Standards  >   Network Protocols  >   LAN Protocols  >  

Resource Reservation Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Resource Reservation Protocol White Papers (View All Report Types)
 
Open Trusted Technology Provider Standard (O-TTPS)
sponsored by ComputerWeekly.com
WHITE PAPER: This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

ComputerWeekly.com

Beyond the Balance Sheet: Assessing the Impact of the New Lease Accounting Standard
sponsored by IBM
WHITE PAPER: This white paper will help CFOs deal with the 2015 FASB and IASB changes, which eliminate all operating leases from the income statement and move them onto the balance sheet as a capital expense.
Posted: 02 Nov 2012 | Published: 31 Jan 2012

IBM

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Savvy Network Architects Are Boosting Performance and Lowering the TCO of Campus LANs
sponsored by Brocade
WHITE PAPER: Campus networks are vital to many top initiatives of the modern enterprise. However, to deliver the performance requirements of a campus LAN, new, cost-effective, efficient solutions are needed. In this resource, uncover how a multivendor approach can help you increase network performance while lowering the TCO of campus LANs.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Brocade

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Going Serverless at the Branch Office: Using WAN Optimization to Solve the Server Consolidation Challenge
sponsored by Expand Networks
WHITE PAPER: The Expand Accelerator is a standards-based, tightly integrated, multi-service platform that delivers a complete application acceleration solution.
Posted: 16 Jun 2008 | Published: 01 Jun 2008

Expand Networks

What Enterprises Should Do About IPv6 in 2011
sponsored by Cisco Systems, Inc.
WHITE PAPER: The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Cisco Systems, Inc.

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement