Internet Systems Reports

Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

TechTarget ComputerWeekly.com

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Jun 2020

TechTarget ComputerWeekly.com

Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway
sponsored by Cisco Umbrella
EGUIDE: Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.
Posted: 01 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

A Practical Guide to the Internet of Things
sponsored by ServiceMax by GE Digital
EBOOK: In this expert e-book, learn how to make the most of networked devices and the Internet of Things (IoT) in the context of manufacturing. Plus, learn how to address security concerns and how different security requirements can determine the ways you engage with IoT.
Posted: 13 Mar 2015 | Published: 06 Mar 2015

ServiceMax by GE Digital

Top Five Security Issues for Small and Medium-Sized Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing ones more effectively.
Posted: 22 Feb 2008 | Published: 01 Jan 2006

Cisco Systems, Inc.

Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER: This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012

SysAid Technologies Ltd

Retail Website Performance- Consumer Reaction to a Poor Online Shopping Experience
sponsored by Akamai Technologies
WHITE PAPER: Retailers must understand that the online shopper segment is continually maturing and be mindful of how this evolution influences consumers' expectations.
Posted: 07 Mar 2008 | Published: 01 Jun 2006

Akamai Technologies

Testing Embedded Systems: Do You Have the GuTs for It?
sponsored by IBM Software Group
NEWSLETTER: This article is a general introduction to the testing of embedded systems, and will be followed over the course of the year by more articles focusing on some of the topics discussed.
Posted: 14 Mar 2008 | Published: 24 Nov 2003

IBM Software Group

Ajax at Adobe with Dreamweaver CS4, Adobe AIR and More
sponsored by Adobe
VIDEO: Hear Kevin Hoyt, platform evangelist at Adobe, discuss building Ajax apps using the latest version of Dreamweaver CS4 and extending apps outside the browswer with Adobe AIR.
Posted: 10 Feb 2009 | Premiered: 09 Feb 2009

Adobe

Presentation Transcript: WWW - World Wide Weaponization
sponsored by ESET
PRESENTATION TRANSCRIPT: The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
Posted: 10 Nov 2009 | Published: 10 Nov 2009

ESET