Internet Protocols Reports

Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022

TechTarget ComputerWeekly.com

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by Thawte Inc.
EGUIDE: Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.
Posted: 04 Feb 2013 | Published: 04 Feb 2013

Thawte Inc.

Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola Solutions

Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition
sponsored by Hewlett Packard Enterprise
EGUIDE: Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

Computer Weekly – 15 November 2022: How to protect against ransomware attacks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how to prepare for and protect against ransomware, and what to do if you're hit by an attack. We gauge industry reaction to Ofcom's plan to investigate the big three cloud providers. And we find out how travel giant TUI is implementing self-service analytics. Read the issue now.
Posted: 11 Nov 2022 | Published: 15 Nov 2022

TechTarget ComputerWeekly.com

IP telephony trends: Migrating from PSTN to SIP trunking
sponsored by TechTarget Security
EGUIDE: Uncover the top five trends in enterprise IP telephony and learn the benefits and challenges of replacing PSTN with SIP-based services.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

TechTarget Security

How to Bolster Endpoint Security Protection
sponsored by Symantec
EGUIDE: This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.
Posted: 16 Aug 2017 | Published: 11 Aug 2017

Symantec

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

Polycom, Inc.

SIP contact centers: Key benefits and potential challenges
sponsored by TechTarget Security
EGUIDE: Learn how Session Initiation Protocol (SIP), unified communications (UC) and contact centers fit hand in hand in this e-guide from SearchUnifiedCommunications.com.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

TechTarget Security

Business telecoms head for the cloud
sponsored by Gamma
WHITE PAPER: Public and private sector organizations are turning to the cloud, not only to cut their costs but to find new flexibility and agility in the way they run their businesses.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

Gamma