ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:AT&T Corp

  • Keep Your Enemies Closer - Get Proactive about Security

    Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.

  • Choosing the Right Metropolitan Ring for Your Business

    Businesses are evolving and looking for more effective and efficient methods of handling bandwidth, performance and end-point needs. In addition, they are trying to anticipate future needs to help make good networking decisions.

  • IPv6: The Next IP Standard

    With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.

  • Mobilizing Enterprise Applications (MEAP)

    Developers are spending too much time adapting mobile applications for specific devices, and not enough time developing apps that could deliver more business value. This paper explains how a Mobile Enterprise Application Platform (MEAP) can provide a sound, sustainable strategy for mobilizing enterprise applications.

  • Why Virtualize?

    This paper explains the potential benefits and key decisions associated with virtualization projects and how to get started.

  • Cloud Computing: How it Benefits Your Business

    Cloud services can support businesses in various ways, from managed hosting and server virtualization to on-demand storage and computing capabilities.  Check out this podcast to learn how AT&T's cloud services can help support your business today.

  • AT&T MPLS: The Platform for your Apps

    Watch this video to learn how to maximize the capabilities of your MPLS Network. This is the first in a series of videos that will help you understand how to make your VPN more efficient.

  • All Qualified Security Assessors Are Not Created Equal

    The Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and service providers to undergo an onsite assessment of their security systems and procedures annually. This assessment is typically performed by a Qualified Security Assessor (QSA). This paper provides criteria to consider in choosing a QSA for your assessment

  • Successfully Mitigating Corporate Risk

    This paper discusses how to help reduce risk and successfully manage your security infrastructure through conducting vulnerability assessments, using discovery tools, adopting centralized policy setting and event correlation, and taking a cohesive approach to updating network equipment.

  • The Mobile Enterprise: Moving to the Next Generation

    Mobile technology will affect workers, customers and processes, as well as business operations, computer applications and technical infrastructure. For maximum impact, mobility must be woven into the fabric of the enterprise. Collaboration tools need to break out of functional silos, decision-making should move away from traditional top-down models

  • Networking for Sustainability: The Network Offset Effect

    Building on recommendations in the Global e-Sustainability Initiative (GeSI) SMART 2020 report, this paper explains how companies can replace high environmental impact activities with low carbon alternatives through the network. The result? Efficiencies in workplaces, data centers, transportation and logistics, power grids and buildings.

  • VPLS: The Switched Ethernet

    Virtual Private LAN Service is evolving into the next "in" technology. AT&T defines it as any-to-any Ethernet that can be either metro or long haul. VPLS allows enterprises to scale bandwidth and is a good fit for customers who require meshed connectivity and want to control and manage routing.

  • Presentation Transcript: Inside The Cloud, Key Security Factors When Considering Managed Services

    This Presentation Transcript offers an overview of the cloud computing landscape as it relates to information security. Few organizations realize the vast and inherent risks that cloud computing presents, including data exposure, data loss, and a compromised infrastructure.

  • Five Best Practices for Unified Communications

    Enterprises can realize value from their UC programs by following some basic practices, such as allowing for sufficient up-front planning, finding the right champion, and establishing cross-functional teams to manage program implementation. This article provides basic guidelines for implementing a successful UC program. Read on to learn more.

  • AT&T Business Continuity Survey: 2008

    The goal of this business continuity survey was to learn what these executives were doing about business continuity, and how it figured in their overall IT strategy.

  • Optical Networks: Closing the Gap Between Patient and Caregiver

    In order to keep health care providers connected to their patients it's imperative to provide scalable, secure bandwidth. This white paper details optical network solutions that can do just that.

  • Tuning Applications for IP

    A move to IP delivers the most value when a majority of applications and facilities are migrated to the converged network.

  • Implementing a Wireless LAN

    This paper outlines the networking requirements and considerations for a successful WLAN implementation.

  • Linking the Global Supply Chain

    IP networks and applications help with all-around responsiveness and removing uncertainty from the supply chain. Read this white paper to find out how your organization can benefit from this type of technology

  • Integrating Mobile Access into Your VPN Environment

    Enterprises are increasingly facing the task of integrating a variety of access services and devices onto their Virtual Private Networks (VPN). This white paper takes a closer look at some key issues that arise when bringing access methods into your VPN.

  • AT&T Global Network Pandemic Preparedness

    Having a business continuity plan in place is crucial to surviving an unforeseen catastrophic event. This white paper details some important concerns and suggestions for making sure your enterprise's critical operations can withstand a crisis.

  • Convergence Takes Hold in the Enterprise

    Many enterprises are finally realizing the business benefits to shirting to a converged infrastructure. Read this white paper for an in depth look at how executives are taking advantage of IP networks within their enterprise.

  • Choosing the Right Metropolitan Ring for Your Business

    Learn how to consolidate your network access facilities over multiple company locations and increase security with a metropolitan ring solution. Read this white paper and start reaping the benefits of this new solution today.

  • Integrating Applications in an IP Environment

    There are many application related issues to consider before running "everything over IP". Read this paper to find out what there is to think about and how to approach implementing this type of converged network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences