Managed Objects Reports

A Computer Weekly buyer's guide to perimeterless network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 08 Feb 2021 | Published: 05 Feb 2019

TechTarget ComputerWeekly.com

Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software

Extreme Networks Solution with NEC
sponsored by Extreme Networks
WHITE PAPER: Explore how using a 1 GbE, 10 GbE, or 40 GbE hardware plane is critical to achieving the interoperability and multi-site capabilities needed for a successful software-defined networking (SDN) initiative.
Posted: 29 Aug 2013 | Published: 30 Apr 2013

Extreme Networks

Video conferencing standards and interoperability considerations
sponsored by TechTarget Security
EGUIDE: Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

TechTarget Security

Dual Stack Network
sponsored by Cisco Systems, Inc.
DATA SHEET: In order to ensure business continuity and future growth, all organizations need to carefully plan for coexistence between IPv4 and IPv6. A combination of both native IPv4 and IPv6, better known as dual stack, is the recommended coexistence strategy for enterprise networks. Continue reading to learn more.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Cisco Systems, Inc.

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

An Introduction to Quantum Lifecycle Management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

TechTarget ComputerWeekly.com

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

The Swiss Army Knife for the Network Analyst
sponsored by Riverbed Technology, Inc.
CASE STUDY: This exclusive case study covers a tool that helped one company with their network and protocol analysis.
Posted: 31 Jul 2014 | Published: 03 Aug 2013

Riverbed Technology, Inc.