ComputerWeekly.com Research Library

Powered by Bitpipe.com

Token Ring Protocols Research

  • 2020 Networking Trends: What Changes, and What Stays the Same?

    Sponsored by: Zones, Inc.

    2020 promises to be another year in which network development accelerates. But with so many options, routes to take, and decisions to make, how should you strategize your network development over the next year? In this e-guide, you'll find out which current trends will stick around, which new ones will emerge, and which fads promise to fade away.

  • 5G Trends for 2020

    Sponsored by: T-Mobile for Business

    Discover 5 new trends that will give your enterprise better understanding of 5G’s compelling value proposition and the drivers for 5G adoption—and innovation—in 2020.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • An Introduction to Quantum Lifecycle Management

    Sponsored by: ComputerWeekly.com

    This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.

  • Are All SD-WANs Created Equal? The Benefits of a MEF-Certified SD-WAN

    Sponsored by: Comcast Business

    There are roughly 70 available SD-WAN options on the market, and enterprises are looking for a way to determine which of them will meet their networking use case and service resiliency requirements. Fortunately, the Metro Ethernet Foundation is able to provide a global standard for SD-WAN offerings. Read this article to learn more.

  • Business Continuity Management Systems

    Sponsored by: ComputerWeekly.com

    Brush-up you knowledge of the practical aspects of business continuity management with this book extract.

  • Cloud-Managed, Distributed Enterprise Networking Is Simpler, More Efficient

    Sponsored by: Infoblox

    The adoption of SD-WAN and SaaS applications by enterprises is driving demand for simpler, more efficient connectivity between distributed locations and applications. But reliance on legacy DDI solutions limits the ability of these locations to fully leverage cloud services. In this white paper, learn how cloud-managed DDI can help.

  • CW Buyer's Guide: IPV6 Migration

    Sponsored by: ComputerWeekly.com

    This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.

  • Deep-Dive into MLPS 2.0 Compliance with Alibaba Cloud Solution

    Sponsored by: Alibaba Cloud

    As of Dec. 1, 2019, China has introduced a new version of their multi-level protection scheme law known as MLPS 2.0. As such, the Chinese government has updated its pre-existing requirement that individual 'network operators' in China must implement and maintain an MLPS with respect to their networks. Watch this webcast to get more details.

  • E-Guide: Prioritizing Application Security Concerns

    Sponsored by: SearchSecurity.com

    Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.

  • Adaptive Packet Filtering

    Sponsored by: Gigamon

    This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.

  • Built-in Self-test (BIST) Using Boundary Scan

    Sponsored by: Texas Instruments, Inc.

    This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.

  • Campus Wired LAN Technology Design Guide

    Sponsored by: Cisco Systems, Inc.

    This guide outlines strategies for designing wired network access depending on the size of an organization's environment.

  • Cisco Intercompany Media Engine for Dummies Section 1: SIP Alone Doesn't Cut It

    Sponsored by: Cisco Systems, Inc.

    To help address the many questions about the Cisco Intercompany Media Engine, Wade Hamblin and Hakim Mehmood from the product team will post a "for Dummies" blog every 2 weeks to explain the basics and help you understand what it is, how it works, and why you should care.

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • Demystifying IT Network Cabling Specifications from 5e to 7A

    Sponsored by: Siemon Company

    This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.

  • Dirk Hohndel on Intel and the Linux Foundation

    Sponsored by: Intel

    In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.

  • Dual Stack Network

    Sponsored by: Cisco Systems, Inc.

    In order to ensure business continuity and future growth, all organizations need to carefully plan for coexistence between IPv4 and IPv6. A combination of both native IPv4 and IPv6, better known as dual stack, is the recommended coexistence strategy for enterprise networks. Continue reading to learn more.

  • E-Book: Standardizing Business Continuity

    Sponsored by: IBM

    Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!

  • Emerging Multicast VPN Applications

    Sponsored by: Juniper Networks, Inc.

    This paper provides background information on MVPNs, as well as describes emerging MVPN applications.

  • Ericom Blaze — RDP Acceleration

    Sponsored by: Ericom Software

    Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.

  • EtherScope Network Assistant -- Free Hardware Trial

    Sponsored by: Fluke Networks

    First responders to network emergencies need to solve problems fast on 10, 100 and Gig copper, fiber and wireless LAN networks. This tool helps frontline network professionals quickly solve the wide range of problems they encounter.

  • Extreme Networks Solution with NEC

    Sponsored by: Extreme Networks

    Explore how using a 1 GbE, 10 GbE, or 40 GbE hardware plane is critical to achieving the interoperability and multi-site capabilities needed for a successful software-defined networking (SDN) initiative.

  • Facilitating “sound practices” in risk management with IBM OpenPages ORM

    Sponsored by: IBM

    This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.