IT Management  >   Systems Operations  >   Networking  >   Fiber Optic Networking  >  

FTTB

RSS Feed    Add to Google    Add to My Yahoo!
FTTBReports
 
Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

In a World of Cloud and Mobility, Productivity Relies on Application Performance
sponsored by F5 Networks
WHITE PAPER: This white paper examines the advances in technology that are turning application performance into a need for IT departments and how there are beneficial costs associated with better application performance. Learn about how a leading product is helping IT with application optimization.
Posted: 23 Oct 2014 | Published: 30 Sep 2014

F5 Networks

Data Loss Prevention Insights from Security Executives
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines findings from a recent study on data loss prevention programs that interviewed 130 CISOs, VPs, directors, and managers.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Symantec Corporation

The Cloud on the Networking Horizon
sponsored by SearchNetworking.com
EBOOK: This handbook on cloud networking reviews network as a service (NaaS) and hybrid cloud networking, and how SDN, network virtualization and orchestration tools are reshaping cloud's future.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

TOPICS:  Networking
SearchNetworking.com

Should IT Users be Treated like Patients?
sponsored by RES Software
WHITE PAPER: What would happen if IT were to learn from clinical healthcare's pursuit of "patient engagement" by creating its own "user engagement" strategies? What would the benefits of doing so be? And what would it take to make it all happen? Read the following brief to find out more.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

RES Software

Secure Remote Access to VPN with Mobile and Tokenless Authentication
sponsored by HID
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

HID

Stop the Finger-Pointing: Managing Tier 1 Applications with VMware vCenter™ Operations Management Suite™
sponsored by VMware, Inc.
WHITE PAPER: This exclusive whitepaper will show you how to take a new approach the operations management that will help IT identify the source of problems and end the constant finger pointing.
Posted: 10 Oct 2014 | Published: 11 Oct 2012

VMware, Inc.

Entertainment: Time Warner Cable Arena
sponsored by Ruckus Wireless
CASE STUDY: Deploying wireless broadband connectivity in a high-density venue is a very challenging undertaking - especially since we now live in a time when almost everyone is carrying a device of some sort to connect with.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Ruckus Wireless

The Definitive Guide to Managing Cloud Security
sponsored by Cisco & Fujitsu
BOOK: This helpful book serves as a clear and unbiased guide to navigating the complexities of cloud security.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Cisco & Fujitsu

The Benefits of ITSM Principles
sponsored by CDW Corporation
EGUIDE: In this expert e-guide, examine the various benefits that an ITSM (IT service management) approach can provide an organization. Additionally, learn advice on how to integrate configuration management and IT asset management to optimize benefits and improve performance.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

CDW Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement