Standards  >   Network Protocols  >   Routing Protocols  >  

Gateway Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Gateway ProtocolsReports
 
Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

SIP trunking services close cost gaps around mobility
sponsored by Cox Communications, Inc.
EGUIDE: Most often those evaluating SIP trunking are looking to reduce PSTN access costs. This expert e-guide discusses how and what SIP trunking pros are doing with their network to reduce costs and run an efficient network.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Cox Communications, Inc.

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

Intervention areas for superfast broadband project Connecting Cumbria
sponsored by ComputerWeekly.com
DATA SHEET: UK broadband roll-out: Download this Excel spreadsheet detailing the intervention status of postcodes across Cumbria
Posted: 15 Oct 2013 | Published: 15 Oct 2013

ComputerWeekly.com

Business Continuity Management Systems
sponsored by ComputerWeekly.com
BOOK: Brush-up you knowledge of the practical aspects of business continuity management with this book extract.
Posted: 17 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Choose Your Next SOA Implementation Step Carefully
sponsored by Seros
WHITE PAPER: This white paper discusses the critical role of an ESB and an open standards-based reference architecture in a successful SOA initiative.
Posted: 25 Jun 2008 | Published: 25 Jun 2008

Seros

ITIL Version 3.0 -- What It Means to You
sponsored by Global Knowledge
WHITE PAPER: As the IT industry standardizes its operations to solve business problems in the most efficient, effective, economical, and equitable way, ITIL v3 becomes a critical tool.
Posted: 06 Jul 2006 | Published: 01 Jul 2006

Global Knowledge

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions

E-Guide: Prioritizing Application Security Concerns
sponsored by Coverity
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

Coverity
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement