Intermediate System to Intermediate System Protocol White Papers

(View All Report Types)
The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Router Essentials
sponsored by Global Knowledge
WHITE PAPER: Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER: Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

A network automation roadmap to reap tech's best benefits
sponsored by TechTarget Networking
EBOOK: A network automation roadmap can help guide organizations through the Wild West of modern networking in order to reap benefits that automation can bring to employees, customers and partners. Reducing labor-intensive tasks does entail changing a network engineer's work, though.
Posted: 09 Sep 2021 | Published: 06 Sep 2021

TechTarget Networking

11 top IoT online courses to boost your career
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Recent research revealed the increasing importance of IoT in industrial applications, predicting that investment in IoT will soon overtake main technologies such as cloud computing, big data analytics and next-generation security. In this infographic, we selected 11 options for learning about IoT, from introductory to advanced levels.
Posted: 28 Mar 2022 | Published: 28 Mar 2022

TechTarget ComputerWeekly.com

ML Model Outperforms Standard Methods for Detecting Heart Attacks
sponsored by XtelligentMedia Healthcare
EGUIDE: Researchers have developed a machine learning (ML) tool capable of using electrocardiogram (ECG) readings to detect and classify heart attacks more quickly and accurately than standard approaches. The model was able to accurately reclassify 1 in 3 patients with chest pain based on heart attack risk. Download the article to read more.
Posted: 19 Jul 2023 | Published: 19 Jul 2023

XtelligentMedia Healthcare

Ensure FFIEC Compliance
sponsored by Redjack
WHITE PAPER: Cybersecurity asset management addresses several key requirements found in the Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment Tool and plays a crucial role in your compliance efforts. Download this white paper to learn which aspects of FFIEC guidelines cybersecurity asset management solutions address and how.
Posted: 02 Apr 2024 | Published: 02 Apr 2024

TOPICS:  .NET
Redjack

The Splunk Guide to SIEM Replacement
sponsored by Splunk
EBOOK: Replacing a SIEM is a major decision for an organization. And now more than ever, best-in-class security operations require a modern SIEM solution that will power the SOC of the future. This e-book will help answer key questions on your SIEM replacement journey. Read on now to learn how you can get started.
Posted: 29 Oct 2024 | Published: 29 Oct 2024

Splunk

Supercharge Your Databricks Lakehouse
sponsored by Qlik
EBOOK: With real-time data ingestion and analytics-ready data delivery, you can supercharge your Databricks Lakehouse. Read this e-book now to find out how you can automate your entire data pipeline to reduce risk, boost ROI, and free your data engineers.
Posted: 30 Jul 2024 | Published: 06 Aug 2024

Qlik

CMMC 2.0 for MSPs: Everything You Need To Know
sponsored by Scalepad Software
WHITE PAPER: The Cybersecurity Maturity Model Certification (CMMC) framework is designed to support and guide MSPs working with the US Department of Defense. This white paper presents a guide to the CMMC, breaking down the essential information so that you can navigate its more complex features. Read on to learn more.
Posted: 15 Apr 2024 | Published: 16 Apr 2024

TOPICS:  .NET
Scalepad Software

Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017

TechTarget ComputerWeekly.com

Authentication After Passwords
sponsored by Okta
EBOOK: The future of authentication is loginless. Learn how passwordless and continuous authentication can enhance security, reduce friction, and build customer trust. Download the e-book to explore this transformative identity management approach.
Posted: 10 Jul 2024 | Published: 11 Jul 2024

Okta

Guide to Environmental Sustainability Metrics for Data Centers
sponsored by Schneider Electric
EBOOK: To find out how your organization can improve both the accuracy of your sustainability tracking in the data center and the utility of your ESG reports, download this essential guide to environmental sustainability metrics.
Posted: 12 Mar 2024 | Published: 12 Mar 2024

TOPICS:  .NET
Schneider Electric

Guide to Environmental Sustainability Metrics for Data Centers
sponsored by Schneider Electric
WHITE PAPER: In this deep-diving white paper — designed for companies in the data center industry or wishing to report on their data center operations — discover why there 5 often-misunderstood categories for environmental sustainability reporting metrics that need to be at the core of your sustainability strategy.
Posted: 19 Mar 2024 | Published: 19 Mar 2024

TOPICS:  .NET
Schneider Electric

The Path To Data Excellence: The Alation Data Maturity Model
sponsored by Alation
WHITE PAPER: How do “data mature” firms become that way, and how can others do the same? This white paper introduces a data maturity model to provide a common framework for benchmarking and advancing data management capabilities. Read on to learn how you can drive success on your own data maturity journey.
Posted: 13 Oct 2023 | Published: 13 Oct 2023

TOPICS:  .NET
Alation

Stand Out With A Winning IT Asset Management Strategy
sponsored by ServiceNow
EBOOK: Every year, companies waste far too much money on software, hardware, and cloud resources. In fact, 66% of organizations reported having a plethora of duplicate hardware and software. Learn what it takes to develop a winning technology asset management strategy in this ServiceNow e-book.
Posted: 08 Jul 2022 | Published: 08 Jul 2022

TOPICS:  .NET
ServiceNow

2023 Health System Sector Industry Trends
sponsored by The Advisory Board
RESEARCH CONTENT: In the wake of the worst financial year in recent memory, 2023 was a story of resilience for health systems. On top of that, the entrance of generative AI tools (some valuable, others not), along with value-based care, has encouraged caution when investing in hyped healthcare technology. Learn about these trends, and 7 others, in this report.
Posted: 10 Apr 2024 | Published: 11 Apr 2024

TOPICS:  .NET
The Advisory Board

2024 Application Security Report
sponsored by Fortinet & Microsoft
ANALYST REPORT: This research report examines the state of application security in 2024, including top concerns, attack vectors, and best practices. Findings reveal the need for robust authentication, API security, and vulnerability management. Download the full report to enhance your organization's application security posture.
Posted: 06 Sep 2024 | Published: 01 May 2024

Fortinet & Microsoft

Exploring emerging breast cancer screening technology
sponsored by XtelligentMedia Healthcare
EGUIDE: New breast cancer screening tools, ranging from 3D mammography to AI-assisted screening analysis play a critical role in the evolving breast cancer screening landscape.
Posted: 31 Oct 2024 | Published: 31 Oct 2024

XtelligentMedia Healthcare

Benefits of shifting from traditional to condition-based maintenance in electrical distribution equipment
sponsored by Schneider Electric
WHITE PAPER: Explore in this white paper the power of condition-based maintenance and how it addresses modern electrical infrastructure reliability and availability requirements.
Posted: 15 Sep 2023 | Published: 15 Sep 2023

TOPICS:  .NET
Schneider Electric

Computer Weekly – 21 August 2018: Delivering the potential of the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we hear from early adopters of internet of things technologies about how to deliver on the potential of IoT. We examine strategies for combining hyper-converged infrastructure and cloud storage to best effect. And we find out how the UK government intends to use data to improve Britain's railways. Read the issue now.
Posted: 08 Feb 2021 | Published: 17 Aug 2018

TechTarget ComputerWeekly.com

Ebook - Content Synd - Zero Trust Explained: Ultimate Guide to Zero Trust Security
sponsored by StrongDM
EBOOK: Download this ebook explore Zero Trust security, including its benefits, best practices, and common barriers to implementation. You’ll gain a deeper understanding of Zero Trust models like ZTAA and ZTNA and learn the tools and techniques you need to apply frictionless Zero Trust access control to your infrastructure.
Posted: 01 Feb 2022 | Published: 02 Feb 2022

TOPICS:  .NET
StrongDM

A Guide for Identity Governance and Administration Programs
sponsored by One Identity
WHITE PAPER: Organizations are rapidly accruing new digital identities, leading to a demand for more sophisticated identity security. This white paper presents a guide for IGA programs, showing you how to implement an IGA program from beginning to end. Download the guide now to learn more.
Posted: 01 Jun 2024 | Published: 01 Jun 2024

TOPICS:  .NET
One Identity

Computer Weekly buyer's guide to customer insight
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at how firms adapt to new behaviors, as well as utilize deep learning to gain better insights and use intelligent analytics apps to enhance interactions.
Posted: 08 Feb 2021 | Published: 20 Mar 2018

TechTarget ComputerWeekly.com

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

The Federal Data Maturity Report: Optimizing Storage, Operations, and Insights.
sponsored by Hitachi Vantara
RESEARCH CONTENT: Federal agencies are struggling to manage surging data volumes, with over half feeling their infrastructure is overwhelmed. Learn how they can upgrade storage, enhance security, and democratize data access to drive better mission outcomes. Read the full research report.
Posted: 27 Aug 2024 | Published: 27 Aug 2024

Hitachi Vantara

Security by design: How Verizon approaches 5G security.
sponsored by Verizon
WHITE PAPER: As 5G enables new capabilities, security is a key design feature. This white paper examines Verizon's approach to 5G security, including enhancements over 4G, private 5G networks, and alignment with CISA guidelines. Read the full white paper to learn how Verizon is securing 5G for public and private sector organizations.
Posted: 19 Nov 2024 | Published: 20 Nov 2024

Verizon

Data Modeling Guidebook
sponsored by HighByte
EBOOK: Digital transformation is providing an unprecedented amount of predictive insights, but making the best use of this data can be daunting. Check out HighByte’s e-book to gain a better understanding of how data modeling works, what it looks like, how it works with existing standards, and to gather tips on how to establish a data modeling strategy.
Posted: 04 Apr 2022 | Published: 04 Apr 2022

TOPICS:  .NET
HighByte