Internet Application Layer Protocols Reports

Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022

TechTarget ComputerWeekly.com

Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition
sponsored by Hewlett Packard Enterprise
EGUIDE: Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola Solutions

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by Thawte Inc.
EGUIDE: Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.
Posted: 04 Feb 2013 | Published: 04 Feb 2013

Thawte Inc.

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

Polycom, Inc.

6 Crucial Incident Response Policy Mistakes to Avoid
sponsored by Delta Risk
EGUIDE: Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.
Posted: 20 Sep 2016 | Published: 16 Sep 2016

Delta Risk

Tim Horton Children’s Foundation Implements ShoreTel for Reliable Unified Communications
sponsored by ScanSource & ShoreTel
CASE STUDY: Discover how one organization improved reliability, increased employee productivity, and lowered TCO by implementing a new unified communications and VoIP solution to increase communications.
Posted: 08 Aug 2012 | Published: 31 Dec 2010

ScanSource & ShoreTel

Introduction to MTOM: A Hands-on Approach
sponsored by Crosscheck Networks
WHITE PAPER: This white paper explores how to enhance the electronic transmission of critical data across an SOA using a SOAP Message Transmission Optimization Mechanism.
Posted: 03 Jan 2008 | Published: 21 Dec 2007

Crosscheck Networks

The Quest for Killer SIP Apps
sponsored by NACR
WEBCAST: Learn the benefits SIP can bring to your organization – helping you provide a heterogeneous UC environment to your users, increase enterprise mobility, ensure the delivery of communications applications, and more!
Posted: 13 Jun 2012 | Premiered: May 31, 2012

NACR

Tuning Applications for IP
sponsored by AT&T Corp
WHITE PAPER: A move to IP delivers the most value when a majority of applications and facilities are migrated to the converged network.
Posted: 30 Jan 2008 | Published: 01 Jan 2008

TOPICS:  IP | SIP | Web Services
AT&T Corp