ISDN Protocols White Papers
-
A Computer Weekly buyer's guide to perimeterless network security
Sponsored by: TechTarget ComputerWeekly.comPerimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
Computer Weekly – 25 April 2023: Aston Martin Formula One: Driven by data
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we speak to Aston Martin Formula One's Clare Lansley to find out how digital transformation helps the team to move further up the F1 grid. We explore how automation and AI is helping businesses tackle rising costs and also look into the maturity of Industry 4.0 initiatives. Read the issue now.
-
E-Guide: Prioritizing Application Security Concerns
Sponsored by: TechTarget SecurityApplication security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
-
Focus: Network security
Sponsored by: TechTarget ComputerWeekly.comDuring the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
-
How SSL-Encrypted Web Connections are Intercepted
Sponsored by: TechTarget SecurityIn this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
-
How to enhance your network for the future
Sponsored by: TechTarget ComputerWeekly.comThe world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
-
Improve BYOD with the Bonjour Protocol
Sponsored by: Aerohive NetworksThis E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
-
A Computer Weekly buyer’s guide to perimeterless network security
Sponsored by: TechTarget ComputerWeekly.comPerimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
Adaptive Packet Filtering
Sponsored by: GigamonThis white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.
-
An Introduction to Quantum Lifecycle Management
Sponsored by: TechTarget ComputerWeekly.comThis report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
-
Built-in Self-test (BIST) Using Boundary Scan
Sponsored by: Texas Instruments, Inc.This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
-
Business Continuity Management Systems
Sponsored by: TechTarget ComputerWeekly.comBrush-up you knowledge of the practical aspects of business continuity management with this book extract.
-
Computer Weekly – 19 March 2013: Delivering software development success
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
-
Demystifying IT Network Cabling Specifications from 5e to 7A
Sponsored by: Siemon CompanyThis paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
-
Dual Stack Network
Sponsored by: Cisco Systems, Inc.In order to ensure business continuity and future growth, all organizations need to carefully plan for coexistence between IPv4 and IPv6. A combination of both native IPv4 and IPv6, better known as dual stack, is the recommended coexistence strategy for enterprise networks. Continue reading to learn more.
-
E-Book: Standardizing Business Continuity
Sponsored by: IBMDownload this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
-
Extreme Networks Solution with NEC
Sponsored by: Extreme NetworksExplore how using a 1 GbE, 10 GbE, or 40 GbE hardware plane is critical to achieving the interoperability and multi-site capabilities needed for a successful software-defined networking (SDN) initiative.
-
Facilitating “sound practices” in risk management with IBM OpenPages ORM
Sponsored by: IBMThis white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
-
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
Sponsored by: Enterprise Management Associates (EMA)Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
-
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
Sponsored by: AccentureMaster data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
-
How to Save Time and Money Making Your Transition to IPv6
Sponsored by: Cisco Systems, Inc.This white paper discusses 9 strategies that can save your business time and money while transitioning to IPv6, by slowing the need for replacements and mitigating risks.
-
IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments
Sponsored by: Texas Instruments, Inc.This document introduces those products that include ASIC cells, standard interface ICs, a bus master IC, a controller interface board for IBM compatibles, a high-speed scan interface, and software to control the scan bus.
-
IFRS in the Life Sciences: Broad implications
Sponsored by: DeloitteThis paper provides practical industry insights on IFRS for life science executives and includes useful sections on: IFRS challenges and opportunities in life sciences; Implications of IFRS for financial reporting, tax, human resources, mergers and acquisitions, IT, and treasury and much more.
-
Industry Intelligence: International Financial Reporting Standards for Hedge Funds
Sponsored by: Advent Software, IncThis paper introduces hedge funds and hedge fund service providers to IFRS.
-
IPv6 Addressing Plan Basics
Sponsored by: InfobloxCreating an IPv6 addressing plan is one of the most important pre-adoption tasks you have. This white paper details the technical and business requirements of deploying IPv6 and also provides a sample plan. View now to learn more!