ComputerWeekly.com Research Library

Powered by Bitpipe.com

IP White Papers

  • VoIP has never lost its voice: How to get the most out of your business communications

    Sponsored by: TechTarget ComputerWeekly.com

    In today's comms world, and especially with regard to hybrid working, a communications identity has now become a unified calling and collaboration endpoint, one which is part of a suite of business services spanning voice, security and network-as-a-service solutions to power the mobile workforce.

  • Proving ownership of IPv6 addresses

    Sponsored by: TechTarget ComputerWeekly.com

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

  • UC and the Evolution of Enterprise Telephony

    Sponsored by: TechTarget Security

    This expert E-Guide will help readers understand key information about the evolution of enterprise technology, how to prepare the enterprise for mobile telephony, and the value of combing IP telephony (IPT) with unified communications (UC).

  • Ringing Endorsement: Which IP Phone Fits Your Needs?

    Sponsored by: TechTarget Networking

    Despite the rise of smartphones and tablets, many organizations still depend on the IP telephone, because of its reliability and functionality.But with hundreds of models on the market and a plethora of available features, how do you choose the right one for your business? This issue of Network Evolution dials in on that question and more.

  • Opposing Forces: The Fight for Ethernet

    Sponsored by: TechTarget Networking

    Most enterprises can't get the most out of 802.11ac Wave 2. The problem is Ethernet speeds in the access layer: 1 GbE is too slow and 10 GbE too expensive. Could 2.5 and 5 GbE could be its salvation?

  • Creating a Best-of-Breed DDI Solution in a Microsoft Environment

    Sponsored by: Infoblox

    Access this informative whitepaper and learn how you can implement effective DNS, DHCP, and IP address management (DDI).

  • The Four Elements of IS-IS

    Sponsored by: Global Knowledge

    This informative guide discusses 4 key elements for the implementation of Intermediate System - Intermediate System (IS-IS).

  • Faxing over IP Networks

    Sponsored by: Global Knowledge

    This guide explores sending faxes over an IP network and some challenges you'll need to overcome.

  • Cisco IOS Digit Manipulation

    Sponsored by: Global Knowledge

    Platform digit manipulation may be needed for many business phone calls as they traverse their gateways. his guide explores the role of digit manipulation techniques and various is ways it can benefit for your business.

  • Why Do Techies Tell Me to Ping a Website?

    Sponsored by: Global Knowledge

    This white paper explores ping commands and flags, and how those flags vary from one operating system to another. With a better understanding of ping, organizations and home users can easily troubleshoot a network.

  • The Path to Private Cloud: 6 Things You Need to Know

    Sponsored by: BlueCat

    Access this resource for 6 valuable lessons on virtualization and the cloud. Explore a more scalable IP address management (IPAM) solution that bridges the gap between your data center and private cloud by offering increased agility to meet current and future demands.

  • Designing IP Addresses for Large Networks

    Sponsored by: Global Knowledge

    Complex subnetting, VLSM, and IP address summarization can be implemented simply and efficiently with proper planning. Click through to explore why great care must be taken to complete the IP address planning process accurately to accommodate current needs and growth.

  • Converged Network, Storage and Compute Infrastructure: Are we there Yet?

    Sponsored by: TechTarget Networking

    Access this expert e-guide to learn how you can make a converged network infrastructure a reality and achieve top efficiency.

  • Disaster Preparedness for Core Network Services

    Sponsored by: Infoblox

    This white paper will take a look at how failures can unexpectedly disrupt core network services and the applications that depend on them despite employing traditional approaches to providing redundant configurations. Read this white paper to learn how to minimize the effects of failures to ensure business continuity.

  • IPv6 Addressing Plan Basics

    Sponsored by: Infoblox

    Creating an IPv6 addressing plan is one of the most important pre-adoption tasks you have. This white paper details the technical and business requirements of deploying IPv6 and also provides a sample plan. View now to learn more!

  • The Trouble Heading for Your Business 2013

    Sponsored by: Trend Micro

    This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.

  • Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition

    Sponsored by: Hewlett Packard Enterprise

    Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.

  • IPv6 Timeline: The Road to a New Protocol

    Sponsored by: Hewlett Packard Enterprise

    This IPv6 timeline lists the major milestones in the history of the protocol, describing how – and why – it became what it is today.

  • Prepare Your Network for the Future: Embrace IPv6

    Sponsored by: Hewlett Packard Enterprise

    This E-Guide from SearchEnterpriseWAN.com explores the importance of IPv6 and why it should be on every enterprise's short-term to-do list. View now to uncover how this influential protocol will shape your enterprise now and in the future.

  • EMC optimizes reliability of T-Systems IP and MPLS network infrastructure for increased availability, performance, and reliability

    Sponsored by: EMC Corporation

    Discover how one of your peers simplified the complexity and manageability of their IT environment while simultaneously optimizing network performance and availability with operations intelligence software.

  • Tim Horton Children’s Foundation Implements ShoreTel for Reliable Unified Communications

    Sponsored by: ScanSource & ShoreTel

    Discover how one organization improved reliability, increased employee productivity, and lowered TCO by implementing a new unified communications and VoIP solution to increase communications.

  • ShoreTel Unified Communications Platform: Easy to Deploy, Use, and Manage

    Sponsored by: ScanSource & ShoreTel

    Learn about a purpose-built for IP platform that can help you fully integrate rich communications capabilities across your organization to increase connectivity and boost productivity.

  • Report – Benchmarks for UC TCO

    Sponsored by: ShoreTel - OLD

    Total cost of ownership is a key metric for assessing costs, benefits and risks of a UC solution – enabling organizations to properly evaluate competing solutions. It aligns their final decision with business needs, while understanding the effects of future requirements and functionalities.

  • Unified Communications Buyer’s Guide

    Sponsored by: ShoreTel - OLD

    This Unified Communications Buyer's Guide explores how UC can benefit your organization, how to know if your company is ready for UC, questions you should ask any potential UC vendor, and much more!

  • Cisco Prime Network Registrar

    Sponsored by: Cisco Systems, Inc.

    Learn about a solution that will help you simplify the management of IP addresses and ease your transition to IPv6.

Browse by Report Type: IP White Papers | IP Multimedia | IP IT Downloads

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.