IT Management  >   Systems Operations  >   Networking  >   Fiber Optic Networking  >  

Coarse Wavelength Division Multiplexing

RSS Feed    Add to Google    Add to My Yahoo!
Coarse Wavelength Division MultiplexingReports
 
Analytics in a Big Data World
sponsored by ComputerWeekly.com
BOOK: This extract from Bart Baesen's book gives an overview of big data and analytics, its applications, analytic models, and job profiles in analytics, and includes a discount code for Computer Weekly readers.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

Wireless Network Virtualization CRAN
sponsored by Wind River Systems, Inc.
WHITE PAPER: This white paper offers an in-depth look at new prevaling wireless strategies and the current state of wireless networking. Read on to learn more.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Wind River Systems, Inc.

Why You Should Think of the F5/ADC as a "Platform," Not a "Product"
sponsored by F5 Networks
WHITE PAPER: This white paper explains that application delivery controllers (ADCs) must be thought of as a platform, not a product, and also introduces one company's innovative application delivery platform.
Posted: 21 Oct 2014 | Published: 18 Jun 2013

F5 Networks

The Forrester Wave™: Enterprise Mobile Management
sponsored by Citrix
WHITE PAPER: This exclusive research document contains expert research from Forrester, including a look at MDM today, and ways to manage even more effectively.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Citrix

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

A closer look at ITSM and ITIL
sponsored by SearchCIO.com
EBOOK: In this expert e-guide explore the various benefits ITSM and ITIL can provide including maximizing ROI and more.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

SearchCIO.com

Secure Identity and Smart Employee ID Solutions
sponsored by HID
VIDEO: This short video introduces HID Global's innovative approach to access management, in which one single ID credential provides fast, convenient access to doors, data, and cloud applications.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

HID

Should IT Users be Treated like Patients?
sponsored by RES Software
WHITE PAPER: What would happen if IT were to learn from clinical healthcare's pursuit of "patient engagement" by creating its own "user engagement" strategies? What would the benefits of doing so be? And what would it take to make it all happen? Read the following brief to find out more.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

RES Software

The Benefits of ITSM Principles
sponsored by CDW Corporation
EGUIDE: In this expert e-guide, examine the various benefits that an ITSM (IT service management) approach can provide an organization. Additionally, learn advice on how to integrate configuration management and IT asset management to optimize benefits and improve performance.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

CDW Corporation

AVST Extending the Enterprise Richness of Lync
sponsored by AVST
WEBCAST: Confidentiality often drives the reluctance of storing voice messages in easily accessible places throughout a unified communications (UC) system.  However, this UC system solution can deliver the performance and security needed for piece of mind.
Posted: 07 Oct 2014 | Premiered: Oct 7, 2014

AVST
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement