Intelligent Security Proxies Reports

How to Gain Visibility and Control of Encrypted SSL Web Sessions
sponsored by BlueCoat
WHITE PAPER: Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications.
Posted: 20 Sep 2007 | Published: 01 Jan 2006

BlueCoat

A Technical Review of Caching Technologies
sponsored by BlueCoat
WHITE PAPER: The goal of this white paper is to discuss the role of caching, describe in detail how object caching and byte caching works, and show how these caching technologies work together to deliver true performance differentiation.
Posted: 29 Jun 2009 | Published: 17 Dec 2007

BlueCoat

Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.

Computer Weekly - 24 January 2023: BBC under scrutiny over its digital strategy
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the BBC faces in-depth scrutiny over its digital plans – we take a look at progress. Do you need to keep data forever? We examine the technologies behind infinite storage. And we find out about the digital transformation challenges in vehicle dealerships. Read the issue now.
Posted: 23 Jan 2023 | Published: 24 Jan 2023

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

CW APAC: Trend watch: Enterprise resource planning
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on enterprise resource planning in the Asia-Pacific region, Computer Weekly looks at what's behind this renewed priority and why firms want cheaper software maintenance and the benefits of best-of-breed cloud apps.
Posted: 18 Aug 2022 | Published: 18 Aug 2022

TechTarget ComputerWeekly.com

Computer Weekly – 18 June 2019: Applying AI to road safety
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Jun 2019

TechTarget ComputerWeekly.com

CW Buyer's Guide to Emerging technology
sponsored by TechTarget ComputerWeekly.com
EBOOK: The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
Posted: 13 Jan 2022 | Published: 13 Jan 2022

TechTarget ComputerWeekly.com

The Ultimate Guide to Enterprise Content Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Enterprise Content Management (ECM) has rapidly evolved as different forms of content have been introduced to the work environment. In this guide, find out how ECM works, why it is so important, the key components and benefits, and what to look for when choosing ECM software.
Posted: 05 Oct 2022 | Published: 05 Oct 2022

TechTarget ComputerWeekly.com

Analyst Report - Vendor Comparison for Integrated Quality Suite
sponsored by IBM
ANALYST REPORT: According to Gartner, vendors must demonstrate both "completeness of vision" and an "ability to execute" to be evaluated as a leader. Gartner's 2011 Magic Quadrant for Integrated Software Quality Suites evaluates IBM as a leader. Read the report to learn more.
Posted: 08 Feb 2021 | Published: 02 Sep 2011

IBM