Home > Research Library > Technology > Networking

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 251 - 275 of 2793Sort Results By: Published Date | Title | Company Name
White Paper Published By: New Relic     Published Date: Jun 05, 2014
This eBook examines the current enterprise technology landscape; the challenges this is creating for enterprise APM; and how the new era of APM is helping companies reduce costs and grow their business, while building a better performing — and ultimately, more profitable — app.
Tags : 
new relic, mobile, mobile apps, mobile app performance, apm
    
New Relic
White Paper Published By: New Relic     Published Date: Jun 05, 2014
Configuration management (CM) tools like Puppet and Chef are really useful for keeping your systems in line, but what about your infrastructure? The Really Awesome New Cisco confIg Differ—or RANCID for short—is the first step in tackling this problem. Download to learn more!
Tags : 
new relic, devops, configuration management, rancid, networking
    
New Relic
White Paper Published By: New Relic     Published Date: Jun 05, 2014
The majority of IT professionals either don’t know anything about DevOps or just have a general understanding of the big picture. If you fall into either of those categories, this discussion is meant for you. In the following pages, we answer a number of basic questions—questions that probably sound much like your own.
Tags : 
new relic, devops, configuration management, it professionals, networking
    
New Relic
White Paper Published By: RF Code     Published Date: May 28, 2014
RF Code helped Digital Fortress identify a failing CRAC unit before it burned out. After 10 days Digital Fortress was able to drop SLA temperatures on the datacenter floor by better than 11 degrees.
Tags : 
rf code, data center, ethernet, networking, power supply
    
RF Code
White Paper Published By: RF Code     Published Date: May 28, 2014
As companies continue to absorb the flow of electronic data in astronomical quantities, greater attention is being paid to the infrastructure that holds the data and the escalating costs of its management.
Tags : 
rf code, asset management, it asset management, data center, servers
    
RF Code
White Paper Published By: Aruba Networks     Published Date: May 22, 2014
Smartphone e tablet sono diventati parte integrante della nostra vita. La #GenMobile, una nuova categoria di persone accomunate dalla preferenza per tutto ciò che è mobile, non e’ costretta alla staticita’ per poter utilizzare le applicazioni lavorative sugli smartphone e tablet. I luoghi di lavoro destinati alla #GenMobile devono essere progettati con sistemi Wi-Fi sicuri e ad alte prestazioni. Di seguito, cinque servizi Wi-Fi essenziali, che garantiscono alla #GenMobile un'esperienza di smartphone e tablet sicura.
Tags : 
aruba networks, mobile app experience, wi-fi networks, communication apps, video content
    
Aruba Networks
White Paper Published By: Aruba Networks     Published Date: May 22, 2014
La #GenMobile, con un numero sempre più crescente di dispositivi e app mobili, sta utilizzando le reti Wi-Fi aziendali in modi imprevedibili. App di unified communication come Microsoft Lync gestiscono connessioni voce peer-to-peer e flussi video, l'app fotografica su quasi ogni iPhone si sincronizza automaticamente su iCloud e i flussi di contenuto video sono diventati una parte fondamentale dell'esperienza Internet di tutti gli utenti su tutti i dispositivi. La collaborazione con app mobili richiede una WLAN sufficientemente intelligente da riconoscere Lync da YouTube e gestire tale traffico in modo appropriato. Di seguito, cinque suggerimenti per garantire un'esecuzione perfetta delle app mobili:
Tags : 
aruba networks, mobile app experience, wi-fi networks, communication apps, video content
    
Aruba Networks
White Paper Published By: McAfee     Published Date: May 22, 2014
Una Red Privada Virtual (VPN, Virtual Private Network) ofrece el mejor retorno sobre la inversión en el aseguramiento de las comunicaciones. Sin embargo, la falta de confiabilidad de enlaces de VPN es riesgosa para las comunicaciones críticas dentro de las organizaciones. Constantemente las redes disponibles suelen confiar en varios proveedores de servicio de Internet para garantizar siempre la conectividad y aumentar el ancho de banda. La aVPN (Augmented VPN) agrega todos los enlaces de proveedores de servicios de internet para obtener un único túnel de alta capacidad. La aVPN proporciona una manera simple y económica de crear conexiones rápidas, seguras y de alta capacidad entre sitios y garantizar la conectividad a Internet sin interrupciones. Con un diseño de uso fácil, la implementación no requiere un equipo especial, software o acuerdos igualitarios de proveedores de servicio de Internet
Tags : 
vpn, red privada virtual, firewall de próxima generación, mpls, bgp
    
McAfee
White Paper Published By: CenturyLink Technology Solutions     Published Date: May 22, 2014
Download “Hybrid IT: The Best of All Worlds” now, and learn how hybrid IT is the key to creating an agile infrastructure at your core.
Tags : 
centurylink, agile infrastructure, hybrid it, fiber optic, network infrastructure
    
