Home > Research Library > Technology > Networking

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 26 - 50 of 3322Sort Results By: Published Date | Title | Company Name
White Paper Published By: Appcito     Published Date: Apr 09, 2015
Social media marketing ?rm ViralMint rolled out a new feature that proved so popular that the increased customer tra?c swamped the capabilities of the existing load balancer solution and greatly increased application response times. Lacking visibility into the volume or nature of its tra?c, ViralMint had no clues for how to address its issues. A fortuitous conversation led to discovery of the Appcito Cloud Application Front End (CAFE) service, which allowed ViralMint to gain control of its cloud application tra?c, retain its customers’ trust and build on its unexpected success.
Tags : 
customer traffic, load balancer solution, application response times, visibility, cloud application service
    
Appcito
Webinar Published By: IBM     Published Date: Apr 09, 2015
Enterprise applications are becoming increasingly complex, leveraging components across multiple platforms, including cloud. Learn how you can leverage IBM DevOps Services for Bluemix to provide full multi-stage release and deployment management to facilitate development.
Tags : 
enterprise applications, platforms, cloud computing, cloud management, application integration
    
IBM
Webinar Published By: IBM     Published Date: Apr 09, 2015
Like it or not, you will hear from your vocal users. It’s not unusual to see ratings from 1 to 5 stars for the same app. How do you track and compare actual and perceived quality? How can you get actionable insight from user feedback to develop mobile apps that engage users?
Tags : 
cloud-based services, actionable insight, user feedback, mobile apps, coding
    
IBM
Webinar Published By: IBM     Published Date: Apr 09, 2015
How can you get actionable insight from user feedback to develop mobile apps that engage users and deliver what matters to them? The answer lies in cloud-based services that enable rapid collection and analysis of user feedback combined with automation enabling faster response.
Tags : 
application integration, mobile apps, coding, cloud-based services, cloud computing
    
IBM
White Paper Published By: VMware, Inc.     Published Date: Apr 08, 2015
Enterprises today are exploring dierent cloud models in search of the right balance of functionality, flexibility and investment protection. A new Market Pulse survey by IDG Research Services finds that more than 50% of organizations are currently using hybrid cloud or in the process of moving workloads to hybrid cloud.
Tags : 
vmware, cloud computing, hybrid cloud, cloud deployment, applications
    
VMware, Inc.
White Paper Published By: VMware, Inc.     Published Date: Apr 08, 2015
VMware vCloud® Air™ Virtual Private Cloud OnDemand is an infrastructure-as-a-service offering that gives you instant, secure access to the cloud compute resources you need, at any time, with no commitments. There’s no faster way to get up and running with a cloud that is 100% compatible with your VMware vSphere® environment.
Tags : 
vmware, cloud computing, hybrid cloud, cloud applications, cloud testing
    
VMware, Inc.
White Paper Published By: VMware, Inc.     Published Date: Apr 08, 2015
Businesses are looking for a more flexible IT framework that can adapt to today’s rapidly changing and global environment.The need for faster, more cost-effective access to IT resources has created a healthy tension between business teams and IT, driving both to look for new and better solutions. Now VMware and our partners are delivering a new generation of hybrid cloud services that seamlessly extend your onsite data center to the cloud. Hybrid cloud services from VMware vCloud® Air™ and VMware vCloud Air Network Service Provider partners enable you to deploy and manage applications between your onsite and offsite environments to best meet the needs of your business.
Tags : 
interoperability, web services, web service security, virtualization, cloud computing
    
VMware, Inc.
White Paper Published By: VMware, Inc.     Published Date: Apr 08, 2015
When you’re trying to meet the ever-changing demands of users, budgets, and your business, you need access to instant, flexible, and consistent compute resources. That’s exactly what you get with VMware vCloud® Air™ Virtual Private Cloud On-Demand, an infrastructure-as-a-service cloud that is 100% compatible with your VMware vSphere® environment. Take a closer look at what Virtual Private Cloud OnDemand can do for your business.
Tags : 
vmware, hybrid cloud, cloud computing, cloud applications, resource management
    
VMware, Inc.
White Paper Published By: VMware, Inc.     Published Date: Apr 08, 2015
Organizations struggle to meet the demand for scalable and resilient infrastructure to develop and test applications. A growing number of organizations are consuming or considering cloud services to accelerate software dev/test cycles. Cloud services enable them to take advantage of on-demand capacity to deal with these key challenges: • Limited IT resources force trade-offs in prioritizing projects. • Unpredictable requirements for dev/test result in overpurchasing and underutilization. • Lengthy purchasing and provisioning cycles for new infrastructure add time and cost to projects. • Incompatible dev/test and production environments require workarounds that draw out timelines and raise the risk of errors.
Tags : 
test and measurement, cloud computing
    
VMware, Inc.
White Paper Published By: VMware, Inc.     Published Date: Apr 08, 2015
Need to provide fast, easy, secure access to cloud services? Now you can with VMware vCloud® Air™ Virtual Private Cloud OnDemand—the fastest path to the cloud that seamlessly integrates with your VMware vSphere® data center.
Tags : 
vmware, hybrid cloud, cloud services, cloud computing, application integration
    
VMware, Inc.
White Paper Published By: VMware, Inc.     Published Date: Apr 08, 2015
Get instant access to cloud compute resources with VMware vCloud® Air™ Virtual Private Cloud OnDemand— the easiest way to consume the cloud that is 100 percent compatible with your VMware vSphere® environment. You can procure your virtual private cloud in three easy steps.
Tags : 
vmware, private cloud, resource monitoring, cloud integration, application integration
    
VMware, Inc.
White Paper Published By: IBM     Published Date: Apr 07, 2015
This report explores how cloud-based solution providers, such as managed service providers (MSPs) and independent software vendors (ISVs) are using an embedded approach to analytics in an effort to empower their customers and build a competitive advantage.
Tags : 
ibm, cloud computing, analytics, business intelligence, distributed computing
    
IBM
Webinar Published By: IBM     Published Date: Apr 07, 2015
Learn how to understand, manage and debug problems due to size, complexity and scale in operation of virtualized networks for modern data centers, including developer- and user-controlled software in clouds.
Tags : 
ibm, scale, data center, software, cloud
    
IBM
White Paper Published By: Raritan     Published Date: Apr 07, 2015
Data Center Infrastructure Management (DCIM) has evolved to guide the management of data center assets, their environment, and overall operations. In this paper, we discuss how Raritan’s DCIM software can be integrated with existing ITSM software to increase efficiency and reliability.
Tags : 
raritan, raritan dcim, it service management, itsm, data center
    
Raritan
Webinar Published By: IBM     Published Date: Apr 07, 2015
Future proof your investment with IBM WebSphere - Your gateway to cloud, mobile and Internet of Things.
Tags : 
ibm, websphere, cloud, mobile, analytics
    
IBM
White Paper Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
White Paper Published By: IBM     Published Date: Apr 06, 2015
An Aberdeen white paper on ECM in the Cloud.
Tags : 
ecm, cloud, ibm, mobile, enterprise content management
    
IBM
White Paper Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
White Paper Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security
    
Cyveillance
White Paper Published By: Cyveillance     Published Date: Apr 03, 2015
Cyber threat intelligence is unquestionably a hot buzzword in the security industry these days. It is being used to seek venture capital and fund startups. It is being pitched to the enterprise market by providers and consultants. However, in this paper, we argue that the majority of what is being billed as “threat intelligence” isn’t. It’s data. From lists of bad IPs or application vulnerabilities to malware signatures, social media data or indicators of compromise (“IOCs”), none of these things are “intelligence.” They’re data. In this white paper, we define the difference between intelligence and data, and then illustrate the theoretical discussion in a concise case study in the tangible terms of a real-world practitioner and an actual event.
Tags : 
cyber threat, intelligence, centure capital, startup, enterprise
    
Cyveillance
White Paper Published By: OpenText     Published Date: Apr 02, 2015
Enterprises of nearly all sizes and industries are undergoing significant changes in how, when, and where their employees work, largely due to both new technologies and the realities of global commerce and collaboration. Business leaders are pushing their IT departments to come up with new solutions to help their employees be more productive, while IT leaders strive to ensure that corporate systems are secure, available and delivering a superior user experience. Read this executive brief to learn more about remote access solutions.
Tags : 
remote access, unix, linux, user experience, networking
    
OpenText
White Paper Published By: OpenText     Published Date: Apr 02, 2015
The most advanced UNIX desktop virtualization solution available, Exceed VA TurboX empowers a global workforce though remote application access and provides an optimal user experience that improves performance and productivity. Read this product overview to learn more about OpenText Exceed VA TurboX 10.5.
Tags : 
opentext exceed va turbox, remote access, productivity, resources, networking
    
OpenText
Webinar Published By: IBM     Published Date: Apr 01, 2015
Is email still the “killer app” it used to be? Social technologies and mobile capabilities are changing the way people communicate in the workplace. Many organizations are employing BYOD strategies and embracing social business tools like file sharing, chat, wikis and communities. In the past, email was used for storing and sharing documents and having conversations with groups. Tasks which are much better suited for today's social cloud collaboration tools. Email usage may be evolving, but email is not dead. In fact, everyone in the organization from executives to factory workers needs email to stay connected. And many organizations are moving their messaging to cloud to take advantage of the flexibility and cost savings a cloud environment provides. In this webcast, you will learn: • How the nature of email has changed and why everyone in your organization needs it. • Why the cloud makes sense for messaging for everyone from executives, to sales, to boundary workers, either as hybrid solution or for the entire workforce. • How email complements social business technologies and how you can start using your email more efficiently in the workplace. • How moving messaging to the cloud can help reduce IT cost and complexity.
Tags : 
email, social technologies, byod, file sharing, chat
    
IBM
Webinar Published By: IBM     Published Date: Apr 01, 2015
In this On Demand session learn about using cloud-based social collaboration tools to streamline key areas of your business, increasing time to invest in new product development. Hear how one manufacturer turned to an IBM Business Partner to implement IBM SmartCloud Connections.
Tags : 
cloud technologies, social collaboration tools, ibm, networking, it management
    
IBM
Webinar Published By: IBM     Published Date: Apr 01, 2015
Every day, emails flood our inbox: tasks are left undone, messages go unanswered, and meetings overwhelm us. Why does work have to be such hard work? The truth is, it doesn’t have to be. Join our video panel discussion and hear how IBM’s latest solution offers an easy way to take back control of your day. Using advanced design thinking, the latest in social analytics and delivered from the cloud to your mobile device or desktop, this new solution: • Understands your needs, working style and priorities—and anticipates what you need and when you need it. VP and Principal Analyst Alan Lepofsky of Constellation Research, will discuss the critical importance of re-assessing the way we are currently working and what the future of work holds. • Provides less clutter and more clarity with an interface that shows only what you need, so you can make quicker, smarter decisions. Hear Phil Gilbert, General Manager, IBM Software Group Design, explain how the IBM Design Studio developed an entirely new experience from the ground up. • Enables a shift from “me” to “we” through intelligent, secure and engaging social apps that foster real-time understanding, cooperation and communication. Jeff Schick, General Manager, IBM Enterprise Social Solutions, will talk about why information from our social networks is crucial for collaboration and innovation, and why email must evolve to accommodate it. As an added bonus, watch for details on becoming part of the beta! Register now and get ready for an extreme mail makeover: re-imagined for the future of work. Register now!
Tags : 
email, social technologies, ibm, cloud, networking
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search Research Library      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.