application ProtocolWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: application Protocol returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Application Protocol (WAP)
 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Mobile Field Sales/ Wireless Connectivity
 •   Network Management
 •   Wireless Security
 •   WAN/ LAN Solutions
 •   Networks
 •   Content Delivery Networks/ Web Application Acceleration
 •   Handhelds/ PDA

Related Searches
 •   Directories application Protocol
 •   Frameworks application Protocol
 •   Products application
 •   Source application Protocol
 •   application Protocol Commercial
 •   application Protocol Example
 •   application Protocol Mac
 •   application Protocol Making
 •   application Protocol Procedures
 •   application Roi
Advertisement

ALL RESULTS
1 - 25 of 451 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Accelerating File Services Across the WAN by BlueCoat

May 11, 2010 - (Free Research)
CIFS performs poorly across WAN links due to higher latency. The solution to solve the CIFS problem is to apply several WAN optimization technologies working together to quickly and easily restore application performance, improve response time, and recover WAN bandwidth. 
(DATA SHEET) READ ABSTRACT |

Using the ClearSight Analyzer to Troubleshoot the Top Five VoIP Problems and Troubleshoot Streaming Video by Fluke Networks

August 09, 2010 - (Free Research)
This paper examines each of these problems and addresses how the ClearSight Analyzer can be used to isolate the cause of the problem. Read on to learn so much more. 
(WHITE PAPER) READ ABSTRACT |

Getting the Most from Your Wireless Network by WildPackets, Inc.

August 2008 - (Free Research)
Network disruptions have become business disruptions with financial and sometimes even legal consequences. This white paper outlines best practices in monitoring, analyzing, and troubleshooting wireless networks using WildPackets OmniPee. 
(WHITE PAPER) READ ABSTRACT |

WEP Cloaking for Legacy Encryption Protection by Motorola, Inc.

November 2008 - (Free Research)
Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution. 
(ANALYST REPORT) READ ABSTRACT |

Mobile messaging is the key to connecting communities by ComputerWeekly.com

November 2010 - (Free Research)
Few could have envisioned the global success of SMS (short message service) when the first text message was sent in 1992. SMS has crossed network and technology boundaries, and continues to find new applications, as well as providing inspiration for industry innovation as IP (Internet Protocol)-based messaging builds momentum. 
(WHITE PAPER) READ ABSTRACT |

VOIP Without The Hype: What Businesses Need To Know by Fonality

December 2010 - (Free Research)
Like the cellular phenomenon, consumers are rushing to VoIP even though audio quality and reliability aren't yet what they are with traditional landlines. That aside, the value of VOIP has resonated with consumers. Read this white paper and discover what every business needs to know before signing on to VoIP. 
(WHITE PAPER) READ ABSTRACT |

How to Make Magic with VoIP: Weighing the Options by Cisco Systems, Inc.

January 2011 - (Free Research)
VoIP with UC can transform a business across four dimensions: lower costs, higher productivity, better customer service, and higher revenues. It can make a small business appear big, and help it outperform larger competitors. There are several ways to implement VoIP. Read this paper to determine which way is best for your business. 
(WHITE PAPER) READ ABSTRACT |

Design, Deploy, and Manage a DDoS Protection Architecture by F5 Networks

November 2013 - (Free Research)
An increasing number of Distributed Denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks. In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS. 
(WHITE PAPER) READ ABSTRACT |

A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network by Motorola, Inc.

May 2007 - (Free Research)
This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own. 
(WHITE PAPER) READ ABSTRACT |

Fine-Tune IT Performance by Riverbed Technology, Inc.

May 2011 - (Free Research)
This paper discusses how you can fine-tune your IT performance with a solution that enables your business to run faster and more efficiently, while saving time and cutting the cost of your infrastructure. 
(WHITE PAPER) READ ABSTRACT |

E-guide: Taking full advantage of the benefits of mobile unified communications: Best practices by SearchSecurity.com

May 2011 - (Free Research)
In this SearchUnifiedCommunications.com e-guide, learn the applications, technologies and benefits associated with mobile unified communications (UC) and uncover how you can start taking advantage of them today. 
(EGUIDE) READ ABSTRACT |

Achieving Business Value with Network and Application Visibility by Riverbed Technology, Inc.

April 2010 - (Free Research)
IDC conducted nine in-depth interviews with current Riverbed Cascade customers in order to obtain qualitative information about the end-user experience since deploying the network and application visibility solution, and obtain quantifiable data specific to each customer. Read this analyst report to learn more. 
(ANALYST REPORT) READ ABSTRACT |

E-Book: Leveraging 802.11n for Increased Coverage and Performance by SearchNetworking.com

October 2010 - (Free Research)
This e-book covers best practices for deploying and optimizing 802.11n to support data, voice and video applications. 
(EBOOK) READ ABSTRACT |

Unified Application Delivery by F5 Networks

December 2009 - (Free Research)
By providing a unified Application Delivery Networking platform, F5 BIG-IP offers the ability for organizations to adopt a single platform for all its application delivery needs. 
(WHITE PAPER) READ ABSTRACT |

Guide Application: Connect, Inform & Engage the Entire Campus Community by AT&T Corp

October 2011 - (Free Research)
AT&T Campus Guide is an affordable, leading edge, service-as-a-solution open mobile platform. 
(WHITE PAPER) READ ABSTRACT |

Mobilizing Enterprise Applications (MEAP) by AT&T Corp

October 2010 - (Free Research)
Developers are spending too much time adapting mobile applications for specific devices, and not enough time developing apps that could deliver more business value. This paper explains how a Mobile Enterprise Application Platform (MEAP) can provide a sound, sustainable strategy for mobilizing enterprise applications. 
(WHITE PAPER)

Mobilizing Applications Lotus Domino Databases by BlackBerry

August 2008 - (Free Research)
The ability to access and update Lotus Domino applications can be a simple and effective way to improve efficiency. Read this paper and learn how easy it can be to create BlackBerry applications that integrate with your Lotus Domino applications. 
(WHITE PAPER) READ ABSTRACT |

Microsoft .NET Framework and BlackBerry Applications by BlackBerry

March 2009 - (Free Research)
This whitepaper provides a technical overview of how organizations can leverage Microsoft development tools and Microsoft .Net framework to create applications for the BlackBerry®platform. 
(WHITE PAPER) READ ABSTRACT |

The CIO's Guide to Mobile Applications by BlackBerry

April 2010 - (Free Research)
Read this white paper to learn about some of the key enterprise LOB applications that most benefit from mobility and how applications can be deployed with a simple implementation guideline. 
(WHITE PAPER) READ ABSTRACT |

The CIO’s Guide to Mobilizing the Enterprise by BlackBerry

July 2010 - (Free Research)
A successful mobility plan should focus on ‘mobilizing’ your critical business processes and include planning phases for discovery, development and deployment. This guide focuses on how to build an effective mobility plan while providing valuable insight into the benefits of mobilizing your business applications. 
(WHITE PAPER) READ ABSTRACT |

Deploying BlackBerry Enterprise Server Express by BlackBerry

March 2010 - (Free Research)
Learn how BlackBerry® Enterprise Server Express can help you get the most out of your BlackBerry® smartphone. From smartphone applications to help you do more of what you love, to connecting you to business applications. 
(WEBCAST) READ ABSTRACT |

Borderless Networks: Cisco Application Velocity by Cisco Systems, Inc.

December 2011 - (Free Research)
Tune in to learn about application velocity for borderless networks. Learn how monitoring application performance offers many great business benefits, and increases performance and reliability. 
(VIDEO) READ ABSTRACT |

Cisco Application Networking for SAP Design Guide [Data Center Designs: Application Networking] by Cisco Systems, Inc.

November 2011 - (Free Research)
This document provides guidelines on how to deploy a SAP application solution with optimal application networking solutions. It is intended to reduce the time to implement a SAP application deployment and increase the likelihood of success by demonstrating techniques that were found to be successful. 
(WHITE PAPER) READ ABSTRACT |

Control IM, P2P and Streaming Applications by BlueCoat

May 2010 - (Free Research)
Blue Coat’s secure Web gateway solution provides network administrators with the tools to control Internet applications, such as IM, P2P and streaming applications. Deployed between internal users and external applications, such as IM datacenters, ProxySG intercepts all outbound and inbound communications. 
(DATA SHEET) READ ABSTRACT |

Improving Application Availability with a Comprehensive Approach to WAN Optimization by BlueCoat

September 2009 - (Free Research)
Satisfying a WAN's need for speed may not be the best and most cost-effective way to improve applications performance and access across a network. Read about a more constructive approach in this eGuide. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 451 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts