Standards  >  

Internet Application Layer Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Internet Application Layer Protocols White Papers (View All Report Types)
 
Migration to DOCSIS 3.0
sponsored by Motorola, Inc.
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola, Inc.

Unlock the value of your .NET architecture
sponsored by MuleSoft
WHITE PAPER: For businesses running on .NET architectures, the options for integration on-premise and cloud applications are limited. Instead of relying on custom integration code, you may want to consider a service-oriented architecture (SOA) -- but what should you take into consideration when evaluating SOA technology?
Posted: 22 Apr 2014 | Published: 22 Apr 2014

MuleSoft

Workday Security: An Application Perspective
sponsored by Workday
WHITE PAPER: Read this white paper to learn about the innovative security features of Workday products, which focus on user authentication, authorization, and validation.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Workday

The SIP High Availability and Reliability Paradigm
sponsored by F5 Networks
WHITE PAPER: Since its inception, Session Initiation Protocol has revolutionized the way people communicate using converged services. SIP provides the framework for delivering voice, video, data, and wireless services seamlessly.
Posted: 28 Apr 2008 | Published: 01 Aug 2007

F5 Networks

Session Initiated Protocol (SIP): A Five-Function Control Protocol
sponsored by F5 Networks
WHITE PAPER: The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications.
Posted: 28 Apr 2008 | Published: 01 Aug 2007

F5 Networks

Finding and Fixing VoIP Call Quality Issues
sponsored by WildPackets, Inc.
WHITE PAPER: This white paper examines the various factors that can lead to poor VoIP call quality and how a network administrator can use WildPackets® OmniPeek™ Enterprise to pinpoint issues and keep the VoIP network running smoothly and efficiently.
Posted: 29 Aug 2008 | Published: 29 Aug 2008

WildPackets, Inc.

Simplify Security for REST and WS* Web Services: The Gateway Approach
sponsored by Intel
WHITE PAPER: This solution brief presents how to simplify the implementation of standardized enterprise security for both REST and WS-* services, and how a Service Gateway can act as a central Policy Enforcement Point to delegate authentication/authorization and provide REST to SOAP mediations without having to write code.
Posted: 29 Mar 2011 | Published: 28 Mar 2011

Intel

How to Make Magic with VoIP: Weighing the Options
sponsored by Cisco Systems, Inc.
WHITE PAPER: VoIP with UC can transform a business across four dimensions: lower costs, higher productivity, better customer service, and higher revenues. It can make a small business appear big, and help it outperform larger competitors. There are several ways to implement VoIP. Read this paper to determine which way is best for your business.
Posted: 20 Jan 2011 | Published: 20 Jan 2011

Cisco Systems, Inc.

RTSP: One of the Foundations of Convergence
sponsored by F5 Networks
WHITE PAPER: Real-Time Streaming Protocol (RTSP) is a foundation for the current convergence of communications. When implementing RTSP, the multiple port and protocol nature of RTSP makes streaming audio/video difficult to manage. This white paper explains it.
Posted: 28 Apr 2008 | Published: 01 Sep 2007

F5 Networks

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

Polycom, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement