ComputerWeekly.com Research Library

Powered by Bitpipe.com

Synchronous Digital Hierarchy Research

  • TOGAF® and SABSA® Integration

    Sponsored by: ComputerWeekly.com

    This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.

  • Tunnel-Based versus Tunnel-Free SD-WAN

    Sponsored by: 128 Technology

    SD-WAN enables the kind of connectivity needed in today’s cloud era. However, overlay-based SD-WAN comes with one big caveat: dependence on tunnels. Although these tunnels can make the creation of overlays easier, there are issues. In this research report, learn about the benefits and the option of tunnel-free SD-WAN.

  • Understanding Network TAPs

    Sponsored by: Gigamon

    Network security depends not only on common communication protocols but also on the ability to decipher what’s actually in those packets. There’s a simple solution to this that provides visibility into networked traffic: network TAPs. Read the white paper to gain a full understanding of why TAPs are the most effective way to copy network traffic.

  • Video conferencing standards and interoperability considerations

    Sponsored by: SearchSecurity.com

    Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.

  • Virtual Panel: COVID-19 & Public Transit

    Sponsored by: CradlePoint

    COVID-19 has caused mass transit ridership and fare revenues to drop by more than 90%. Public transit will hopefully become disease-free sooner rather than later, but agencies must consider the connectivity of riders and how they are accounted for. Watch this webcast for a panel discussion on the implications of COVID-19 on transit technology.

  • WAN Speak Musings – Volume I

    Sponsored by: ComputerWeekly.com

    Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.

  • Virtualization Roadmap: Twists, Turns, and Key Considerations

    Sponsored by: Dell, Inc. and Intel®

    This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.

  • What Enterprises Should Do About IPv6 in 2011

    Sponsored by: Cisco Systems, Inc.

    The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.

  • What to Look for in Secure Sockets Layer

    Sponsored by: SearchSecurity.com

    This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.