SLIP Reports

A Computer Weekly buyer's guide to perimeterless network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 08 Feb 2021 | Published: 05 Feb 2019

TechTarget ComputerWeekly.com

Computer Weekly – 19 March 2013: Delivering software development success
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
Posted: 18 Mar 2013 | Published: 19 Mar 2013

TechTarget ComputerWeekly.com

Solving the Scalability Problem with Big Data
sponsored by WANdisco
EGUIDE: A centralized computing strategy can keep your organization from realizing the value of big data. In this expert e-guide, learn how embracing a more distributed architecture can solve traditional scalability problems and lead to big data success. Also inside, discover the value of NoSQL options.
Posted: 03 Sep 2013 | Published: 03 Sep 2013

WANdisco

IP Telephony for Mid-Sized Companies : Current trends and what’s in store for the future
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide highlights the top 5 trends in enterprise IP telephony and how you can improve collaboration and reduce costs. Uncover what you can expect for the future of IP telephony, what SIP trunking really means and how to take full advantage of its benefits
Posted: 27 Jun 2011 | Published: 23 Jun 2011

Cisco Systems, Inc.

Adaptive Packet Filtering
sponsored by Gigamon
WHITE PAPER: This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Gigamon

Cisco Unified Communications: New Deployment Models for Communications and Collaboration
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this whitepaper for insight on building the best unified communications solution for your business.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Cisco Systems, Inc.

Cisco IOS Digit Manipulation
sponsored by Global Knowledge
WHITE PAPER: Platform digit manipulation may be needed for many business phone calls as they traverse their gateways. his guide explores the role of digit manipulation techniques and various is ways it can benefit for your business.
Posted: 21 Jan 2014 | Published: 31 Dec 2013

Global Knowledge

Top Ten Considerations When Evaluating Unified Communications Solutions - Learn the top solution differentiators to look for before deciding
sponsored by Cisco Systems, Inc.
WEBCAST: This paper breaks down ten areas to consider when evaluating an upgrade of your unified communications solution.
Posted: 02 Aug 2011 | Premiered: Aug 2, 2011

Cisco Systems, Inc.

What IT Managers Need to Know About IP Surveillance
sponsored by D-Link
WHITE PAPER: The video surveillance market is in the throes of transition. IP surveillance is rapidly taking over from traditional analog CCTV. Within the next three years more than half the surveillance cameras used in North America will be IP cameras, according to the research firm Frost & Sullivan. Read this whitepaper to learn more.
Posted: 15 Jun 2010 | Published: 15 Jun 2010

D-Link

UC and the Evolution of Enterprise Telephony
sponsored by TechTarget Security
EGUIDE: This expert E-Guide will help readers understand key information about the evolution of enterprise technology, how to prepare the enterprise for mobile telephony, and the value of combing IP telephony (IPT) with unified communications (UC).
Posted: 18 Apr 2013 | Published: 18 Apr 2013

TechTarget Security