Internet Application Layer Protocols Reports

Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022

TechTarget ComputerWeekly.com

Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola Solutions

Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition
sponsored by Hewlett Packard Enterprise
EGUIDE: Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by Thawte Inc.
EGUIDE: Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.
Posted: 04 Feb 2013 | Published: 04 Feb 2013

Thawte Inc.

Application Integration: Infrastructure basics for real-world integrations
sponsored by IBM
EGUIDE: Read this expert e-guide to explore study results indicating how your peers are creating seamless interoperability within their extended IT environments. Also, discover recommendations from the analysts at Gartner and other leading firms regarding best practices for modern application integration.
Posted: 18 Dec 2012 | Published: 18 Dec 2012

IBM

New UC Threats Leaving Your UC Platform Vulnerable
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com explores three emerging security threats that can leave your UC platform extremely vulnerability to security issues.
Posted: 21 May 2012 | Published: 18 May 2012

TechTarget Security

Designing a Strategy for End-to-End Web Protection
sponsored by IBM
WHITE PAPER: Web applications are extremely flexible and valuable assets to any organization. But they’re also vulnerable to threats like hijacking, splitting, forging and injection. Read this white paper to find out how IBM Rational® AppScan® solutions can help your agency overcome virtual threats to achieve mission objectives.
Posted: 27 Oct 2009 | Published: 10 Jul 2009

IBM

Business telecoms head for the cloud
sponsored by Gamma
WHITE PAPER: Public and private sector organizations are turning to the cloud, not only to cut their costs but to find new flexibility and agility in the way they run their businesses.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

Gamma

Five Challenges in Private Cloud Networking
sponsored by HP & Intel®
EGUIDE: This E-Guide from SearchNetworking.com unveils the top five challenges of private cloud networking and explores the ways to best overcome them. View now to learn more about address mapping, application acceleration, load balancing, and more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

HP & Intel®

The Proven Financial Benefits of SIP Trunk Consolidation
sponsored by Siemens Enterprise Communications
WHITE PAPER: Siemens Enterprise Communications continues to lead the evolution of real-time unified communications by delivering innovative and customer-centric solutions with measurable financial benefits, and has proven both the technology and the savings for customers.
Posted: 03 Jan 2011 | Published: 03 Jan 2011

Siemens Enterprise Communications