IT Management  >   Systems Operations  >   Networking  >   Switching  >   WAN Switching  >  

Line Switching

RSS Feed    Add to Google    Add to My Yahoo!
Line Switching White Papers (View All Report Types)
 
Virtualizing Open Text Fax Server with Real-time Fax over IP (FoIP) and Open Text Fax Gateway
sponsored by OpenText
WHITE PAPER: This paper discusses the concept and benefits of virtualization of key systems and applications. It also presents a number of scenarios to help you achieve a unified and fully supported virtual IP Fax environment centered on Open Text Fax Server, T.38 real-time Fax over IP, and an Open Text Fax Gateway.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

OpenText

Managed Broadband VPNs: Advantages for Enterprise Networking
sponsored by Virtela Communications, Inc.
WHITE PAPER: Virtela's Broadband Services deliver the same bandwidth characteristics as traditional T1/E1 or ISDN offerings at a much lower cost.
Posted: 03 Mar 2008 | Published: 01 May 2005

Virtela Communications, Inc.

Automated Provisioning & Lifecycle Control of IT Management Tools
sponsored by Intigua
WHITE PAPER: Check out this case study to learn how Fiserv meets its service levels, improves MTTR and security, and simplifies and accelerates lifecycle management of its IT tools—from deployment and registration through monitoring, migrating, reporting and upgrading—using the Intigua Unified Management Platform.
Posted: 16 Jan 2015 | Published: 15 Jan 2015

Intigua

A Prescription for Privacy
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the challenges surrounding the emerging world of EHR technology, including the requirements that govern the protection of confidential patient data online; the measures that organizations need to take right now to prepare for these upcoming changes to the healthcare industry; and more.
Posted: 14 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Rethinking IT to Drive Business Value
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey of 300 enterprise organization decision makers involved in hardware investment decisions gives insight into the challenges and opportunities that lie between the old and new styles of IT and drive innovation, transformation and improved delivery against business expectations.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Hewlett-Packard Company

Learn About Each Module of the Allgress Insight Risk Management Suite
sponsored by Allgress
WHITE PAPER: This white paper introduces a risk management suite that enables security professionals to apply business context to security and compliance management. It also empowers business stakeholders to make informed investment decisions that align with top business priorities.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Allgress

Avoiding Common Pitfalls of Evaluating and Implementing DCIM Solutions
sponsored by Schneider Electric
WHITE PAPER: This white paper describes the common pitfalls that organizations run into when evaluating and implementing DCIM solutions and provides practical guidance on how to avoid them.
Posted: 23 Dec 2014 | Published: 23 Dec 2014

Schneider Electric

5 Steps For Windows Server 2003 End of Life Success
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper today to learn the 5 steps that your organization needs to take now to ensure that your enterprise is prepared for Microsoft Windows Server 2003's end-of-life in six short months.
Posted: 14 Jan 2015 | Published: 06 Nov 2014

Bit9 + Carbon Black

Simplifying IT to Drive Better Business Outcomes and Improve ROI
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: In this analyst white paper, examine several strategies to cut IT complexity. Explore the pros and cons of virtualization, converged infrastructure, outsourcing operations, and more within. Read on now to learn which strategy is right for your organization.
Posted: 28 Jan 2015 | Published: 04 Jun 2014

Oracle Corporation UK Ltd

Six Essential Elements of Web Application Security
sponsored by Qualys
WHITE PAPER: This white paper discusses the most common classes of web application vulnerabilities, and how hackers most often take advantage of these weaknesses. Read on to learn the 6 essential elements of web application security that are the most valuable places for IT teams to invest their time and resources.
Posted: 26 Jan 2015 | Published: 31 Oct 2013

Qualys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement