IT Management  >   Systems Operations  >   Networking  >   Fiber Optic Networking  >  

Coarse Wave Division Multiplexing

RSS Feed    Add to Google    Add to My Yahoo!
Coarse Wave Division Multiplexing Reports
 
The Zero Trust Model Of Information Security
sponsored by Zscaler
WHITE PAPER: This white paper introduces the Zero Trust Model of information security, which eliminates the idea of trusted and untrusted networks in favor of viewing all network traffic as untrusted.
Posted: 27 Jan 2015 | Published: 22 Oct 2014

Zscaler

The Active Advantage: Why Networking Leaders Are Embracing ADC Clustering
sponsored by Citrix
WHITE PAPER: This white paper highlights a new option for ADCs, and is also the first appliance to support active-active clustering.
Posted: 31 Dec 2014 | Published: 31 Dec 2014

Citrix

Spoofing Server-Server Communication: How You Can Prevent It
sponsored by Symantec Corporation
WHITE PAPER: In this must-read white paper, you'll learn how to prevent the new SSL Strip threat that could compromise your secure applications.
Posted: 19 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Mobilizing Window Apps
sponsored by Citrix
WHITE PAPER: This white paper explores a way to deliver Windows-based applications to remote users while properly optimizing them for different types of endpoints. Find out how you can take advantage of this strategy by examining a detailed architecture.
Posted: 30 Dec 2014 | Published: 31 Jan 2014

Citrix

Nuonce Video
sponsored by Hewlett-Packard Limited
VIDEO: As businesses move forward into a new digital industrial era, the services required to send, receive, store and analyze documents need to adapt and progress. Access this video to find out how manufacturing companies can streamline crucial elements of business as the business world becomes more digitally driven.
Posted: 22 Jan 2015 | Premiered: 15 Dec 2014

Hewlett-Packard Limited

Web Application Firewall Comparative Analysis
sponsored by Citrix
WHITE PAPER: This valuable resource compares the security effectiveness and value of six web application firewalls (WAFs).
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Citrix

SSL for Apps: Best Practices for Developers
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the necessary steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

The Benefits of Flash Storage for Database Workloads
sponsored by NetApp
WHITE PAPER: Flash storage technologies can immediately address the performance and I/O latency problems encountered by many database deployments. Read this white paper to learn how NetApp flash storage solutions can be used to accelerate performance for Oracle database environments.
Posted: 15 Jan 2015 | Published: 01 Dec 2014

TOPICS:  IT Management
NetApp

Executive’s Guide to Windows Server 2003 End of Life
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper aims to help executives navigate the process of creating and implementing an End of Life plan for Windows Server 2003.
Posted: 15 Jan 2015 | Published: 07 Nov 2014

Bit9 + Carbon Black

Six Essential Elements of Web Application Security
sponsored by Qualys
WHITE PAPER: This white paper discusses the most common classes of web application vulnerabilities, and how hackers most often take advantage of these weaknesses. Read on to learn the 6 essential elements of web application security that are the most valuable places for IT teams to invest their time and resources.
Posted: 26 Jan 2015 | Published: 31 Oct 2013

Qualys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement