Transport Protocols White Papers

(View All Report Types)
7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Using Veritas Provisioning Manager in Multiple Site Environments: Issues, Evaluation, Recommendations
sponsored by Symantec Corporation
WHITE PAPER: Server provisioning can be transformed by the Veritas Provisional Manager, but many users stumble when trying to implement the Provisional Manager across multiple sites. Learn the considerations that should be evaluated prior to implementation.
Posted: 05 Dec 2006 | Published: 01 Mar 2006

Symantec Corporation

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

CW EMEA – February 2023: Kyiv is ready for anything
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW EMEA, the CIO at Kyiv City Council explains how its IT team has kept services running for residents amid relentless bombing by Russia. We also look at the Netherlands’ plans to regulate AI to reduce bias, how highly accurate time protocols ensure fair trading, and the use of tech in agriculture in Denmark. Read the issue now.
Posted: 02 Feb 2023 | Published: 09 Feb 2023

TechTarget ComputerWeekly.com

Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017

TechTarget ComputerWeekly.com

NVMe flash storage 101
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
Posted: 08 Feb 2021 | Published: 31 Mar 2017

TechTarget ComputerWeekly.com

Jargon Buster Guide to Unified Communications
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.
Posted: 08 Feb 2021 | Published: 26 Oct 2017

TechTarget ComputerWeekly.com

Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
Posted: 08 Feb 2021 | Published: 05 Aug 2016

TechTarget ComputerWeekly.com

Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Advances in technology have led to  safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
Posted: 08 Feb 2021 | Published: 14 Jul 2020

TechTarget ComputerWeekly.com

Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018

TOPICS:  Telephones | VoIP
TechTarget ComputerWeekly.com

How DirectTrust is Improving the Usability and Interoperability of Health Data
sponsored by XtelligentMedia Healthcare
EGUIDE: DirectTrust is looking to improve the usability of the Direct standard for use cases such as closed-loop referrals and ADT notifications to drive health data interoperability.
Posted: 27 Mar 2024 | Published: 27 Mar 2024

XtelligentMedia Healthcare

How DirectTrust is Improving the Usability and Interoperability of Health Data
sponsored by XtelligentMedia Healthcare
EGUIDE: DirectTrust is looking to improve the usability of the Direct standard for use cases such as closed-loop referrals and ADT notifications to drive health data interoperability.
Posted: 03 Apr 2024 | Published: 04 Apr 2024

XtelligentMedia Healthcare

Cellular Solutions for Managing Digital Signs
sponsored by Cradlepoint
PRODUCT OVERVIEW: To broadcast their messages to wide audiences, many organizations have leveraged the power of digital signs. Unfortunately, three networking issues can hinder these endeavors. To discover them, and to learn about a way to sidestep the obstacles, browse this overview.
Posted: 12 Oct 2023 | Published: 12 Oct 2023

TOPICS:  .NET
Cradlepoint

Session Border Controllers
sponsored by Ribbon Communications
EBOOK: What are session border controllers (SBCs), and how do they function in a communications strategy? For answers, and for a deep dive on SBCs, tap into this 47-page e-book.
Posted: 31 Jan 2024 | Published: 31 Jan 2024

TOPICS:  .NET
Ribbon Communications

7 NAS encryption best practices to protect data
sponsored by TechTarget ComputerWeekly.com
EBOOK: NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

The Observability Pipeline: Should You Build Your Own Observability Pipeline?
sponsored by Cribl.io
BUYER'S GUIDE: This buyer’s guide explores alternative build strategies for implementing an observability pipeline on top of other popular open-source projects like Fluentd, Logstash, or Apache NiFi, and compares that to an out-of-the-box approach. Access the guide.
Posted: 06 Feb 2024 | Published: 07 Feb 2024

TOPICS:  .NET
Cribl.io

Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 08 Feb 2021 | Published: 02 Sep 2016

TechTarget ComputerWeekly.com

Computer Weekly – 8 August 2017: Formula 1 goes digital
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Formula 1 chief Ross Brawn is turning to digitization to enhance the fan experience of Grand Prix racing. We also learn how virtual reality is being used to deliver healthcare services. And our experts examine the ethical concerns around artificial intelligence. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Aug 2017

TechTarget ComputerWeekly.com

Big Data Revitalizes IT Operations Analytics
sponsored by Splunk
EGUIDE: IT operations analytics tools have played a significant role in the past, but with big data becoming more prominent, these tools become vital. This e-guide walks you through the recent developments and advancement of IT operations tools. and go from managing crises to simply managing.
Posted: 08 Feb 2021 | Published: 08 May 2017

Splunk

CW Nordics August 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
Posted: 08 Feb 2021 | Published: 23 Aug 2018

TechTarget ComputerWeekly.com

Contact Center Buyer’s Guide
sponsored by 8x8, Inc.
EBOOK: In the modern business world, contact centers play a critical role in the customer experience. However, outdated legacy systems can have you running into some challenges. So, how can you meet service expectations while providing a better experience for all? Access this guide to learn more.
Posted: 05 Apr 2023 | Published: 05 Apr 2023

TOPICS:  .NET
8x8, Inc.

SD-WAN: Hitting the mainstream
sponsored by TechTarget ComputerWeekly.com
EGUIDE: For the networking industry, 2018 was the year that interest in software-defined wide area network started to ramp up in earnest, as more enterprises started to assess the benefits of the technology, and more early adopters started to make concrete purchasing decisions. In this e-guide, our experts explore the state of play in the SD-WAN market.
Posted: 08 Feb 2021 | Published: 17 Dec 2018

TechTarget ComputerWeekly.com

UCaaS Buyers’ Checklist
sponsored by 8x8
PRODUCT OVERVIEW: The best unified communications as a service (UCaaS) tools offer a range of transformative capabilities, from personalized meeting rooms to built-in security and encryption. Use this checklist to benchmark the most important features against your organization’s UCaaS requirements.
Posted: 31 May 2024 | Published: 31 May 2024

TOPICS:  .NET
8x8

Unified Communications Buyers’ Guide
sponsored by 8x8
EBOOK: In this e-book, explore the key themes and concepts organizations should consider when selecting Unified Communications as a Service (UCaaS) technology.
Posted: 30 May 2024 | Published: 30 May 2024

TOPICS:  .NET
8x8

How to enhance your network for the future
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
Posted: 08 Feb 2021 | Published: 15 Aug 2016

TechTarget ComputerWeekly.com

How Passkeys Work
sponsored by Okta
WHITE PAPER: Passkeys are a new FIDO-based authentication standard that enables faster, easier, and more secure sign-up and sign-in experiences. This white paper explains how passkeys work, the technical flows involved, and implementation considerations for developers. Read the full white paper to learn more.
Posted: 10 Jul 2024 | Published: 11 Jul 2024

Okta