E-Guide: Prioritizing Application Security Concerns
sponsored by SearchSecurity.com
EGUIDE:
Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012
|
|
|
How to enhance your network for the future
sponsored by ComputerWeekly.com
EGUIDE:
The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
Posted: 21 Apr 2016 | Published: 15 Aug 2016
|
|
|
Gigamon Insight Solution: Detect, Investigate & Remediate Network Issues
sponsored by Gigamon
RESOURCE:
In this brief white paper, learn about Gigamon's Insight Solution and how it can provide the needed visibility to detect, investigate, and remediate network issues.
Posted: 05 Sep 2019 | Published: 05 Sep 2019
|
|
|
ONUG Midday Keynote: Automating Business Continuity
sponsored by Gluware
WEBCAST:
Terracon, a consulting engineering firm, was challenged with poor inventory management, lackluster security incident response, inconsistent configurations and more. Watch this webcast to explore Terracon’s network automation case study. See how they addressed their challenges by leveraging Gluware’s pre-packaged automation platform.
Posted: 20 Jan 2021 | Premiered: Jan 20, 2021
|
|
|
How Distributed Enterprise Networks are being Re-Architected in the Age of Cloud
sponsored by Apcela
ANALYST REPORT:
The mainstream adoption of cloud-based services has caused enterprises to reconsider how their networks are architected. Legacy designs that focused on the data center no longer reflect the distributed nature of enterprise applications and services. Read this IDC report to learn how distributed enterprise networks are being re-architected.
Posted: 23 Oct 2020 | Published: 31 Jul 2020
|
|
|
A Guide to Navigating Your Network Performance Successfully
sponsored by AppNeta
RESOURCE:
Transforming your network is a lot like going on a hike. There are a number of steps that go into planning before you can get started. In this infographic, learn how to navigate your network performance successfully by getting the lay of the land, finding the best route and getting the right gear.
Posted: 01 Nov 2019 | Published: 01 Nov 2019
|
|
|
IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments
sponsored by Texas Instruments, Inc.
WHITE PAPER:
This document introduces those products that include ASIC cells, standard interface ICs, a bus master IC, a controller interface board for IBM compatibles, a high-speed scan interface, and software to control the scan bus.
Posted: 17 Mar 2002 | Published: 05 May 2000
|
|
|
A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE:
Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SIP trunking services close cost gaps around mobility
sponsored by Cox Communications, Inc.
EGUIDE:
Most often those evaluating SIP trunking are looking to reduce PSTN access costs. This expert e-guide discusses how and what SIP trunking pros are doing with their network to reduce costs and run an efficient network.
Posted: 30 Jul 2014 | Published: 30 Jul 2014
|
|
|
|
|