IT Management  >   Systems Operations  >   Networking  >   Fiber Optic Networking  >  

Coarse Wave Division Multiplexing

RSS Feed    Add to Google    Add to My Yahoo!
Coarse Wave Division MultiplexingWhite Papers (View All Report Types)
 
Red Hat Accelerated Mentoring: Openstack Architecture
sponsored by Red Hat
WHITE PAPER: This exclusive whitepaper details a mentoring-based delivery model for closing the operational gap when implementing new technology into your data center.
Posted: 07 Oct 2014 | Published: 06 Aug 2014

Red Hat

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM

Eliminating the Challenge of Branch Office Recovery
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Branch converged infrastructure delivers local performance, stores data safely in the datacenter, and enables instant recovery. Learn how to recover faster, reduce risk, and save money.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Riverbed Technology, Inc.

Five Secrets of Highly Effective Data Centers
sponsored by CISCO & INTEL®
WHITE PAPER: This white paper examines 5 important strategies that organizations have adopted to overcome the limits of traditional IT infrastructure and transform their data centers to support innovation and growth.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CISCO & INTEL®

Next-Generation Cost Transparency
sponsored by VMware
WHITE PAPER: This exclusive whitepaper explores how choosing the right technology and enabling complete cost transparency can turn IT into a trusted advisor and strategic partner, allowing them to focus spending on those applications and services with high business value.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

VMware

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

SaaS Takes Center Stage in 2014
sponsored by IBM
WHITE PAPER: Learn how subscription-based business applications are expected to make an even bigger impact in 2014 and beyond in this informative infographic.
Posted: 02 Oct 2014 | Published: 29 Jul 2013

IBM

Why SSL Certificate Management Is Critical to Today’s Enterprise
sponsored by Symantec Corporation
WHITE PAPER: The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust?
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Symantec Corporation

VMware vCloud Automation Center 6.0
sponsored by VMware, Inc.
WHITE PAPER: This in-depth resource provides recommendations about deployment topology, hardware specifications, interoperability, and scalability for a suite of VMware solutions that are designed to drive business agility, let you build deployment blueprints with a drag-and-drop interface, control the costs and quality of IT services, and more.
Posted: 08 Oct 2014 | Published: 20 Mar 2014

VMware, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement