Standards  >   Network Protocols  >   DSL Protocols  >  

Asymmetric Digital Subscriber Line Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Asymmetric Digital Subscriber Line ProtocolsWhite Papers (View All Report Types)
 
Foundational Focus: OSI Model - Breaking Down the 7 Layers
sponsored by Global Knowledge
WHITE PAPER: The OSI model is a conceptual tool used to discuss and describe network functions. It is a good idea to be familiar with the OSI model, the features assigned to each layer, and examples of common protocols or technologies associated with the OSI layers.
Posted: 07 May 2013 | Published: 12 Apr 2013

Global Knowledge

4 Key Components for an Enhanced Mobility Infrastructure
sponsored by Dell, Inc.
WHITE PAPER: In this white paper, discover the four components that are crucial to creating a flexible network access solution for mobile users, including flexible access management and scalable wired infrastructure.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Dell, Inc.

Prepare for change: Seven Questions that Prepare you for BYOD
sponsored by IBM
WHITE PAPER: This white paper provides seven questions you should answer as you take on new mobile capabilities.
Posted: 23 Jul 2014 | Published: 31 Dec 2011

IBM

Connectivity is the Key to Improving Patient Information Exchange
sponsored by Kodak
WHITE PAPER: Discover how direct messaging can help create a smooth patient information exchange and improve workflow efficiency.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Kodak

IFRS in the Life Sciences: Broad implications
sponsored by Deloitte
WHITE PAPER: This paper provides practical industry insights on IFRS for life science executives and includes useful sections on: IFRS challenges and opportunities in life sciences; Implications of IFRS for financial reporting, tax, human resources, mergers and acquisitions, IT, and treasury and much more.
Posted: 04 Sep 2009 | Published: 03 Sep 2009

Deloitte

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

How to Save Time and Money Making Your Transition to IPv6
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper discusses 9 strategies that can save your business time and money while transitioning to IPv6, by slowing the need for replacements and mitigating risks.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Cisco Systems, Inc.

The Essentials Series: Solving Network Problems Before They Occur - How to Use SNMP in Network Problem Resolution
sponsored by Ipswitch WhatsUp Gold
WHITE PAPER: The Simple Network Management Protocol can help you get a clear view into your network. Network visibility is one of the most important ways you can quickly find and eliminate issues and ensure that your network is doing everything it’s supposed to.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

Ipswitch WhatsUp Gold

Adaptive Packet Filtering
sponsored by Gigamon
WHITE PAPER: This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Gigamon

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement