Internet Application Layer Protocols Reports

Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022

TechTarget ComputerWeekly.com

Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola Solutions

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by Thawte Inc.
EGUIDE: Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.
Posted: 04 Feb 2013 | Published: 04 Feb 2013

Thawte Inc.

Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition
sponsored by Hewlett Packard Enterprise
EGUIDE: Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

Transforming your voice, video and collaboration infrastructure: The IBM journey toward unified communications
sponsored by IBM
WHITE PAPER: Access this whitepaper to learn more about unified communications in the workplace and how your company can transform your voice, video, and collaboration infrastructure.
Posted: 08 Dec 2011 | Published: 08 Dec 2011

IBM

6 Crucial Incident Response Policy Mistakes to Avoid
sponsored by Delta Risk
EGUIDE: Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.
Posted: 20 Sep 2016 | Published: 16 Sep 2016

Delta Risk

Why SIP Trunking Over Ethernet Makes Sense
sponsored by XO Communications
WHITE PAPER: This exclusive resource discusses how SIP trunking over Ethernet can help you maximize the value of your existing UC tools, improving scalability and efficiency while reducing overall costs.
Posted: 24 Jan 2014 | Published: 24 Jan 2014

XO Communications

Oracle Improves Communications and Reduces Costs with SIP Trunking
sponsored by Oracle Corporation
WHITE PAPER: This case study showcases how, by migrating to an end-to-end IP architecture and implementing SIP trunks, Oracle has significantly consolidated and simplified its telephony infrastructure.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Oracle Corporation

Adobe ColdFusion 9
sponsored by Adobe
SOFTWARE DEMO: Adobe ColdFusion 9 software enables developers to rapidly build robust Internet applications by condensing complex business logic into fewer lines of code.
Posted: 05 Oct 2009 | Premiered: 05 Oct 2009

Adobe

Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER: With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Voltage Security, Inc.