Real Time Transport Protocol Reports

The Top 5 VoIP Problems and How to Solve Them
sponsored by Fluke Networks
WHITE PAPER: This paper examines each of these problems and addresses how the ClearSight Analyzer can be used to isolate the cause of the problem.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Fluke Networks

Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022

TechTarget ComputerWeekly.com

One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER: Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

LANSA

Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola Solutions

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

IT Decision Checklist: Antimalware
sponsored by ESET
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
Posted: 14 Jun 2010 | Published: 14 Jun 2010

ESET

Video conferencing standards and interoperability considerations
sponsored by TechTarget Security
EGUIDE: Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

TechTarget Security

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by Thawte Inc.
EGUIDE: Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.
Posted: 04 Feb 2013 | Published: 04 Feb 2013

Thawte Inc.

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

E-Guide: Prioritizing Application Security Concerns
sponsored by TechTarget Security
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

TechTarget Security