ComputerWeekly.com Research Library

Powered by Bitpipe.com

DECnet Research

  • Replacing FTP Scripts with Managed File Transfer

    Sponsored by: Help/Systems

    Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the lack of security these methods provide. In this webcast, Stephen Mabbut of HelpSystems discusses why using FTP is a threat to your organization’s cybersecurity.

  • SD-WAN Benchmarking Best Practices for QoS

    Sponsored by: Infovista

    Read this white paper to review key capabilities of QoS systems and find out why it's considered a critical component of smart SD-WAN. Also, learn how to properly compare different QoS products prior to implementation to help determine if they can meet your needs.

  • Secure SD-WAN Without Compromise

    Sponsored by: Silver Peak

    In this white paper, learn how Silver Peak's SD-WAN and Zscaler's Internet Access work together to deliver a secure SD-WAN that protects enterprises from threats, optimizes application performance and delivers flexible connectivity.

  • Security at the Speed of Your Network

    Sponsored by: Gigamon

    Read “Security at the Speed of Your Network” to learn how to use an architectural approach that improves security posture and reduces costs without painful compromises on performance.

  • SOA Reference Architecture

    Sponsored by: ComputerWeekly.com

    Download the Open Group Service-Oriented Architecture reference architecture.

  • The Banking Industry Architecture Network and TOGAF

    Sponsored by: ComputerWeekly.com

    This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.

  • The GoAnywhere Book of Secure File Transfer Project Examples

    Sponsored by: Help/Systems

    Managed file transfer (MFT) software is primarily used to automate and encrypt the data exchanged between an organization and its trading partners, users, and employees. A robust MFT solution can also solve problems that fall outside your basic file transfer needs. In this white paper, learn how your peers use managed file transfer.

  • The Open Group - Cloud Computing guide to interoperability and portability

    Sponsored by: ComputerWeekly.com

    This guide from the Open Group offers advice to businesses on how to avoid supplier "lock-in" when you move data into the cloud.

  • Tips for Conducting Wireless Network Monitoring

    Sponsored by: 7SIGNAL

    Wireless network monitoring (WMN) helps you answer important questions about how your network is functioning and performing. Without it, end users may experience problems before they can be addressed by IT managers. Learn about WMN and explore tips for using it in this white paper.

  • TOGAF® and SABSA® Integration

    Sponsored by: ComputerWeekly.com

    This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.

  • Versa FlexVNF: Software-Defined Wide Area Network Test Report

    Sponsored by: Versa Networks

    According to NSS Labs, 3 of the most common reasons why enterprises deploy SD-WAN are to implement technologies that promise to improve manageability, cost, performance and security. In this report, find out how Versa Networks FlexVNF performed when tested by NSS on specific use cases.

  • Video conferencing standards and interoperability considerations

    Sponsored by: SearchSecurity.com

    Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.

  • WAN Speak Musings – Volume I

    Sponsored by: ComputerWeekly.com

    Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.

  • What's the Big Deal About SD-WAN?

    Sponsored by: GTT Americas, LLC

    In this webcast, listen as Scott Ableman of GTT, Timothy Colwell of AOTMP Research and Rich Vidil of GTT discuss insights on how SD-WAN is transforming and revolutionizing enterprise networks today. Also, discover practical considerations you should take into account when implementing SD-WAN in your organization.

  • Optiview Network Analyzer -- Free Hardware Trial

    Sponsored by: Fluke Networks

    IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.

  • Router Essentials

    Sponsored by: Global Knowledge

    Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.

  • Seven Steps to Achieving Better Requirements Engineering in Your Organization

    Sponsored by: IBM

    Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.

  • SIP trunking services close cost gaps around mobility

    Sponsored by: Cox Communications, Inc.

    Most often those evaluating SIP trunking are looking to reduce PSTN access costs. This expert e-guide discusses how and what SIP trunking pros are doing with their network to reduce costs and run an efficient network.

  • SOA Best Practices: The BPEL Cookbook

    Sponsored by: Oracle Corporation

    The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.

  • SOA Platforms - Evolving to Meet Stringent Market Realities

    Sponsored by: Fiorano Software, Inc.

    This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.

  • Solving the Scalability Problem with Big Data

    Sponsored by: WANdisco

    A centralized computing strategy can keep your organization from realizing the value of big data. In this expert e-guide, learn how embracing a more distributed architecture can solve traditional scalability problems and lead to big data success. Also inside, discover the value of NoSQL options.

  • The Swiss Army Knife for the Network Analyst

    Sponsored by: Riverbed Technology, Inc.

    This exclusive case study covers a tool that helped one company with their network and protocol analysis.

  • Virtualization Roadmap: Twists, Turns, and Key Considerations

    Sponsored by: Dell, Inc. and Intel®

    This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.

  • What Enterprises Should Do About IPv6 in 2011

    Sponsored by: Cisco Systems, Inc.

    The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.

  • What to Look for in Secure Sockets Layer

    Sponsored by: SearchSecurity.com

    This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.

Browse by Report Type: DECnet White Papers | DECnet Multimedia | DECnet IT Downloads

See more topics related to: DECnet

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.