ComputerWeekly.com Research Library

Powered by Bitpipe.com

Serial Line IP Research

  • Proving ownership of IPv6 addresses

    Sponsored by: TechTarget ComputerWeekly.com

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

  • SIP contact centers: Key benefits and potential challenges

    Sponsored by: TechTarget Security

    Learn how Session Initiation Protocol (SIP), unified communications (UC) and contact centers fit hand in hand in this e-guide from SearchUnifiedCommunications.com.

  • Prepare Your Network for the Future: Embrace IPv6

    Sponsored by: Hewlett Packard Enterprise

    This E-Guide from SearchEnterpriseWAN.com explores the importance of IPv6 and why it should be on every enterprise's short-term to-do list. View now to uncover how this influential protocol will shape your enterprise now and in the future.

  • Presentation Transcript: Cisco Active Network Abstraction and Production

    Sponsored by: Cisco Systems, Inc.

    Access this presentation transcript, which introduces the Cisco Active Network Abstraction system and summarizes the network scope and the general problems faced by ANA.

  • Presentation Transcript: iSCSI Over 10 GB Ethernet: Benefits Beyond Performance

    Sponsored by: DellEMC and Intel®

    The combination of iSCSI and 10 Gigabit Ethernet is uniquely attractive - find out how by checking out this presentation transcript. Also learn how 10 GbE can simplify connectivity for physical, blade, virtual servers and network storage.

  • Report – Benchmarks for UC TCO

    Sponsored by: ShoreTel - OLD

    Total cost of ownership is a key metric for assessing costs, benefits and risks of a UC solution – enabling organizations to properly evaluate competing solutions. It aligns their final decision with business needs, while understanding the effects of future requirements and functionalities.

  • Revolutionizing Patient Care Through Communications

    Sponsored by: Avaya

    Learn how you can improve the efficiency and productivity of nurses providing patient care, as well as how they work with each other, physicians and other staff. This allows professionals to spend more time providing “hands-on” care to patients, and less time on coordination of that care.

  • Ringing Endorsement: Which IP Phone Fits Your Needs?

    Sponsored by: TechTarget Networking

    Despite the rise of smartphones and tablets, many organizations still depend on the IP telephone, because of its reliability and functionality.But with hundreds of models on the market and a plethora of available features, how do you choose the right one for your business? This issue of Network Evolution dials in on that question and more.

  • Router Essentials

    Sponsored by: Global Knowledge

    Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.

  • Seven Steps to Achieving Better Requirements Engineering in Your Organization

    Sponsored by: IBM

    Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.

  • ShoreTel Unified Communications Platform: Easy to Deploy, Use, and Manage

    Sponsored by: ScanSource & ShoreTel

    Learn about a purpose-built for IP platform that can help you fully integrate rich communications capabilities across your organization to increase connectivity and boost productivity.

  • SIP trunking services close cost gaps around mobility

    Sponsored by: Cox Communications, Inc.

    Most often those evaluating SIP trunking are looking to reduce PSTN access costs. This expert e-guide discusses how and what SIP trunking pros are doing with their network to reduce costs and run an efficient network.

  • SOA Best Practices: The BPEL Cookbook

    Sponsored by: Oracle Corporation

    The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.

  • SOA Platforms - Evolving to Meet Stringent Market Realities

    Sponsored by: Fiorano Software, Inc.

    This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.

  • Solving the Scalability Problem with Big Data

    Sponsored by: WANdisco

    A centralized computing strategy can keep your organization from realizing the value of big data. In this expert e-guide, learn how embracing a more distributed architecture can solve traditional scalability problems and lead to big data success. Also inside, discover the value of NoSQL options.

  • Taking Control of IP Network Infrastructures

    Sponsored by: Brocade

    Organizations are looking to optimize their network infrastructures in order to provide the performance, reliability, and scalability required for next-generation IP-based networks.

  • Taking Control of IP Network Infrastructures

    Sponsored by: Brocade

    This white paper describes the requirements of next-generation IP networks, the performance, availability, and scalability issues affecting existing networks and the benefits of Brocade IP Network Infrastructure Services.

  • TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox

    Sponsored by: Global Knowledge

    Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.

  • Telstra Reaps Transformation Rewards

    Sponsored by: Alcatel-Lucent

    The business benefits of the IP transformation are numerous. First of all, as you reduce the number of actual networks, you save on software licensing costs, air conditioning and power. Less people are also required because rather than operating many silo networks in standalone mode you now have a common network.

  • The Diverse and Exploding Digital Universe

    Sponsored by: EMC Corporation

    This white paper, sponsored by EMC, is an update of IDC's inaugural forecast of the digital universe published in March 2007. In this year's update we discuss the implications for business, government, and society.

  • The Four Elements of IS-IS

    Sponsored by: Global Knowledge

    This informative guide discusses 4 key elements for the implementation of Intermediate System - Intermediate System (IS-IS).

  • The OSI Model: Understanding the Seven Layers of Computer Networks

    Sponsored by: Global Knowledge

    This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.

  • The Path to Private Cloud: 6 Things You Need to Know

    Sponsored by: BlueCat

    Access this resource for 6 valuable lessons on virtualization and the cloud. Explore a more scalable IP address management (IPAM) solution that bridges the gap between your data center and private cloud by offering increased agility to meet current and future demands.

  • The Swiss Army Knife for the Network Analyst

    Sponsored by: Riverbed Technology, Inc.

    This exclusive case study covers a tool that helped one company with their network and protocol analysis.

  • The Trouble Heading for Your Business 2013

    Sponsored by: Trend Micro

    This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.