Standards  >   Network Protocols  >   OSI Protocols  >  

Common Management Information Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Common Management Information ProtocolReports
 
Carrier Ethernet: Transforming Business Telecommunications
sponsored by Cox Communications, Inc.
WHITE PAPER: This white paper elucidates the process of selecting the best services for your organization's WAN needs, including Private Line, Layer 2 VPNs, and Layer 3 VPNs.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Cox Communications, Inc.

The Open Group - Cloud Computing guide to interoperability and portability
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from the Open Group offers advice to businesses on how to avoid supplier "lock-in" when you move data into the cloud.
Posted: 05 Jul 2013 | Published: 05 Jul 2013

ComputerWeekly.com

Cisco Service Provider Next Generation Networks
sponsored by Global Knowledge
WHITE PAPER: In this white paper discover how the Cisco Service Provider Next Generation Networks (IP NGN) works and how service providers are benefiting from this technology. Explore examples of configurations for different platforms and contrast the differences in the types of operating systems.
Posted: 22 Feb 2012 | Published: 22 Aug 2012

Global Knowledge

IPv6: The Next IP Standard
sponsored by AT&T Corp
PODCAST: With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.
Posted: 13 Oct 2010 | Premiered: Oct 13, 2010

AT&T Corp

Computer Weekly – 19 March 2013: Delivering software development success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
Posted: 18 Mar 2013 | Published: 19 Mar 2013

ComputerWeekly.com

IT Decision Checklist: Antimalware
sponsored by ESET
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
Posted: 14 Jun 2010 | Published: 14 Jun 2010

ESET

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

The Network Evolution University: Next Generation Networks
sponsored by SearchNetworking.com
VIRTUAL SEMINAR: In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present.
Posted: 29 Sep 2011 | Premiered: 09 Nov 2011

SearchNetworking.com

E-Guide: Prioritizing Application Security Concerns
sponsored by Coverity
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

Coverity
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement