Internet Group Management Protocol White Papers

(View All Report Types)
Emerging Multicast VPN Applications
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
Posted: 25 Nov 2008 | Published: 25 Nov 2008

Juniper Networks, Inc.

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Router Essentials
sponsored by Global Knowledge
WHITE PAPER: Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

TechTarget ComputerWeekly.com

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019

TechTarget ComputerWeekly.com

How Can Internet Hijacking be Prevented or Mitigated?
sponsored by Dimension Data
EGUIDE: In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.
Posted: 08 Feb 2021 | Published: 21 Sep 2016

Dimension Data

Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

TechTarget's 2023 Purchase Process Study
sponsored by TechTarget
LANDING PAGE: TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.
Posted: 29 Nov 2023 | Published: 29 Nov 2023

TechTarget

TechTarget's 2023 Purchase Process Study
sponsored by TechTarget
LANDING PAGE: TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.
Posted: 29 Nov 2023 | Published: 29 Nov 2023

TechTarget

A reference architecture for the IoE
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Analyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).
Posted: 08 Feb 2021 | Published: 03 Oct 2016

TechTarget ComputerWeekly.com

Print security: An imperative in the IoT era
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Analyst group Quocirca gives the perspective on the risks and best practices of print security.
Posted: 08 Feb 2021 | Published: 10 Jul 2017

TechTarget ComputerWeekly.com

Lumen® Internet On-Demand
sponsored by Lumen
PRODUCT OVERVIEW: Lumen Internet On-Demand enables agile networking with flexible self-service access to dedicated Internet connectivity in minutes. Gain fast, reliable access to Lumen's IP backbone to support dynamic business needs. Read the full product overview to learn how to enhance network agility and accelerate innovation.
Posted: 26 Nov 2024 | Published: 26 Nov 2024

Lumen

TechTarget's 2023 Purchase Process Study
sponsored by TechTarget
LANDING PAGE: TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.
Posted: 29 Nov 2023 | Published: 29 Nov 2023

TechTarget

TechTarget's 2023 Purchase Process Study
sponsored by TechTarget
LANDING PAGE: TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.
Posted: 29 Nov 2023 | Published: 29 Nov 2023

TechTarget

Securing the Industrial Internet of Things
sponsored by Connections
INFOGRAPHIC: Securing the Industrial Internet of Things (IIoT) is critical as cybersecurity threats rise. Understand the IIoT threat landscape and learn how to assess OT and IIoT security with a 3-step approach. Download this infographic to discover best practices for minimizing risk and maximizing the returns of IIoT.
Posted: 19 Sep 2024 | Published: 20 Sep 2024

Connections

Beginner's guide to Internet of Things
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The adoption of IoT in Asia-Pacific has accelerated over the past few years, spurred by growing digitalisation across the region and the desire to improve business processes. In this e-guide, learn more about IoT developments across the region and how to leverage the technology to drive business outcomes.
Posted: 15 Feb 2023 | Published: 16 Feb 2023

TechTarget ComputerWeekly.com

Internet Security Report Q2 2024
sponsored by WatchGuard Technologies, Inc.
ANALYST REPORT: This Internet Security Report analyzes the latest network and endpoint threats, including malware trends, attack vectors, and ransomware. Learn how to secure remote access and build user trust by downloading this e-book.
Posted: 18 Dec 2024 | Published: 11 Dec 2024

WatchGuard Technologies, Inc.

Internet Security Report Q2 2024
sponsored by WatchGuard Technologies, Inc.
ANALYST REPORT: This Internet Security Report analyzes the latest network and endpoint threats, including malware trends, attack vectors, and ransomware. Learn how to secure remote access and build user trust by downloading this e-book.
Posted: 11 Dec 2024 | Published: 11 Dec 2024

WatchGuard Technologies, Inc.

Attack Surface Management
sponsored by Palo Alto Networks
EBOOK: With more cloud environments and digital assets in play than ever before, the enterprise attack surface has become increasingly complex and difficult to manage. This Attack Surface Management (ASM) for Dummies, e-book presents a coherent overview of ASM. Download now to unlock the extensive e-book and all the insights contained within it.
Posted: 07 Apr 2023 | Published: 08 Apr 2023

TOPICS:  .NET
Palo Alto Networks

European Perceptions, Preparedness and Strategies for IoT Security
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.
Posted: 08 Feb 2021 | Published: 12 Jul 2017

TechTarget ComputerWeekly.com

4 key steps for deploying IoT successfully
sponsored by TechTarget ComputerWeekly.com
EGUIDE: People learn by examples, and starting an IoT project isn't any different. Nemertes Research Group investigated the steps that consistently lead IoT deployments to succeed. In this e-guide, you will find 4 key steps for deploying IoT successfully.
Posted: 08 Feb 2021 | Published: 31 Oct 2019

TechTarget ComputerWeekly.com

Ultimate IoT implementation guide for businesses
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT administrators and CIOs considering an internet of things (IoT) deployment must have a thorough understanding of what the IoT is, how it operates, its uses, requirements, tradeoffs and how to implement IoT devices and infrastructures. In this e-guide, learn the requirements and use best practices for a successful deployment.
Posted: 22 Jun 2022 | Published: 22 Jun 2022

TechTarget ComputerWeekly.com

Computer Weekly – 21 August 2018: Delivering the potential of the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we hear from early adopters of internet of things technologies about how to deliver on the potential of IoT. We examine strategies for combining hyper-converged infrastructure and cloud storage to best effect. And we find out how the UK government intends to use data to improve Britain's railways. Read the issue now.
Posted: 08 Feb 2021 | Published: 17 Aug 2018

TechTarget ComputerWeekly.com

Enterprise Strategy Group (ESG): API security
sponsored by Cequence
ESG THOUGHT LEADERSHIP EBOOK: As API usage grows, security must keep pace. This e-book explores the challenges of securing APIs, including common attacks and their business impacts. Discover the range of capabilities needed to protect APIs across the development lifecycle. Read the Enterprise Strategy Group (ESG) e-book to learn how to build a robust API security program.
Posted: 31 Oct 2024 | Published: 31 Oct 2024

Cequence

Computer Weekly – 4 February 2020: Ethics and the internet – how to build a web we can trust
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Feb 2020

TechTarget ComputerWeekly.com

Raspberry PI with Java: programming the internet of things
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
Posted: 08 Feb 2021 | Published: 27 Sep 2016

TechTarget ComputerWeekly.com

CW APAC: Trend Watch - Internet of Things
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how APAC firms are putting the internet of things to good use in an increasingly connected world, yet technology integration and security concerns are holding back widespread adoption.
Posted: 08 Feb 2021 | Published: 15 Aug 2019

TechTarget ComputerWeekly.com