ComputerWeekly.com Research Library

Powered by Bitpipe.com

ISDN Protocols Research

  • Improve BYOD with the Bonjour Protocol

    Sponsored by: Aerohive Networks

    This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.

  • Next Generation Network Management Techniques

    Sponsored by: TechTarget Security

    The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!

  • Video conferencing standards and interoperability considerations

    Sponsored by: TechTarget Security

    Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.

  • Industry Intelligence: International Financial Reporting Standards for Hedge Funds

    Sponsored by: Advent Software, Inc

    This paper introduces hedge funds and hedge fund service providers to IFRS.

  • IPv6 Addressing Plan Basics

    Sponsored by: Infoblox

    Creating an IPv6 addressing plan is one of the most important pre-adoption tasks you have. This white paper details the technical and business requirements of deploying IPv6 and also provides a sample plan. View now to learn more!

  • IPv6: The Next IP Standard

    Sponsored by: AT&T Corp

    With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.

  • IT Decision Checklist: Antimalware

    Sponsored by: ESET

    Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.

  • Key Considerations for MPLS IP-VPN Success

    Sponsored by: XO Communications

    Uncover the benefits of an MPLS-based private IP network and learn how it can not only help you simplify network management and reduce costs, but also prioritize application, create and improve disaster recovery, and much more!

  • One Click Away: Where Does the Data Come From?

    Sponsored by: LANSA

    Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.

  • OpenFlow and SDN: What's in Store?

    Sponsored by: Big Switch Networks

    This expert e-guide explores the top factors driving the adoption of OpenFlow and software-defined networking (SDN) technology in the campus network, as well as the benefits you can realize with this strategy – including improved security, effective BYOD management, and more.

  • Optiview Network Analyzer -- Free Hardware Trial

    Sponsored by: Fluke Networks

    IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.

  • Router Essentials

    Sponsored by: Global Knowledge

    Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.

  • Seven Steps to Achieving Better Requirements Engineering in Your Organization

    Sponsored by: IBM

    Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.

  • SIP trunking services close cost gaps around mobility

    Sponsored by: Cox Communications, Inc.

    Most often those evaluating SIP trunking are looking to reduce PSTN access costs. This expert e-guide discusses how and what SIP trunking pros are doing with their network to reduce costs and run an efficient network.

  • SOA Best Practices: The BPEL Cookbook

    Sponsored by: Oracle Corporation

    The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.

  • SOA Platforms - Evolving to Meet Stringent Market Realities

    Sponsored by: Fiorano Software, Inc.

    This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.

  • Solving the Scalability Problem with Big Data

    Sponsored by: WANdisco

    A centralized computing strategy can keep your organization from realizing the value of big data. In this expert e-guide, learn how embracing a more distributed architecture can solve traditional scalability problems and lead to big data success. Also inside, discover the value of NoSQL options.

  • The Swiss Army Knife for the Network Analyst

    Sponsored by: Riverbed Technology, Inc.

    This exclusive case study covers a tool that helped one company with their network and protocol analysis.

  • Virtualization Roadmap: Twists, Turns, and Key Considerations

    Sponsored by: Dell, Inc. and Intel®

    This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.

  • What Enterprises Should Do About IPv6 in 2011

    Sponsored by: Cisco Systems, Inc.

    The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.

  • What to Look for in Secure Sockets Layer

    Sponsored by: TechTarget Security

    This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.