Standards  >   Data Link Protocols  >  

High Level Data Link Control Protocol

RSS Feed    Add to Google    Add to My Yahoo!
High Level Data Link Control Protocol White Papers (View All Report Types)
 
Defender 5: The Right Way to Prove, Identify and Establish Trust
sponsored by Dell Software
WHITE PAPER: The Quest Software technical brief -- “The Right Way to Prove Identity and Establish Trust” -- explains how to verify an employee’s identity at log in. You'll also learn how Quest Defender gives your organization more control than ever over who has access to systems, applications and data - going well beyond a simple log-in name and password.
Posted: 14 Feb 2011 | Published: 11 Feb 2011

Dell Software

8 Seconds to Capture Attention: Silverpop's Landing Page Report
sponsored by Silverpop Systems Inc. an IBM Company
WHITE PAPER: It's estimated that up to 50 percent of visitors to landing pages will bail in the first eight seconds. This evaluation explains how putting more effort on nurturing recipients once they hit those landing pages would be time and money well spent.
Posted: 08 Aug 2008 | Published: 01 Jan 2007

Silverpop Systems Inc. an IBM Company

Top 10 Measurement and Planning Mistakes and How to Avoid Them
sponsored by Information Builders
WHITE PAPER: Access this white paper to review the 10 most common planning and measurement errors that businesses commit. In addition to examining these blunders, discover real-world examples of how an enterprise can avoid or correct them. Learn strategic solutions, such as setting sensible goals.
Posted: 08 Apr 2015 | Published: 31 Dec 2014

Information Builders

Open Trusted Technology Provider Standard (O-TTPS)
sponsored by ComputerWeekly.com
WHITE PAPER: This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

ComputerWeekly.com

When Retention Schedules Shouldn't Live Up to their Name
sponsored by Iron Mountain
WHITE PAPER: This white paper will help you understand how retention schedules have unintentionally misled companies into keeping unneeded data. Learn why taking the leap to get rid of excess information is a solid way to govern it, lessen risk, and save money.
Posted: 19 Apr 2015 | Published: 20 Apr 2015

Iron Mountain

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Industry Intelligence: International Financial Reporting Standards for Hedge Funds
sponsored by Advent Software, Inc
WHITE PAPER: This paper introduces hedge funds and hedge fund service providers to IFRS.
Posted: 04 Jan 2010 | Published: 04 Jan 2010

Advent Software, Inc

RFID Basics for Retailers
sponsored by Intermec
WHITE PAPER: This white paper illuminates RFID by providing an overview of RFID technology; describing the current status of relevant RFID standards initiatives; illustrating how RFID can be integrated to enhance existing wireless LAN, bar code and mobile computing systems; and providing guidance for selecting and planning RFID pilots and implementations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement