agility with AI-powered productivity while bolstering security and compliance.
Posted: 20 Nov 2023 | Published: 20 Nov 2023

TOPICS:  IT Management
Slack

Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

The AI Disruption: Challenges and Guidance for Data Center Design
sponsored by Schneider Electric
WHITE PAPER: Artificial intelligence (AI) deployments are taking up an increasingly large portion of data center workloads. This paper explains relevant attributes and trends of AI workloads and describes the resulting data center challenges, including Guidance for how to address these challenges. Read on to learn more.
Posted: 25 Jan 2024 | Published: 26 Jan 2024

TOPICS:  .NET
Schneider Electric

The AI Disruption: Challenges And Guidance For Data Center Design
sponsored by Schneider Electric
EBOOK: This eBook analyzes impact of AI on data center design. Key takeaways: AI workloads driving higher rack densities; transition from air to liquid cooling needed; guidance on power, cooling, racks. Read the full eBook to learn best practices for AI-ready data centers.
Posted: 16 Mar 2024 | Published: 16 Mar 2024

TOPICS:  .NET
Schneider Electric

Step-by-step disaster recovery planning guide
sponsored by TechTarget ComputerWeekly.com
EBOOK: IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.
Posted: 29 Mar 2022 | Published: 29 Mar 2022

TechTarget ComputerWeekly.com

Semiconductor Secure Power Solutions
sponsored by Schneider Electric
WHITE PAPER: Discover in this white paper how Integrated Schneider Electric solutions can offer your organization a complete electrical system including power monitoring and a resilient architecture to improve subfunction operation, enable optimum use of energy, and save up to 30% on operating energy costs.
Posted: 23 May 2024 | Published: 23 May 2024

TOPICS:  .NET
Schneider Electric

APC Smart-UPS Modular Ultra
sponsored by Insight
PRODUCT OVERVIEW: The APC Smart-UPS Modular Ultra is a next-gen lithium-ion UPS with increased power, runtime, and redundancy. It features universal bays, EcoStruxure connectivity, and a modular and scalable design. Read the full product overview to learn more.
Posted: 01 Jun 2024 | Published: 01 Jun 2024

TOPICS:  .NET
Insight

Link Software Development to Measured Business Value Creation
sponsored by JBS Custom Software Solutions
EBOOK: PH
Posted: 04 Jun 2021 | Published: 04 Jun 2021

All resources sponsored by JBS Custom Software Solutions

Your Remote Support Security Playbook
sponsored by GoTo
WHITE PAPER: Today’s remote end-users and technicians need tools that can keep up with ever-evolving cyberthreats and an uptick in malicious actors. Are your current remote support tools up to the task? Read this white paper to access 4 critical remote support security requirements.
Posted: 23 Apr 2024 | Published: 23 Apr 2024

TOPICS:  .NET
GoTo

Virtualization Security: Protecting Virtualized Environments
sponsored by TechTarget ComputerWeekly.com
BOOK: This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

TechTarget ComputerWeekly.com