Standards  >   Network Protocols  >  

Open Systems Interconnection Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Open Systems Interconnection Protocols White Papers (View All Report Types)
 
Critical Concepts of the 200-120 CCNA Routing and Switching Exam
sponsored by Global Knowledge
WHITE PAPER: This paper reviews the major concepts covered on the Cisco Certified Network Associate Routing and Switching exam as of spring 2013.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER: Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Comparing Private Line, Frame Relay, ATM, Ethernet and IP VPNs
sponsored by AT&T Corp
WHITE PAPER: This whitepaper helps enterprises choose the appropriate WAN solution.
Posted: 01 Mar 2011 | Published: 01 Mar 2011

AT&T Corp

Managed File Transfer: The Need for a Strategic Approach
sponsored by Inovis
WHITE PAPER: This paper discusses how business environments are governed by increasingly stringent regulations and consumer demands for privacy. Learn how Managed File Transfer (MFT) can be your solution.
Posted: 04 Sep 2008 | Published: 04 Sep 2008

Inovis

The Seven Best Practices of Highly Effective eDiscovery Practitioners: Powerful Lessons in eDiscovery Success
sponsored by Guidance Software, Inc.
WHITE PAPER: The Seven Best Practices of Highly Effective eDiscovery Practitioners article provides legal professionals with insight on how they and other members of the eDiscovery team can achieve a repeatable, defensible in-house eDiscovery process. Read this paper to learn so much more.
Posted: 15 Apr 2010 | Published: 15 Apr 2010

Guidance Software, Inc.

Building, Installing, and Configuring a RADIUS Server
sponsored by Global Knowledge
WHITE PAPER: A RADIUS server can provide you with heightened security with user access monitoring, reporting and tracking functions, and personalized restrictions. This white paper walks you through each of the steps, settings, configurations, and the equipment needed to set up a RADIUS server.
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Global Knowledge

VOIP Infrastructure for the Evolving Enterprise: How to Control Costs, Mitigate Risk, and Ensure Service Levels in an Ever-Changing Network Environment
sponsored by NET Quintum
WHITE PAPER: There are significant differences in VoIP hardware functionality that affect the cost, risk and consumption of staff resources. This white paper outlines what to consider when selecting a VoIP gateway/switching solutio
Posted: 05 Jun 2008 | Published: 01 Mar 2008

NET Quintum

Guidelines for Specification of Data Center Power Density
sponsored by Schneider Electric
WHITE PAPER: Specifying data center density has yet to conform to an established standard within the industry. This paper describes the science and practical application of an improved method for the specification of power and cooling infrastructure for data centers.
Posted: 30 Oct 2006 | Published: 01 Jan 2005

Schneider Electric

The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

Wireless LAN ITDC - Checklist #2
sponsored by SearchSecurity.com
EGUIDE: Download this quick read to get an overview of technical requirements for wireless solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs.
Posted: 22 Oct 2012 | Published: 22 Oct 2012

SearchSecurity.com

WLAN Planning For BYOD
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchSecurity.com

Upgrading to 802.11n
sponsored by SearchSecurity.com
EGUIDE: This E-Guide identifies key questions that enterprise customers should ask prospective WLAN vendors and also provides a list of vendors that will suit the needs specific to your business.
Posted: 18 Jan 2012 | Published: 18 Jan 2012

SearchSecurity.com

Wireless LAN ITDC - Checklist #1
sponsored by SearchSecurity.com
EGUIDE: In the first of SearchNetworking.com's three-part guide on selecting wireless products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of wireless solutions.
Posted: 19 Oct 2012 | Published: 19 Oct 2012

SearchSecurity.com

Tackling Top Wireless Challenges and Debunking Common Myths: Expert Roadmap
sponsored by ADTRAN, Inc.
EGUIDE: This E-Guide from SearchNetworking.com explores the myths associated with cloud-managed WLANs and aims to help you understand what you can truly expect from these service offerings.
Posted: 17 Sep 2012 | Published: 17 Sep 2012

ADTRAN, Inc.

Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

SearchSecurity.com

E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011

SearchSecurity.com

E-Guide: Choosing enterprise wireless LAN equipment
sponsored by NETGEAR Inc.
EGUIDE: 802.11N has solidified and a new product generation has emerged, the time is right for enterprises to pursue broader WLAN deployment. Purchases should be driven by technical requirements that map business needs onto product capabilities. To help you complete that step, we have compiled a list of common enterprise WLAN requirements.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

NETGEAR Inc.

