Home > Research Library > Technology > Networking

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 26 - 50 of 2787Sort Results By: Published Date | Title | Company Name
White Paper Published By: Brocade Communications Systems     Published Date: Aug 21, 2014
The security of your campus network is essential to managing your organization's risk - and unlike the networking infrastructure of third-part service providers, the responsibility for campus network security falls primarily on your own organization. This report explains why security for your campus network is essential, and outlines three straightforward ways that you can improve it.
Tags : 
security, campus network, network, infrastructure, risk
    
Brocade Communications Systems
White Paper Published By: Brocade Communications Systems     Published Date: Aug 21, 2014
This white paper explores today's campus networking environment: its operational shortcomings and potential to address knowledge workers' growing needs. IT managers need to look to their near- and midterm future needs in terms of how a software-defined network architecture can provide incremental value to their IT and network infrastructure; why it is likely to be the foundation of next-generation enterprise networking solutions; the importance of open technologies and protocols such as OpenFlow; and how SDN will help better manage physical and virtual network resources to deliver a better application experience.
Tags : 
enterprise, campus network, sdn it, virtual, network architecture
    
Brocade Communications Systems
White Paper Published By: Brocade Communications Systems     Published Date: Aug 21, 2014
For the last two years, Software-Defined Networking (SDN) has been the hottest topic in networking. There is tremendous interest in SDN on the part of vendors and a wide range of user groups including hyper-scale data center providers, service providers and enterprises of all types and sizes. While most of the discussion of SDN focuses on its use in the data center, The 2013 Guide to Network Virtualization and SDN1 highlights the fact that enterprise IT organizations are interested in deploying SDN broadly throughout their environment, including in their WAN and campus networks.
Tags : 
security, hyper-scale, sdn, campus networks, wan
    
Brocade Communications Systems
White Paper Published By: Vision Solutions     Published Date: Aug 21, 2014
A report on research findings into the state of resilience and methods used companies to ensure their strength.
Tags : 
data management strategies, data protection, system migrations, data safeguarding, backup and recovery
    
Vision Solutions
White Paper Published By: Global Knowledge     Published Date: Aug 19, 2014
The process of subnetting is both a mathematical process and a network design process. Mathematics drives how subnets are calculated, identified, and assigned. The network design and requirements of the organization drive how many subnets are needed and how many hosts an individual subnet needs to support.
Tags : 
subnetting, broadcast domains, network design process, ip networks, ip telephony
    
Global Knowledge
White Paper Published By: Global Knowledge     Published Date: Aug 19, 2014
This white paper explains how you can obtain the skills for troubleshooting Cisco networks, which requires mastery of several basic steps and much practice before applying the skills effectively in a production environment. This document does not contain any troubleshooting cases or examples because that is not how troubleshooting skills are learned.
Tags : 
troubleshooting techniques, network baseline, network diagrams, network maintenance, network management
    
Global Knowledge
Free Offer Published By: bitglass     Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
Tags : 
bitglass, saas, saas security, crm, microsoft
    
bitglass
Webinar Published By: BMC Software     Published Date: Aug 18, 2014
IT as a Service (ITaaS) will transform future IT operations and service delivery. In the interim, Hybrid IT offers a rational, gradual approach in which some services move to SaaS while others remain on-premise. This white paper provides a strategy to move part or all of your ITSM suite to the cloud as a stepping stone to ITaaS.
Tags : 
bmc, itsm solutions, changing business, cloud, cios
    
BMC Software
Webinar Published By: BMC Software     Published Date: Aug 18, 2014
Increasingly, enterprise organizations are moving to the cloud for IT Service Management (ITSM)—but is cloud delivery right for your business? Learn about the changing face of ITSM and gain the perspective needed to make the right ITSM decision for your organization. Get the free white paper from Enterprise Management Associates.
Tags : 
bmc, itsm solutions, changing business, cloud, cios
    
BMC Software
White Paper Published By: BMC Software     Published Date: Aug 18, 2014
IT is embracing this new world of consumerized technology with a focus on its own employees as internal customers. Explore how customer-first policies can make use of social, mobile and cloud technologies to give workers the freedom and flexibility they desire to drive company productivity.
Tags : 
customer, cloud technology, internal, productivity, networking
    
BMC Software
White Paper Published By: Plex Systems     Published Date: Aug 15, 2014
There’s a disconnect in the way most software companies, even cloud-based SaaS companies, license their systems. And it is all about the concept of "seats" or use licenses. Learn how the Plex Manufacturing Cloud licensing model paves the way for your success with unlimited seats.
Tags : 
cloud, software, cloud manufacturing, saas, networking
    
Plex Systems
White Paper Published By: Plex Systems     Published Date: Aug 15, 2014
The right ERP systems contains ease-of-use and value for manufacturers by providing consistent design and security features, reduced burden of manual data entry and simpfiled communications with other systems, partners and devices.
Tags : 
erp systems, security, manufacturing, communications. data entry, networking
    
Plex Systems
White Paper Published By: Plex Systems     Published Date: Aug 15, 2014
The Plex Manufacturing Cloud is providing a revolutionary approach to ERP upgrades by using a continuous update process that is unique to cloud-only software. Remove the need to do manually ERP uprgrades that are disruptive to an orgranization and can cost millions of dollars.
Tags : 
erp, cloud software, manufacturing, revolutionary approach, networking
    
Plex Systems
White Paper Published By: Plex Systems     Published Date: Aug 15, 2014
There are a number of benefits beyond total cost of ownership to deploy cloud ERP, including increased flexibility, deployment, busines continuity and usability. Plex was in the Cloud before Cloud was cool - helping manufacturers run their business from the shop floor to the top floor.
Tags : 
erp, cloud, cloud erp, manufacturers, flexibility
    
Plex Systems
White Paper Published By: Plex Systems     Published Date: Aug 15, 2014
If your current ERP isn't doing the job for you now, its not likely going to do so in the future. If you are a manufacturer that is not running your operations on a modern , technology-enabled, fully functional ERP solution, you are probably feeling the pain of inefficiencies and you are not optimizing your business.
Tags : 
erp systems, security, manufacturing, communications. data entry, networking
    
Plex Systems
White Paper Published By: Plex Systems     Published Date: Aug 15, 2014
There has been no shortage of high profile recalls over the past several years. Suppliers are being required to provide more robust quality management systems, provide better real-time visablity into manufacturing data, and may even be held accountable for additional charge-back and warranty claims. Take a next generation approach to quality management.
Tags : 
networking
    
Plex Systems
White Paper Published By: Box     Published Date: Aug 15, 2014
This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.
Tags : 
security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents
    
Box
White Paper Published By: McAfee     Published Date: Aug 15, 2014
À medida que a tecnologia de firewall de próxima geração (NGFW, next-generation firewall) se populariza, é necessário analisar as funções e os recursos avançados que separam os “líderes” dos “atrasados”. Nos termos mais básicos, o consenso sobre a definição do NGFW incluiria as seguintes capacidades: recursos de firewall padrão como conversão de endereços de rede e inspeção com monitoramento de estado, prevenção de intrusões integrada, reconhecimento de aplicativos e algum nível de inteligência e integração com bancos de dados de vulnerabilidades e reputações.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada
    
McAfee
White Paper Published By: McAfee     Published Date: Aug 15, 2014
Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas de evasão avançadas (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais. Elas podem transportar ataques ou explorações, passando pelos dispositivos de segurança de rede e firewalls, firewalls de próxima geração, sistemas de detecção e prevenção de intrusões e até mesmo roteadores que executam inspeção aprofundada de pacotes. Neste livro, você aprenderá tudo sobre as AETs, além de obter informações e dicas para ajudar a proteger sua empresa. Se você trabalha no governo, na área militar, no setor financeiro, industrial, comércio eletrônico ou outros setores com infraestrutura crítica, leia este livro para conhecer o inimigo e saber como se proteger melhor contra as evasões avançadas.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada
    
McAfee
White Paper Published By: McAfee     Published Date: Aug 15, 2014
Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada
    
McAfee
White Paper Published By: McAfee     Published Date: Aug 15, 2014
As redes são projetadas para facilitar o fluxo de comunicação e não para dificultá-lo. Infelizmente, os pacotes de dados podem ser manipulados para parecerem normais, embora contenham uma exploração.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada
    
McAfee
White Paper Published By: Box     Published Date: Aug 15, 2014
This paper breaks down the main features of the Box mobile app
Tags : 
box, mobile content experience, sales mobility, presentation software, work on the go
    
Box
White Paper Published By: Box     Published Date: Aug 15, 2014
This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.
Tags : 
box, securing content, content security in the cloud, device management, application security
    
Box
White Paper Published By: Box     Published Date: Aug 15, 2014
This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.
Tags : 
box, securing content, content security in the cloud, device management, application security
    
Box
White Paper Published By: Box     Published Date: Aug 15, 2014
This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.
Tags : 
business and productivity, byod policies, mobile software, mobile computing, mobile data systems
    
Box
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search Research Library      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.