CenturyLink Technology Solutions
White Paper Published By: CenturyLink Technology Solutions     Published Date: May 22, 2014
Read “Linedata Launches SaaS-Based Offering and Expands Global Reach with Markets Infrastructure” now, and learn how Linedata partnered with CenturyLink to expand its product offerings and achieve a global presence.
Tags : 
centurylink, agile it, it infrastructure, network infrastructure, data center
    
CenturyLink Technology Solutions
White Paper Published By: CenturyLink Technology Solutions     Published Date: May 22, 2014
”Read “Scrivantage Experiences Rapid Growth and Speeds Time to Market with CenturyLink” now, and learn how Scrivantage partnered with CenturyLink to attract new clients and promote growth.
Tags : 
centurylink, hybrid cloud, cloud computing, data center, infrastructure
    
CenturyLink Technology Solutions
White Paper Published By: HP     Published Date: May 21, 2014
The data center landscape is changing quickly, creating new options for IT architecture and physical facility design. When deciding if a containerized or modular solution is the right option for your data center, you need to consider the factors in this guide.
Tags : 
data center, modular data center, energy, power and cooling, infrastructure
    
HP
White Paper Published By: Kaspersky     Published Date: May 20, 2014
You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives
Tags : 
kaspersky, security, business security, hackers, antispam
    
Kaspersky
White Paper Published By: Kaspersky     Published Date: May 20, 2014
Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.
Tags : 
virtualization, kaspersky, virtualization security, cyberthreat, hackers
    
Kaspersky
White Paper Published By: BMC Software     Published Date: May 19, 2014
Analysts predict that soon, half of all new IT service desk tools will be adopted as cloud-based services. While shifting to an on-demand model can be a complex decision that requires organizations to carefully assess the potential impact on business operations, a growing number of companies are clearly finding the move worthwhile.
Tags : 
saas, cloud, itsm, integrating itsm, itsm integration
    
BMC Software
White Paper Published By: BMC Software     Published Date: May 19, 2014
Increasingly, enterprise organizations are moving to the cloud for IT Service Management (ITSM)—but is cloud delivery right for your business? Learn about the changing face of ITSM and gain the perspective needed to make the right ITSM decision for your organization. Get the free white paper from Enterprise Management Associates.
Tags : 
bmc, itsm solutions, changing business, cloud, cios
    
BMC Software
White Paper Published By: Hewlett-Packard Company     Published Date: May 15, 2014
HP ProLiant Gen8 servers support automated management and proactive monitoring— and HP is offering financial terms for purchase or lease to SMBs deploying them. For these reasons, HP ProLiant Gen8 servers can play an important role in supporting business continuity and can serve as a key element of business protection programs that are designed to reduce operational costs in today's midsize and large businesses.
Tags : 
proliant gen8, business continuity, networking, storage, data management
    
Hewlett-Packard Company
White Paper Published By: Entrust     Published Date: May 15, 2014
Multipurpose Smartcards, USB Tokens & Mobile Smart Credentials
Tags : 
entrust, identityguard, smart credentials, certificate based security, security
    
Entrust
White Paper Published By: Entrust     Published Date: May 15, 2014
Certificate Discovery & Management Solution
Tags : 
entrust, identityguard, pki, certificate based security, security
    
Entrust
White Paper Published By: Entrust     Published Date: May 15, 2014
Securing Mobile Identities & Devices
Tags : 
entrust, identityguard, pki, certificate based security, security
    
Entrust
White Paper Published By: Entrust     Published Date: May 15, 2014
Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI). Entrust’s cloud-based PKI service eliminates up-front capital investment and significantly reduces on-going operation cost associated with in-house PKI software, provides built-in maintenance capabilities and speeds deployment time.
Tags : 
entrust, identityguard, pki, certificate based security, security
    
Entrust
White Paper Published By: Entrust     Published Date: May 15, 2014
The use of non-fully qualified domain name (FQDN) certificates is being deprecated by November 1, 2015. Existing certificates containing non-FQDN names will be revoked by all public CAs by October 1, 2016. Entrust provides a straightforward option that allows the continued use of non-registered names by deploying cost-effective Entrust Private SSL Certificates.
Tags : 
entrust, ssl, ecommerce, extended validation, digital certificates
    
Entrust
White Paper Published By: Entrust     Published Date: May 15, 2014
On November 22, 2011, the CA/Browser Forum adopted “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.0” (hereafter referred to as the “BR 1.0”) to take effect on July 1, 2012. This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : 
entrust, non fqdns, certificates, forum changes, publicly trusted certificates
    
Entrust
White Paper Published By: Entrust     Published Date: May 15, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly. Entrust IdentityGuard Cloud Services SSL is a self-service application designed to streamline certificate management while providing secure certificates from a trusted brand in online security.
Tags : 
entrust, ssl, ecommerce, extended validation, digital certificates
    
Entrust
White Paper Published By: Entrust     Published Date: May 15, 2014
Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions. Whether it's a basic SSL certificate, more advanced EV multi-domain SSL certificates, or specialty certificates for secure email, code-signing or Adobe PDFs, Entrust offers a comprehensive portfolio of today's most-used digital certificates. And all are supported by Entrust's world-class service.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome
    
Entrust
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search Research Library      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.