IT Management  >   Systems Operations  >   Networking  >   Fiber Optic Networking  >  

Coarse Wavelength Division Multiplexing

RSS Feed    Add to Google    Add to My Yahoo!
Coarse Wavelength Division MultiplexingReports
 
Video Conferencing Software and Hardware: Hybrid Approach Needed
sponsored by LifeSize
EGUIDE: This expert E-Guide discusses the shift from traditional hardware based technology to software. Read on to learn more
Posted: 05 Dec 2014 | Published: 05 Dec 2014

LifeSize

Agility and Innovation in the Cloud
sponsored by Dell, Inc.
WHITE PAPER: This case study explores how Dell IT was able to leverage a flexible private cloud on which to deploy solutions quickly and cost-effectively. Read on to learn how this solution delivers the agility and scalability necessary to support incubation activities and develop new technologies for enterprise consumption.
Posted: 03 Dec 2014 | Published: 31 Mar 2013

Dell, Inc.

Simplifying cloud management and data center automation
sponsored by IBM
WHITE PAPER: This white paper explores the value of standardizing and automating cloud services with a flexible platform. Read on to learn how to orchestrate the development, deployment and management of cloud services - helping to reduce IT costs and accelerate service delivery.
Posted: 05 Dec 2014 | Published: 30 Apr 2014

IBM

The CNO Perspective
sponsored by Vocera
WHITE PAPER: This exclusive white paper takes an in-depth look at the CNO's perspective on communications. Read on to learn more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

Vocera

How Box is Securing Business Information in the Cloud
sponsored by Box
WHITE PAPER: This white paper explains why the centralization of sensitive documents in the cloud can make them easier to monitor and secure.
Posted: 02 Dec 2014 | Published: 17 Jun 2014

Box

SDN Security Strategies for Network Attack Prevention
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford discusses the rise of software-defined monitoring; using SDN for security monitoring and packet analysis; how SDN security strategies tackle network attack prevention; and more.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

A powerful defense against denial of service attacks
sponsored by Citrix
WHITE PAPER: As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.
Posted: 16 Dec 2014 | Published: 27 Dec 2013

Citrix

Vectra Networks: X-Series Product Datasheet
sponsored by Vectra Networks
DATA SHEET: This exclusive resource outlines the key benefits of a network security strategy that was able to deliver for organizations today. Read on to learn more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

Vectra Networks

Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

An IT Auditor’s Guide to Security Controls & Risk Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This resource details a simpler, more effective approach to compliance that aims to help your enterprise to meet Governance, Risk, and Compliance standards, while managing the systems, files, and user permissions that you need to meet the needs of your organization.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Bit9, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement