Session Initiated Protocol White Papers

(View All Report Types)
Tuning Applications for IP
sponsored by AT&T Corp
WHITE PAPER: A move to IP delivers the most value when a majority of applications and facilities are migrated to the converged network.
Posted: 30 Jan 2008 | Published: 01 Jan 2008

TOPICS:  IP | SIP | Web Services
AT&T Corp

Robust Infrastructure for SOA: A Technical Introduction to WebSphere Application Server V6.1
sponsored by IBM Software Group
WHITE PAPER: IBM WebSphere Application Server, Version 6.1 is the foundation of the IBM WebSphere software platform and is the key building block for a Service Oriented Architecture (SOA).
Posted: 16 Nov 2006 | Published: 01 Nov 2006

IBM Software Group

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola Solutions

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017

TechTarget ComputerWeekly.com

The ultimate enterprise SIP buyer’s guide
sponsored by Sinch
WHITE PAPER: Explore the benefits of cloud-based SIP trunking for your enterprise, including cost savings, enhanced collaboration, and improved scalability. Discover if SIP trunking is the right solution for your business needs. Read the full guide to learn more.
Posted: 04 Sep 2024 | Published: 04 Sep 2024

Sinch

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Focus on cloud Initiatives with Red Hat and Microsoft
sponsored by Red Hat
PRODUCT OVERVIEW: Streamline your hybrid cloud with Red Hat Enterprise Linux on Microsoft Azure. Gain flexible consumption models, enterprise-grade support, and integrated management tools. Optimize operations, enhance security, and accelerate development. Read the product overview to learn more.
Posted: 13 Jun 2024 | Published: 13 Jun 2024

Red Hat

Focus on Cloud Initiatives With Red Hat and Microsoft
sponsored by Red Hat
EGUIDE: Streamline your hybrid cloud operations with a consistent, secure OS foundation across datacenter and cloud. Learn how Red Hat Enterprise Linux on Microsoft Azure can simplify management, improve security, and boost productivity. Read the white paper to get started.
Posted: 02 Dec 2024 | Published: 09 Sep 2024

Red Hat

Focus: Network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 08 Feb 2021 | Published: 24 Apr 2017

TechTarget ComputerWeekly.com

How to Implement an OSS Governance Program
sponsored by Anaconda
WHITE PAPER: Just like all software, open-source carries risk, and many data science teams still lack security protocols. For some, there simply aren’t security protocols or governance tools for open-source software (OSS). Read on to learn about 6 steps you can take to build an OSS governance program that works for data science and set your team up for success.
Posted: 10 Jul 2023 | Published: 11 Jul 2023

TOPICS:  .NET
Anaconda

Enhance your remote support with TeamViewer’s Cloud Session Recording
sponsored by TeamViewer
WHITE PAPER: Enhance remote support with TeamViewer's Cloud Session Recording. Capture and store entire support sessions to provide insights, create training materials, and maintain security and compliance. Read the full white paper to learn more.
Posted: 15 Oct 2024 | Published: 16 Oct 2024

TeamViewer

TeamViewer Tensor Full Auditability
sponsored by TeamViewer
WHITE PAPER: TeamViewer Tensor's auditability feature provides comprehensive reporting and audit trails, allowing IT managers to track user actions, data, sessions, and more. Learn how this solution ensures compliance with security protocols and internal requirements by reading the full white paper.
Posted: 10 Oct 2024 | Published: 10 Oct 2024

TeamViewer

Jargon Buster Guide to Unified Communications
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.
Posted: 08 Feb 2021 | Published: 26 Oct 2017

TechTarget ComputerWeekly.com

Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019

TechTarget ComputerWeekly.com

Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018

TOPICS:  Telephones | VoIP
TechTarget ComputerWeekly.com

UCaaS vs. CCaaS vs. CPaaS: What's the difference?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: It can be difficult to make sense of popular cloud communications service models. Compare UCaaS vs. CCaaS vs. CPaaS to understand their differences and how they can be used together.
Posted: 05 Nov 2023 | Published: 06 Nov 2023

TechTarget ComputerWeekly.com

Modernize your VDI with Omnissa Horizon
sponsored by Omnissa
PRODUCT OVERVIEW: Are you ready to revolutionize your virtual desktop and apps infrastructure? With Omnissa Horizon, you can streamline app management, optimize desktop provisioning, and enhance security - all from a single, easy-to-use platform. Read the full product overview now to learn how you can streamline and secure your virtualization journey.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

TOPICS:  .NET
All resources sponsored by Omnissa

6 user authentication types to secure networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

Computer Weekly – 25 April 2023: Aston Martin Formula One: Driven by data
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we speak to Aston Martin Formula One's Clare Lansley to find out how digital transformation helps the team to move further up the F1 grid. We explore how automation and AI is helping businesses tackle rising costs and also look into the maturity of Industry 4.0 initiatives. Read the issue now.
Posted: 21 Apr 2023 | Published: 25 Apr 2023

TechTarget ComputerWeekly.com

Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: Download this report and learn the risks associated with privileged access, and explains how solutions from One Identity mitigate those risks with granular access control and accountability.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  Access Control
One Identity

An OT - Cyber Physical Security Journey eBook for the US Federal Government
sponsored by Merlin International
EBOOK: Discover how to secure your federal government's OT and cyber-physical systems with a comprehensive security journey. Learn the critical steps, from asset visibility to continuous monitoring, to reduce your attack surface. Download the eBook to get started.
Posted: 18 Dec 2024 | Published: 19 Dec 2024

Merlin International

Establish cloud and on-prem privileged sessions, create tunnels, power zero-trust infrastructure access and secure remote database access without a VPN.
sponsored by Keeper Security Inc
PRODUCT OVERVIEW: Secure remote access is critical for organizations today. Keeper Connection Manager provides an agentless, zero-trust solution with features like privileged access management, remote browser isolation, and secure database access. Learn more in the Product Overview.
Posted: 06 Sep 2024 | Published: 06 Sep 2024

Keeper Security Inc

Calculating the ROI for Process Automation
sponsored by PagerDuty
EGUIDE: To justify starting or expanding a project in today's economy, you must demonstrate both current and future value, and how the project will support key business initiatives in service of your company's goals. This e-book provides expert tips and ideas for showcasing the business value of PagerDuty Process Automation projects
Posted: 10 Dec 2024 | Published: 10 Dec 2024

TOPICS:  .NET
PagerDuty

Going big: why companies need to focus on operational analytics
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from Capgemini Consulting shows how the search for competitive advantage has driven organisations to shift the focus of their analytical efforts to back office operations
Posted: 08 Feb 2021 | Published: 27 Sep 2016

TechTarget ComputerWeekly.com

Calculating the ROI for PagerDuty Automation
sponsored by PaperDuty Inc.
EBOOK: To justify starting or expanding a project in today’s economy, you must demonstrate both current and future value, and how the project will support key business initiatives in service of your company’s goals. Fortunately, automation projects with PagerDuty Process Automation can deliver a significant ROI. Find out how in this e-book.
Posted: 13 Dec 2024 | Published: 14 Dec 2024

TOPICS:  .NET
All resources sponsored by PaperDuty Inc.

Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019

TechTarget ComputerWeekly.com