Internet Protocols Reports

Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022

TechTarget ComputerWeekly.com

Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola Solutions

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by Thawte Inc.
EGUIDE: Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.
Posted: 04 Feb 2013 | Published: 04 Feb 2013

Thawte Inc.

Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition
sponsored by Hewlett Packard Enterprise
EGUIDE: Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

API Management is the SOA Renaissance
sponsored by IBM
WHITE PAPER: Forward-thinking organizations are moving to more open ecosystems, relying on service-oriented architecture (SOA) and application programming interfaces (APIs). Access this insightful white paper to learn about combining SOA and API management to create more engaging applications through comprehensive integration.
Posted: 11 Mar 2014 | Published: 31 Dec 2013

IBM

Collaboration: RFP Technology Decisions Guide
sponsored by TechTarget Security
EGUIDE: Part two of SearchUnifiedCommunications.com's three-part guide on collaboration products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the process.
Posted: 11 May 2012 | Published: 11 May 2012

TechTarget Security

The Role of Session Manager in Applying Features to Calls via Sequenced Applications, Part 1
sponsored by Global Knowledge
WHITE PAPER: Access this exclusive paper to find out how the Communication Manager, once defined as an Entity within the Avaya Aura Session Manager, can be configured as a feature server within a sequenced application.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Global Knowledge

How SSL and TLS Secure Network Transactions
sponsored by GeoTrust, Inc.
EGUIDE: This E-Guide from SearchEnterpriseWAN.com aims to provide introductory knowledge of the ins and outs of SSL VPN and TLS and how they protect network transactions. View now to learn more!
Posted: 27 Dec 2012 | Published: 20 Dec 2012

GeoTrust, Inc.

How to Make Magic with VoIP: Weighing the Options
sponsored by Cisco Systems, Inc.
WHITE PAPER: VoIP with UC can transform a business across four dimensions: lower costs, higher productivity, better customer service, and higher revenues. It can make a small business appear big, and help it outperform larger competitors. There are several ways to implement VoIP. Read this paper to determine which way is best for your business.
Posted: 20 Jan 2011 | Published: 20 Jan 2011

Cisco Systems, Inc.

Why SIP Trunking Over Ethernet Makes Sense
sponsored by XO Communications
WHITE PAPER: This exclusive resource discusses how SIP trunking over Ethernet can help you maximize the value of your existing UC tools, improving scalability and efficiency while reducing overall costs.
Posted: 24 Jan 2014 | Published: 24 Jan 2014

XO Communications