Standards  >   Data Transmission Standards  >  

V.27 Standards

RSS Feed    Add to Google    Add to My Yahoo!
V.27 Standards Reports
 
Securing Data After a Hack
sponsored by Hewlett-Packard Limited
WEBCAST: This brief video explores how one company learned from a past security breach and now is focusing more time and money towards system security.
Posted: 13 Feb 2014 | Premiered: Oct 3, 2013

Hewlett-Packard Limited

TOGAF® and SABSA® Integration
sponsored by ComputerWeekly.com
IT BRIEFING: This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.
Posted: 05 Jan 2012 | Published: 11 Oct 2011

ComputerWeekly.com

SOA Reference Architecture
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Download the Open Group Service-Oriented Architecture reference architecture.
Posted: 17 Jan 2012 | Published: 17 Jan 2012

ComputerWeekly.com

IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010

IBM

Best Practices Guide: Cabling the Data Center
sponsored by Brocade
WHITE PAPER: This guide describes best practices for incorporating cabling in a typical data center, plus tips for selecting cabling components and information on data transmission media.
Posted: 01 Sep 2009 | Published: 01 Sep 2007

Brocade

IT Decision Checklist: Antimalware
sponsored by ESET
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
Posted: 14 Jun 2010 | Published: 14 Jun 2010

ESET

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Pocket E-Guide: Data Breach Dangers -- Learn to How to Protect Data and Lower Security Spending
sponsored by IBM
EGUIDE: Information security is important, but justifying increased security spending isn't. Even though important factors such as stock performance and customer loyalty are directly affected by security breaches. This E-Guide outlines three specific actions for your company to take in order to protect and promote brand trust by preventing data breaches.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

IBM

Cisco and Standards: Opening the Door to Borderless Networks
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper details the need for standards adoption and adherence in order to reap the rewards in the following areas: Integration and testing, deployment, operations, problem resolution, availability, security, accessibility, open systems, cost savings, and choice.
Posted: 01 Dec 2010 | Published: 30 Nov 2010

Cisco Systems, Inc.

WS_FTP Professional and WS_FTP Server with SSH
sponsored by Ipswitch WhatsUp Gold
DATA SHEET: Secure file transfer products enable businesses to manage data, control access, and securely move files between locations. This white paper highlights how going beyond the basic FTP solutions is necessary for secure and reliable file transfer.
Posted: 01 Aug 2007 | Published: 01 Jul 2007

Ipswitch WhatsUp Gold
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement