IT Management  >   Systems Operations  >   Network Management  >   Bandwidth Management  >  

Speech Compression

RSS Feed    Add to Google    Add to My Yahoo!
Speech CompressionReports
 
The SIP High Availability and Reliability Paradigm
sponsored by F5 Networks
WHITE PAPER: Since its inception, Session Initiation Protocol has revolutionized the way people communicate using converged services. SIP provides the framework for delivering voice, video, data, and wireless services seamlessly.
Posted: 28 Apr 2008 | Published: 01 Aug 2007

F5 Networks

Time for a New Coloracation Provider? 5 Ways to Know for Sure
sponsored by Iron Mountain
WHITE PAPER: Your data center colocation choices are of the utmost importance. The wrong choice can put you at risk of downtime, exceeding capacity, unsuccessful disaster recovery, or regulatory noncompliance. Access this resource to learn the 5 ways to know if it's time to search for a new colocation provider.
Posted: 21 Oct 2014 | Published: 20 Oct 2014

Iron Mountain

Their "Special Sauce?" Cloud Service Providers & Their Software-Defined Networks
sponsored by Brocade
WHITE PAPER: In this white paper, IDC examines how SDN and other software-based network infrastructures can provide an integral fulcrum on which CSPs can align their network infrastructure with the requirements and business objectives of their customers.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

Brocade

Secure Access to Sensitive Data on the Move
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID

Women in IT: Inspiring the next generation
sponsored by ComputerWeekly.com
BOOK: This book seeks to encourage more girls and women to consider a career in IT by showcasing the lives and careers of female IT professionals, entrepreneurs and academics.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Understanding the relationship between SDN and NFV
sponsored by Wind River Systems, Inc.
WHITE PAPER: This expert e-guide highlights the relationship between SDN and NFV and how the simplify network service provisioning.  Aditionally, learn what we need from NFV orchestration.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Wind River Systems, Inc.

Best of Wi-Fi Use Cases
sponsored by Ruckus Wireless
WEBCAST: Wi-Fi networks are a must-have in every organization today, especially if your company has guests who need to connect frequently.  Whether it be a school, hotel, or an office, the best wireless experience is a priority.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

Ruckus Wireless

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Empowering Your Mobile Workforce: Change is in Your Hands
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This white paper explains how to power up your mobile management strategy in the workplace.
Posted: 20 Oct 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

How Can You Ensure Stability and Reliability?
sponsored by Red Hat
WHITE PAPER: This whitepaper explains how Red Hat Enterprise Linux can provide the stable and proven enterprise platform you need to bring new levels of simplicity to your IT operations while ensuring your underlying infrastructure is completely secure.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement