Backbone Providers Reports

Computer Weekly – 13 March 2018: Unlocking digital change in criminal justice
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the IT and digital chief at the Ministry of Justice about digital transformation across the criminal justice system. European cities are trying to attract British IT talent as a result of Brexit – what does it mean for UK IT? And we take an in-depth look at the fintech sector. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Mar 2018

TechTarget ComputerWeekly.com

Essential Guide: Securing hybrid IT infrastructure
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
Posted: 08 Feb 2021 | Published: 16 Nov 2017

TechTarget ComputerWeekly.com

E-Guide: Increase your Revenues and Profits by Offering Managed Voice
sponsored by Cisco Systems, Inc.
EGUIDE: Offering hosted unified communications and VoIP services is a strong opportunity for service providers. How do you know which customized plan is right for your specific business needs? Read this E-Guide to learn pros and cons, as well as which questions to ask potential clients to ensure that you are delivering the solution that’s right for them.
Posted: 14 Mar 2011 | Published: 14 Mar 2011

Cisco Systems, Inc.

SharePoint E-Zine Volume 7: Who Is Allowed to Customize SharePoint?
sponsored by TechTarget Search Windows Server
EZINE: Find out how to incorporate governance into SharePoint customization to empower users while setting boundaries.
Posted: 25 Aug 2012 | Published: 16 Feb 2009

TechTarget Search Windows Server

Service Provider Solutions Guide
sponsored by Transition Networks, Inc.
PRODUCT LITERATURE: With products available in stand-alone, chassis-based, fixed optics or SFP ports, Transition Networks has a product to meet your requirements.
Posted: 08 Sep 2008 | Published: 05 Sep 2008

Transition Networks, Inc.

2019 Network Security Predictions: Top Trends & Challenges
sponsored by TBNG Consulting
EGUIDE: Read this expert guide to review predicted networking trends for 2019. Also, learn why network security remains a top challenge and how you can properly manage it.
Posted: 23 Jan 2019 | Published: 18 Jan 2019

TBNG Consulting

Information Security Magazine – July/August 2013
sponsored by TechTarget Security
EZINE: This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

TechTarget Security

Transitioning to LTE: Business and Technical Considerations
sponsored by Alcatel-Lucent
PRESENTATION TRANSCRIPT: LTE evolution is more than a move to a new technology. It encompasses a shift in the service provider’s business model to a more sustainable and profitable one. Read this presentation transcript to learn more!Trackback URL
Posted: 10 Nov 2010 | Published: 30 Nov 2010

Alcatel-Lucent

Computer Weekly – 19 March 2013: Delivering software development success
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
Posted: 18 Mar 2013 | Published: 19 Mar 2013

TechTarget ComputerWeekly.com

The Problem Facing Advanced Threat Defense
sponsored by UnitedLex
EGUIDE: The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex