Techworld

Network Infrastructure Whitepapers


Sort by: Date | Company | Title


The F5 DDoS Protection Reference Architecture part 2 of 3
By F5 Networks | 24/3/2014
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
Download this now


The F5 DDoS Protection Reference Architecture part 1 of 3
By F5 Networks | 24/3/2014
Distributed denial of service attacks (DDoS) attempt to make a machine or network resource unavailable to its intended users, with a wave of crippling attacks on enterprises since 2012. This whitepaper offers guidance to security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks.
Download this now


Unified Access
By Alcatel-Lucent | 7/11/2013
Jump the wall between the wired network and the wireless one.
Download this now


Key Steps to Success fully Migrate to 802.11ac
By Alcatel-Lucent | 23/10/2013
802.11ac is well on its way to becoming the standard for next-generation Wi-Fi. The gigabit speed, improved capacity and reliability that 802.11ac brings to wireless LANs (WLANs) are amplified as mobile users, devices and application usage continue to grow rapidly. In this whitepaper, we look at the five steps for successful migration to an 802.11ac WLAN.
Download this now


Deploying Customer Service in the Cloud
By Oracle | 17/10/2013
Customer engagement is rapidly shifting, and one of the biggest challenges companies are facing is figuring out how to serve consumers in this new digital environment. Implementing and managing new channels needs to be economically palatable, without any disruption to existing customer care practices. This business guide provides insight into how best to deploy customer service in the cloud, detailing the four phases of an evolved customer experience management strategy.
Download this now


Knowledge Management: 5 Steps to Getting it Right the First Time
By Oracle | 16/10/2013
Today customers look to engage with organizations through an increasing number of channels – and expect more from every customer service and support experience. A strategically implemented knowledge management initiative for both the contact center and Web self-service channels offers a powerful answer to this growing need to do more with less. However, a poorly implemented initiative can have a negative impact – increasing call and Web session time and frustrating both customers and agents alike. This eBook sets out 5 simple steps for optimizing customer service and support with an effective, best-practice-led knowledge management initiative.
Download this now


Oracle ERP Cloud Service - Back-Office Solutions that Keep You in Front
By Oracle | 15/10/2013
Learn how you can harness the power of the cloud to run your business more effectively and lower upfront costs. Oracle ERP Cloud Service offers a comprehensive, enterprise-grade cloud that can transform back office operations and allow you to focus on running your business.
Download this now


Guide to the TCO of Encryption
By Check Point Software Technologies | 5/9/2013
While “free” open-source applications still carry unavoidable costs of installation, management, and usage, some costs can be controlled or even eliminated by smart use of appropriate applications, management technology, and best practices. In this whitepaper, we analuse the total cost of owning, managing and using full-disk encryption in large organisations. Click to download!
Download this now


Information Monitoring: How Far Should it Go?
By Clearswift Asia Pacific | 9/8/2013
Information monitoring is a tricky subject. We all want to be able to trust others with data, but information theft and data leakage happen all too often, and organisations are asking themselves how much they should be monitoring the way company information is used. In this whitepaper, we look at why this is an issue and how should it be done? Find out more.
Download this now


‘The Enemy Within’ Report
By Clearswift Asia Pacific | 2/8/2013
As different technology trends create new challenges and complexity for all organisations, they now must address the threats that reside much closer to home. In this research paper, conducted by Loudhouse, we identify the extent to which internal security threats are affecting different organisations and, in turn, how these are being managed. Click to download!
Download this now

Top Whitepapers

Twitter Feed

Featured Whitepapers