Standards  >  

Internet Application Layer Protocols

RSS Feed   
Internet Application Layer Protocols Reports
 
Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

DigiWorld Yearbook
sponsored by ComputerWeekly.com
RESEARCH CONTENT: IDATE's DigiWorld Yearbook provides an annual analysis of the recent developments shaping the telecoms, internet and media markets, identifying major global trends and scenarios.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

ComputerWeekly.com

CW Buyer's Guide: IPV6 Migration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.
Posted: 26 Jul 2012 | Published: 05 Feb 2012

ComputerWeekly.com

IPV6 Transition – Why the rush ?
sponsored by ComputerWeekly.com
ANALYST BRIEF: This report from Ovum warns that enterprises need to recognise that they will need to move to IPv6, even if they have IPv4 addresses available. They should treat IPv6 like any other disaster recovery plan.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

ComputerWeekly.com

Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition
sponsored by Hewlett Packard Enterprise
EGUIDE: Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by Thawte Inc.
EGUIDE: Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.
Posted: 04 Feb 2013 | Published: 04 Feb 2013

Thawte Inc.

Migration to DOCSIS 3.0
sponsored by Motorola, Inc.
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola, Inc.

Protect Your Network Before Attacks Evolve
sponsored by Claranet
WEBCAST: Your most sensitive data lives on the endpoint and in the cloud. Fast reactions prevent potential breaches and require a combination of technology and resource. Watch this webinar on endpoint detection and response (EDR) demonstrating how you can fortify the edge with real-time monitoring and detection of malicious events on endpoints.
Posted: 24 Aug 2020 | Premiered: Aug 7, 2020

Claranet

Are Software SBCs Ready for the Cloud Era?
sponsored by AudioCodes
WHITE PAPER: In the telecommunications industry, one excellent use case for cloud-based technology currently attracting a lot of interest is virtual, or software, session border controllers (SBCs). Reduced CAPEX and OPEX, longer lifecycle and quick deployment are all benefits of software SBCs. Jump into this white paper to get a closer look.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

AudioCodes

DTEX and the Insider Threat Kill Chain
sponsored by Dtex
EBOOK: With insider threats, you must ask yourself, ‘What was the user’s intent?’, ‘What it truly an insider, or were credentials compromised?’, ‘If so, how did the credential thief get into the account?’. Preventing these attacks requires visibility and intelligence. Read this e-book for 5 steps to insider attack prevention.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

Dtex
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info