Wireless LAN ITDC - Checklist #3
sponsored by SearchSecurity.com
EGUIDE: This is the third piece in SearchNetworking.com's three-part guide on wireless products. This expert asset takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing a wireless solution.
Posted: 23 Oct 2012 | Published: 23 Oct 2012

SearchSecurity.com

Ensuring an Optimal Wi-Fi Experience: Best Practices
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchNetworking.com examines the available options and best practices to boost your wireless experience.
Posted: 15 Oct 2013 | Published: 15 Oct 2013

SearchSecurity.com

Framing Your Enterprise IoT Approach for a More Connected Future
sponsored by Xively by LogMeIn
EGUIDE: In this expert e-guide, we discuss how you can prepare for whatever comes next in IoT. You'll learn which challenges should take top priority when it comes to integrating IoT, like information architecture, Agile development, and more. Plus, you'll get advice on what to consider before and after picking an IoT platform.
Posted: 10 Aug 2016 | Published: 09 Aug 2016

Xively by LogMeIn

Java Developers: Are Microservices Right For You?
sponsored by Red Hat
EBOOK: This extensive e-book explores how Java developers and architects can assess whether or not a microservice architecture is right for their organization. Discover how to implement microservices successfully by finding out what other companies have done to make them work for their cultures, organizational structures, and market pressures.
Posted: 20 Oct 2016 | Published: 30 Jun 2016

Red Hat

Navigating your Future within an SOA information manufacturing system
sponsored by ComputerWeekly.com
BOOK: As the IT industry reaches maturity, IT departments should think of themselves not as data centres but as manufacturing centres for information. Terry Keene argues in this short e-book.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

ComputerWeekly.com

SIP contact centers: Key benefits and potential challenges
sponsored by SearchSecurity.com
EGUIDE: Learn how Session Initiation Protocol (SIP), unified communications (UC) and contact centers fit hand in hand in this e-guide from SearchUnifiedCommunications.com.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

SearchSecurity.com

CW Buyer's Guide: IPV6 Migration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.
Posted: 26 Jul 2012 | Published: 05 Feb 2012

ComputerWeekly.com

IPV6 Transition – Why the rush ?
sponsored by ComputerWeekly.com
ANALYST BRIEF: This report from Ovum warns that enterprises need to recognise that they will need to move to IPv6, even if they have IPv4 addresses available. They should treat IPv6 like any other disaster recovery plan.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

ComputerWeekly.com

Building a Strong Application Security Program
sponsored by Onapsis
EGUIDE: What are the first steps to creating a strong app security program, and how do you know you've struck the right balance between static and dynamic testing? These are the types of questions we explore in this e-guide. Find out what role education is playing in building an app security program and get advice for mitigating SAP vulnerabilities.
Posted: 12 Sep 2016 | Published: 09 Sep 2016

Onapsis

Cloud-based IT-as-a-Service: Providers, SLAs, and More
sponsored by Catchpoint Systems Inc.
WHITE PAPER: This white paper explores ITaaS providers, SLAs and more. Examine the keys to an ITaaS business, what reporting and analysis in the cloud can do to your business performance and revenue, and 5 reasons your SaaS business should monitor behind the firewall.
Posted: 08 Aug 2016 | Published: 08 Aug 2016

Catchpoint Systems Inc.

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

SDN in the Data Center: What's in Store for the Future
sponsored by SearchSecurity.com
WHITE PAPER: Virtualization of servers and workloads has improved the efficiency of data centers, but networking has lagged behind. This eGuide takes a look at software-defined networking (SDN), and how it has the potential to fully integrate the data center.
Posted: 16 Oct 2013 | Published: 15 Oct 2013

SearchSecurity.com

A Computer Weekly Buyer's Guide to Containers and Microservices
sponsored by ComputerWeekly.com
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at how the architectures are configured, the suppliers building them – and the benefits to the organisation using them.
Posted: 14 Mar 2016 | Published: 15 Mar 2016

ComputerWeekly.com

Best Practices for Microservices
sponsored by MuleSoft
WHITE PAPER: This paper explores how many organizations are laying a foundation for continuous innovation and agility by adopting microservice architectures. Discover how to build a highly productive, unified integration framework for microservices that creates a seamless app network with API-led connectivity.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

MuleSoft

Architectural Choices for the HANA-Bound SAP Customer
sponsored by IBM
WHITE PAPER: This white paper takes an in-depth look at the architectural choices available to SAP customers who have decided to move to HANA. Learn now about the evolution toward HANA, its next stage, and the advantages behind certain partnerships.
Posted: 06 Apr 2016 | Published: 28 Aug 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement