Standards  >   Network Protocols  >   OSI Protocols  >   CMIP  >  

CMOT

RSS Feed   
ALSO CALLED: Common Management Information Protocol over TCP, CMIP over TCP
DEFINITION: A (no longer used) method of using the OSI network management protocol to manage TCP/IP networks.
CMOT Reports
1 - 25 of 73 Matches Previous Page  |  Next Page
4 Dimensions of Network Monitoring
sponsored by AppNeta
RESOURCE: Your network spans multiple cloud providers, third-party services, and an always-growing web of remote locations. Does your team have the comprehensive visibility to tie it all together? Download this quick checklist to ensure that you have all the data and insights you need to manage your network effectively.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

AppNeta

A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

ComputerWeekly.com

A Guide to Navigating Your Network Performance Successfully
sponsored by AppNeta
RESOURCE: Transforming your network is a lot like going on a hike. There are a number of steps that go into planning before you can get started. In this infographic, learn how to navigate your network performance successfully by getting the lay of the land, finding the best route and getting the right gear.
Posted: 01 Nov 2019 | Published: 01 Nov 2019

AppNeta

Advancing ICS Visibility and Cybersecurity with the Nozomi Networks Solution
sponsored by Nozomi Networks
WHITE PAPER: The industrial sector is digitizing and automating processes at an increasingly rapid rate. While connected systems deliver new value and improved productivity, they also heighten cyber risk. Read this white paper to learn about Nozomi Networks security tool and how it can give you the reliability and visibility you need to keep OT networks safe.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Nozomi Networks

An Introduction to Quantum Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

ComputerWeekly.com

Are Your Communications At Risk?
sponsored by Verizon
WHITE PAPER: Unsecured mobile devices and apps that connect to your network can leave communications, passwords and other sensitive data open to theft. Find out how companies are fighting back by adopting cloud-based communications platforms with built-in end-to-end security.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Verizon

Border Gateway Protocol: The Roadmap to the Internet
sponsored by AppNeta
WHITE PAPER: Monitoring BGP data gives enterprise IT visibility into the high-level networks and Autonomous Systems that an app may traverse on its path to delivery. In this white paper, learn how AppNeta helps teams put this data to use.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

AppNeta

Business Continuity Management Systems
sponsored by ComputerWeekly.com
BOOK: Brush-up you knowledge of the practical aspects of business continuity management with this book extract.
Posted: 17 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

Case Study: Agile Development of Digital Services in the Cloud
sponsored by Riverbed
VIDEO: When Southeastern Grocers first developed their mobile app, they lacked visibility into the cloud which prevented them from properly monitoring the app. In this video, Patrick O'Leary, VP of Technical Infrastructure at Southeastern Grocers, discusses how they were able to address this problem with the help of Riverbed AppInternals and AppResponse.
Posted: 01 Nov 2019 | Premiered: 01 Nov 2019

Riverbed

CW Buyer's Guide: IPV6 Migration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.
Posted: 26 Jul 2012 | Published: 05 Feb 2012

ComputerWeekly.com

E-Guide: Prioritizing Application Security Concerns
sponsored by SearchSecurity.com
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

SearchSecurity.com

Extreme Virtual SLX Software
sponsored by Extreme Networks
WHITE PAPER: In this solution brief, learn about Extreme Networks' Virtual SLX (vSLX) that provides a virtualized instance for their switching & routing product line with support for MPLS, BGP, EVPN, and VXLAN.
Posted: 03 May 2019 | Published: 03 May 2019

Extreme Networks

Fabric Networking for Dummies
sponsored by Extreme Networks
EBOOK: Many organizations still use a legacy network infrastructure that is inadequate for today’s ever-changing business. However, fabric networking can help to address the need for a network that adapts and changes on demand. In this e-book, learn everything you need to know about fabric networking.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

Extreme Networks

Financial Services: How to Achieve the Proper Network Visibility
sponsored by Gigamon
WHITE PAPER: In this white paper, learn about the Gigamon Visibility Platform and how it enables financial services firms to build an effective network security infrastructure, maximize tool efficiency without compromising network resiliency, and ensure compliance with strict industry mandates.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

Adaptive Packet Filtering
sponsored by Gigamon
WHITE PAPER: This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Gigamon

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Cisco Intercompany Media Engine for Dummies Section 1: SIP Alone Doesn't Cut It
sponsored by Cisco Systems, Inc.
TECHNICAL ARTICLE: To help address the many questions about the Cisco Intercompany Media Engine, Wade Hamblin and Hakim Mehmood from the product team will post a "for Dummies" blog every 2 weeks to explain the basics and help you understand what it is, how it works, and why you should care.
Posted: 18 Mar 2010 | Published: 04 Dec 2009

Cisco Systems, Inc.

Computer Weekly – 19 March 2013: Delivering software development success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
Posted: 18 Mar 2013 | Published: 19 Mar 2013

ComputerWeekly.com

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

Dual Stack Network
sponsored by Cisco Systems, Inc.
DATA SHEET: In order to ensure business continuity and future growth, all organizations need to carefully plan for coexistence between IPv4 and IPv6. A combination of both native IPv4 and IPv6, better known as dual stack, is the recommended coexistence strategy for enterprise networks. Continue reading to learn more.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Cisco Systems, Inc.

E-Book: Standardizing Business Continuity
sponsored by IBM
EBOOK: Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
Posted: 15 Dec 2010 | Published: 15 Dec 2010

IBM

Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software

Extreme Networks Solution with NEC
sponsored by Extreme Networks
WHITE PAPER: Explore how using a 1 GbE, 10 GbE, or 40 GbE hardware plane is critical to achieving the interoperability and multi-site capabilities needed for a successful software-defined networking (SDN) initiative.
Posted: 29 Aug 2013 | Published: 30 Apr 2013

Extreme Networks

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM
1 - 25 of 73 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement