Session Initiated Protocol White Papers

(View All Report Types)
Tuning Applications for IP
sponsored by AT&T Corp
WHITE PAPER: A move to IP delivers the most value when a majority of applications and facilities are migrated to the converged network.
Posted: 30 Jan 2008 | Published: 01 Jan 2008

TOPICS:  IP | SIP | Web Services
AT&T Corp

Robust Infrastructure for SOA: A Technical Introduction to WebSphere Application Server V6.1
sponsored by IBM Software Group
WHITE PAPER: IBM WebSphere Application Server, Version 6.1 is the foundation of the IBM WebSphere software platform and is the key building block for a Service Oriented Architecture (SOA).
Posted: 16 Nov 2006 | Published: 01 Nov 2006

IBM Software Group

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola Solutions

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017

TechTarget ComputerWeekly.com

The ultimate enterprise SIP buyer’s guide
sponsored by Sinch
WHITE PAPER: Explore the benefits of cloud-based SIP trunking for your enterprise, including cost savings, enhanced collaboration, and improved scalability. Discover if SIP trunking is the right solution for your business needs. Read the full guide to learn more.
Posted: 04 Sep 2024 | Published: 04 Sep 2024

Sinch

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Focus on cloud Initiatives with Red Hat and Microsoft
sponsored by Red Hat
PRODUCT OVERVIEW: Streamline your hybrid cloud with Red Hat Enterprise Linux on Microsoft Azure. Gain flexible consumption models, enterprise-grade support, and integrated management tools. Optimize operations, enhance security, and accelerate development. Read the product overview to learn more.
Posted: 13 Jun 2024 | Published: 13 Jun 2024

Red Hat

Focus on Cloud Initiatives With Red Hat and Microsoft
sponsored by Red Hat
EGUIDE: Streamline your hybrid cloud operations with a consistent, secure OS foundation across datacenter and cloud. Learn how Red Hat Enterprise Linux on Microsoft Azure can simplify management, improve security, and boost productivity. Read the white paper to get started.
Posted: 02 Dec 2024 | Published: 09 Sep 2024

Red Hat

Focus: Network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 08 Feb 2021 | Published: 24 Apr 2017

TechTarget ComputerWeekly.com

How to Implement an OSS Governance Program
sponsored by Anaconda
WHITE PAPER: Just like all software, open-source carries risk, and many data science teams still lack security protocols. For some, there simply aren’t security protocols or governance tools for open-source software (OSS). Read on to learn about 6 steps you can take to build an OSS governance program that works for data science and set your team up for success.
Posted: 10 Jul 2023 | Published: 11 Jul 2023

TOPICS:  .NET
Anaconda

Edge Computing Bridges IT and OT to Accelerate Shared Digital Initiatives
sponsored by Stratus
WHITE PAPER: IT and OT teams are converging to modernize operations, manage critical data, and tackle cybersecurity. An Edge Computing platform bridges this gap, providing a simple, protected, and autonomous solution to accelerate shared digital initiatives. Read the white paper to learn more.
Posted: 08 Feb 2025 | Published: 08 Feb 2025

Stratus

Jargon Buster Guide to Unified Communications
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.
Posted: 08 Feb 2021 | Published: 26 Oct 2017

TechTarget ComputerWeekly.com

Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019

TechTarget ComputerWeekly.com

Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018

TOPICS:  Telephones | VoIP
TechTarget ComputerWeekly.com

Securing Access for High Risk Workforce Users
sponsored by CyberArk
WEBCAST: Join this session to uncover how modern privilege has evolved, how attackers are exploiting workforce identities, and what you can do to strengthen security and keep high-risk users protected.
Posted: 25 Mar 2025 | Premiered: Mar 25, 2025

CyberArk

ServiceNow and Remote Support Integration Datasheet
sponsored by ServiceNow and Beyond Trust
PRODUCT OVERVIEW: Enhance remote support with ServiceNow integration. Increase productivity, strengthen security, and meet compliance requirements. Initiate remote sessions directly from ServiceNow, update tickets automatically, and access session details on demand. Read the full product overview to learn more.
Posted: 10 Jan 2025 | Published: 11 Jan 2025

ServiceNow and Beyond Trust

CDO and CIO Best Practices for Driving AI Readiness
sponsored by Informatica
WHITE PAPER: Achieving AI readiness involves strong data management, governance policies, and strategic investments. Data leaders face challenges in quality, integration, and compliance with GenAI. This white paper offers expert insights on AI fluency, cultural shifts, and board expectations, providing practical strategies for responsible AI implementation.
Posted: 20 Mar 2025 | Published: 20 Mar 2025

Informatica

Building an AI agent Center of Excellence to accelerate adoption
sponsored by Sema4.ai
EBOOK: By 2028, one in three enterprise software applications will have AI agents. A Center of Excellence (CoE) approach helps teams align AI initiatives and build a scalable foundation for success.
Posted: 08 Feb 2025 | Published: 08 Feb 2025

Sema4.ai

UCaaS vs. CCaaS vs. CPaaS: What's the difference?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: It can be difficult to make sense of popular cloud communications service models. Compare UCaaS vs. CCaaS vs. CPaaS to understand their differences and how they can be used together.
Posted: 05 Nov 2023 | Published: 06 Nov 2023

TechTarget ComputerWeekly.com

A GUIDE TO January 2025 Migrating from Citrix to Azure Virtual Desktop with Nerdio
sponsored by Nerdio
EBOOK: This guide outlines migrating from Citrix to Azure Virtual Desktop with Nerdio, covering licensing differences, architectural comparisons, image management, and connectivity options. Learn to streamline your migration, reduce costs, and leverage Azure's cloud infrastructure. Read the full ebook for a comprehensive roadmap.
Posted: 03 Mar 2025 | Published: 04 Mar 2025

Nerdio

6 user authentication types to secure networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

Google Workspace CMMC Level 2 Conguration Guide
sponsored by Google Workspace
EBOOK: This guide provides instructions for configuring Google Workspace to meet CMMC Level 2 requirements. It covers security controls, implementation steps, and best practices for protecting CUI in cloud environments. Learn to leverage Google Workspace features to enhance cybersecurity and achieve compliance. Read the full eBook for guidance.
Posted: 07 Mar 2025 | Published: 07 Mar 2025

Google Workspace

Modernize your VDI and apps with Omnissa Horizon
sponsored by TD Synnex
EGUIDE: Omnissa Horizon offers a modern approach to VDI and app delivery with flexible deployment, simplified management, robust security, and enhanced user experiences. Features like Instant Clone Technology and App Volumes streamline operations and improve efficiency. Discover how Horizon compares to Citrix and benefits your organization.
Posted: 11 Mar 2025 | Published: 11 Mar 2025

TD Synnex

Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

Computer Weekly – 25 April 2023: Aston Martin Formula One: Driven by data
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we speak to Aston Martin Formula One's Clare Lansley to find out how digital transformation helps the team to move further up the F1 grid. We explore how automation and AI is helping businesses tackle rising costs and also look into the maturity of Industry 4.0 initiatives. Read the issue now.
Posted: 21 Apr 2023 | Published: 25 Apr 2023

TechTarget ComputerWeekly.com

Strategies for Growth and Customer Engagement
sponsored by CleverTap
RESEARCH CONTENT: This benchmark report explores key metrics for e-commerce success, including email CTR, app session frequency, stickiness quotient, and conversion rates. Learn to optimize your customer engagement strategy, from initial install to long-term retention. Read the full report to unlock insights for boosting your e-commerce performance.
Posted: 19 Mar 2025 | Published: 15 Mar 2025

CleverTap

Proactive Security Vision Report
sponsored by NetSPI
RESEARCH CONTENT: NetSPI's Proactive Security Vision Report analyzes top vulnerabilities across attack surfaces, revealing trends in web, mobile, and cloud security. The report offers insights on remediation challenges and hiring trends. Use this research to prioritize security efforts and improve vulnerability management. Read the full report for recommendations.
Posted: 01 Mar 2025 | Published: 01 Mar 2025

NetSPI

How to Build a Proactive Compliance Program with Identity Security
sponsored by CyberArk
EBOOK: This eBook reviews nearly 20 global regulations and frameworks, with details on their security-focused requirements. This includes:NIS2 directiveDORANIST Special Publication 800-207 on Zero Trust ArchitectureDownload the eBook and learn how you can streamline compliance initiatives.
Posted: 20 Dec 2024 | Published: 01 Jan 2025

TOPICS:  .NET
CyberArk