Home > Research Library > Technology > Networking

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 26 - 50 of 2904Sort Results By: Published Date | Title | Company Name
White Paper Published By: Oracle     Published Date: Sep 30, 2014
B2B transactions are no longer driven by sales. At least not during the first half of the engagement process. Research shows that more than half of the product and solution information gathering has been done online before a prospect even talks to someone in sales. To succeed in this new business climate, smart businesses are adapting and realizing that the next frontier is to read and respond to the “Digital Body Language” of their prospects. This new body language is revealed through online activities such as website visits, white paper downloads, and email responses. Find out more about Digital Body Language. Download “Reading and Responding to Your Prospects’ Buying Behavior in the Online World”
Tags : 
digital, body, language, b2b, transaction
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 30, 2014
See why Oracle is named a leader for Enterprise Lead-To-Revenue Management Platform Vendors. L2RM platform vendors like Oracle are stepping up with tooling that enables customer-centric, multichannel, personalized marketing -- at scale.
Tags : 
marketing, b2b, customer insight, platform, vendors
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 30, 2014
To succeed in today’s highly competitive business environment, your company needs to be customer obsessed. Your customers’ digital interactions are the narrative of your brand, and engaging with them proactively through their channels of choice is key to delivering exceptional experiences and creating loyal brand advocates. Download this paper to learn how to deliver connected buying journeys to your customers.
Tags : 
customer, obsessed, marketing, leader, digital
    
Oracle
White Paper Published By: SAS     Published Date: Sep 30, 2014
In this paper – which is based on a webinar hosted by the Direct Marketing Association (DMA) and sponsored by SAS – we will take a look at how these technological advancements can enable you to become more predictive and prescriptive in your digital and integrated marketing efforts.
Tags : 
sas, direct marketing association, integrated marketing efforts, digital marketing efforts, networking
    
SAS
White Paper Published By: Oracle     Published Date: Sep 30, 2014
You’re committed to a content marketing program and you’ve been given a budget. No matter how big or small the amount, you’ll want to maximize the mileage of every dollar spent. One smart way to do that is by repurposing content. Read how in this report.
Tags : 
repurposing content, relevancy, reach, network management, network performance management
    
Oracle
White Paper Published By: SAS     Published Date: Sep 30, 2014
Several months ago, the author was discussing BI at a conference when another attendee asked, “Can you use those two terms together—business and intelligence?” Not being one to be outdone, the author quickly answered, “You cannot have one without the other, at least if you want to be successful.” As you might imagine, that led to a long discussion of what BI is (or should be). The author continued to interject the notion that cloud computing must be at the core of BI today and that having BI that is not enabled by cloud resources is sort of like eating apple pie without vanilla ice cream: You are not getting the most out of the experience (at least, not from the author’s point of view!). BI needs the cloud to be most successful. This piece helps explains why.
Tags : 
business intelligence, cloud computing, cloud resources, sas, data center
    
SAS
White Paper Published By: Extreme Networks     Published Date: Sep 26, 2014
Today’s healthcare environment is under tremendous technical and financial pressure to improve patient care and increase clinician productivity. A secure and life-critical wired and wireless network is an absolute must to support data, voice, video, and medical device applications. But how can this be done in a cost effective way while still providing continuously available and pervasive wireless connectivity to support life-critical devices? This eBook highlights and provides guidance from experienced healthcare IT professionals on the challenges today’s healthcare network faces when supporting mobility in the life-critical and mission-critical healthcare environment.
Tags : 
extreme networks, wifi, byod, wireless network, healthcare network
    
Extreme Networks
White Paper Published By: Global Knowledge     Published Date: Sep 26, 2014
VMware NSX does for networks and physical network components what virtual machines did for data centers and physical servers. It allows you to use them in very different and more flexible ways. In this white paper, you’ll learn how VMware NSX changes the way you build, manage, and secure your network.
Tags : 
global knowledge, nsx, network, vmware, nsx changes
    
Global Knowledge
White Paper Published By: Extreme Networks     Published Date: Sep 24, 2014
Use these questions to help decide which vendor’s SDN platform is best equipped to support your organization as you face a rapidly changing world of technology.
Tags : 
extreme networks, data center, sdn, software defined networking, sdn evaluation
    
Extreme Networks
White Paper Published By: Extreme Networks     Published Date: Sep 24, 2014
Download this whitepaper to learn key concepts for designing a standards-based data center fabric to meet the requirements of today and tomorrow.
Tags : 
extreme networks, sdn, data center, data center networking, resiliency
    
Extreme Networks
White Paper Published By: Global Knowledge     Published Date: Sep 22, 2014
Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two devices are directly connected or remotely connected.
Tags : 
global knowledge, packet delivery, networked device, moving data, directly connected
    
Global Knowledge
White Paper Published By: Global Knowledge     Published Date: Sep 22, 2014
Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two devices are directly connected or remotely connected.
Tags : 
global knowledge, packet delivery, networked device, moving data, directly connected
    
Global Knowledge
White Paper Published By: Global Knowledge     Published Date: Sep 22, 2014
Increased interconnectivity via machine-to-machine (M2M) communications, the IoE, and smart systems holds profound implications for how business trends continue to evolve. In terms of M2M growth, key developments in security will be essential, from the design and manufacture of devices to more robust cloud security and ensuring the integrity of wireless data transmissions. Without these safeguards in place, organizations and industries that rely on M2M will continue to place themselves at risk.
Tags : 
global knowledge, machine to machine communication, m2m, m2m growth, wireless data transmissions
    
Global Knowledge
White Paper Published By: Global Knowledge     Published Date: Sep 22, 2014
With VMware's recent release of the Horizon Suite (specifically View 6), VMware has taken the performance and usability features and put them all under the Blast moniker. This category of features is grouped from a marketing perspective but will retain their technical terms in the documentation, similar to how the term vSphere encompasses both ESXi and vCenter. Learn about the various features of the components that comprise the Blast family, including a brief discussion of what they are, improvements in version 6, and any notes or requirements for implementation.
Tags : 
global knowledge, vmware, esxi, vcenter, blast
    
Global Knowledge
White Paper Published By: RedPoint Global     Published Date: Sep 22, 2014
Download this paper to learn why the power of Hadoop 2.0 lies in enabling applications to run inside Hadoop, without the constraints of MapReduce.
Tags : 
redpoint, mapreduce, big data, hadoop, data integration
    
RedPoint Global
White Paper Published By: RedPoint Global     Published Date: Sep 22, 2014
Download this illuminating white paper about what YARN really means to the world of big data management.
Tags : 
redpoint, big data, data management, big data management, hadoop
    
RedPoint Global
White Paper Published By: Extreme Networks     Published Date: Sep 17, 2014
Download this whitepaper to learn how your organization can plan for the move to 802.11ac wireless.
Tags : 
extreme networks, wifi, byod, 802.11ac wireless, wireless
    
Extreme Networks
White Paper Published By: Extreme Networks     Published Date: Sep 17, 2014
In this eBook, we will demonstrate specific use cases for how a business intelligence solution can be used effectively by IT operations.
Tags : 
extreme networks, purview, application analytics, wifi/wireless, network solutions
    
Extreme Networks
White Paper Published By: Lenovo     Published Date: Sep 16, 2014
Virtual Desktop Infrastructure (VDI) works best for smaller centrally located user bases that share a core set of application and file needs. As the world moves to the web and the cloud, is VDI still a good fit for emerging mobility and BYOD needs for your agency? See this infographic to learn more about the tradeoffs, and what you can do to take advantage of emerging cloud solutions to drive improved mobile productivity across your entire organization.
Tags : 
vid, cloud alternatives, emerging mobility, mobile productivity, it management
    
Lenovo
White Paper Published By: IBM     Published Date: Sep 16, 2014
IBM’s new PowerLinux servers appeal to Linux buyers? Linux buyers are driven by the price advantages that Linux offers as compared with other operating environments (Linux is free open source code) Windows and Unix are chargeable licensed code). Linux buyers, therefore, look first and foremost at the total cost of acquisition of Linux based servers. Linux buyers also want rapid time to value (fast deployment); they often use decentralized procurement processes; they want their Linux servers to be simple to use and manage."
Tags : 
power-based systems, big data, linux, fast deployment, open source infrastructure
    
IBM
White Paper Published By: Centrify Corporation     Published Date: Sep 16, 2014
The major trends challenging IT organizations today are the increasing dissimilarities and hybridization of platforms inside and outside the organization. And the rush to deploy SaaS applications and the explosion in smart phone and tablet devices that users are bringing to work for personal productivity. This fractured identity environment results in significant management challenges for IT, and frustration and lower productivity for users forced to remember multiple usernames and passwords. Unified identity architecture ensures your on-premise Active Directory infrastructure can be securely leveraged to quickly bring servers (UNIX, Linux, and Windows), applications (on-premise, SaaS, and mobile) and endpoints (Mac and Mobile devices) into line with security best practice and compliance. This paper will cover the practical path of unified identity management across multiple platforms including data center, cloud, and mobile.
Tags : 
data center, cloud and mobile, saas applications, smart phone and tablet devices, directory infrastructure
    
Centrify Corporation
White Paper Published By: Centrify Corporation     Published Date: Sep 16, 2014
IT professionals are grappling with not one, but three revolutions at the same time. • First, cloud computing provides easy and dynamic access to information technology. • Next, the ecosystem of cloud-based SaaS applications has exploded thanks to cloud computing. • Finally, this SaaS ecosystem has helped power an even bigger boom of consumer-friendly mobile devices and apps that access SaaS. This Essential Guide examines the opportunities and challenges of empowering, yet controlling, user access to SaaS applications. Specifically, identity management as a service promises to simplify secure access, and management of SaaS applications while reducing password sprawl. This guide will also review how mobile computing has added to the complexity of managing access to both corporate data and SaaS, and additionally help evaluate the options available on the market.
Tags : 
saas, cloud computing, consumer-friendly, mobile devices, access to saas
    
Centrify Corporation
White Paper Published By: Cisco     Published Date: Sep 15, 2014
Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.
Tags : 
email, web security, quadrant, solutions, threats
    
Cisco
White Paper Published By: Sitecore     Published Date: Sep 15, 2014
Are too many technologies preventing you from having a single customer view? Find out the latest customer lifetime value trends in the new Forbes Insights report.
Tags : 
strategies, technology, customer, relationship, loyalty
    
Sitecore
White Paper Published By: destinationCRM.com     Published Date: Sep 09, 2014
Download this Free Best Practices installment from CRM magazine and learn the essential issues you should consider in your planning.
Tags : 
crm, cloud contact center, contact center, cloud computing, customer service
    
destinationCRM.com
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search Research Library      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.