Home > Research Library > Technology > Networking

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 251 - 275 of 2713Sort Results By: Published Date | Title | Company Name
White Paper Published By: Logicalis     Published Date: Mar 12, 2014
How your data center is fleecing your company (without you even knowing it’s happening) And how you can make it stop
Tags : 
logicalis, modular computing, data optimization, cloud computing, networking
    
Logicalis
White Paper Published By: Logicalis     Published Date: Mar 12, 2014
Steps you can take for a successful network rationalization exercise, and how to make a business case for the project.
Tags : 
logicalis, modular computing, data optimization, cloud computing, network rationalization
    
Logicalis
White Paper Published By: Logicalis     Published Date: Mar 12, 2014
We are pleased to present the findings of The Impact of IT Transformation on Enterprise Computing sponsored by Logicalis and HP. The objective of this research is to better understand how the different stages of IT transformation can affect an organization, the challenges of advancing through each stage and how successful progression can improve an organization’s IT effectiveness.
Tags : 
logicalis, it transformation, it strategy, it budget, it solutions
    
Logicalis
White Paper Published By: Progress Software     Published Date: Mar 12, 2014
For IT managers, choosing the wrong vendor can lead to disruption, high costs, and the loss of confidence from within the business. Learn how to de-risk your vendor selections by aligning with market trends.
Tags : 
progress software, choosing vendors, datadirect, connectivity, saas applications
    
Progress Software
White Paper Published By: Progress Software     Published Date: Mar 12, 2014
Big data and cloud data are still hurling outward from the “big bang.” As the dust settles, competing forces are emerging to launch the next round of database wars—the ones that will set new rules for connectivity. Progress® DataDirect Cloud™ is well positioned to help organizations establish data control amid the chaos. How? Information workers at all levels require easy access to multiple data sources. With a premium cloud based connectivity service, they can count on a single, standardized protocol to inform their most business critical applications.
Tags : 
progess software, datadirect, big data, cloud computing, connectivity
    
Progress Software
White Paper Published By: Progress Software     Published Date: Mar 12, 2014
This paper examines the trends that are driving the cloud and other computing innovations. It explains how platform as a service (PaaS) provides a new development platform to deliver the applications businesses need.
Tags : 
progress software, isv business model, cloud computing, paas, saas
    
Progress Software
White Paper Published By: Progress Software     Published Date: Mar 12, 2014
This report outlines Forrester's vision for the future of business applications. It summarizes the key business drivers and trends that are reshaping the value proposition of business applications.
Tags : 
progress software, future business, forrester, business applications, increase flexibility
    
Progress Software
White Paper Published By: Logicalis     Published Date: Mar 07, 2014
Learn the top trends and concerns for choosing the right infrastructure-as-a-service (IaaS) provider.
Tags : 
logicallis, iaas, security, compliance, cloud
    
Logicalis
White Paper Published By: SingTel     Published Date: Mar 07, 2014
Data connectivity has long been a necessity for enterprises big and small, as has the need to use that connectivity to extend enterprise Local Area Network (LAN) across networks. But the process of building an enterprise Wide Area Network (WAN) is anything but easy.
Tags : 
singtel, vpn, wan, lan, infrastructure
    
SingTel
White Paper Published By: SingTel     Published Date: Mar 07, 2014
Examine the three broad challenges that Financial Services Institutions (FSIs) face today: compliance and risk management, consolidation and innovation. To address these effectively, FSIs require an Information and Communication Technology (ICT) infrastructure that offers both the security and reliability of their legacy communications systems as well as the flexibility and scalability that new generation networks provide, in order to adapt and innovate in the highly competitive financial services environment.
Tags : 
singtel, vpn, wan, lan, infrastructure
    
SingTel
White Paper Published By: SingTel     Published Date: Mar 07, 2014
There are now a variety of alternatives when it comes to connecting multiple sites with WAN links. Multi Protocol Label Switching is fast gaining popularity for many businesses as their preferred choice when it comes to creating a Virtual Private Network (VPN) over WAN. This paper will discuss the differences between MPLS and IPSec, and the benefits achieved from migrating to MPLS.
Tags : 
singtel, vpn, wan, lan, infrastructure
    
SingTel
Free Offer Published By: iNetU Managed Hosting     Published Date: Mar 06, 2014
Putting together an effective post-breach response plan can greatly reduce the costs and damage to the business inflicted by a breach. The following guide can help organizations get started.
Tags : 
managed hosting, cloud hosting, inetu, inet manahed hosting, data centers
    
iNetU Managed Hosting
White Paper Published By: Webroot Inc     Published Date: Mar 05, 2014
Learn the top 5 malware trends for 2014 and how your organization can best protect against hackers and cyber thieves.
Tags : 
malware, security, cyber thieves, malware trends, security systems
    
Webroot Inc
White Paper Published By: Webroot Inc     Published Date: Mar 05, 2014
In this white paper we will summarize the decline of Phishing 1.0, discuss how phishing has turned toward business and become more costly, outline the structure of new Phishing 2.0 attacks, delineate how the new campaigns evade standard antiphishing countermeasures, and describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.
Tags : 
phishing, campaigns, antiphishing, security, social media
    
Webroot Inc
White Paper Published By: Webroot Inc     Published Date: Mar 05, 2014
In this paper we look at 3 new approaches that can make antivirus effective and practical again, including client/cloud architecture, behavior recognition, and journaling and rollback Together, these three approaches represent a major rethinking of antivirus technology, a major shift in antivirus that creates a new type of technology that is able to detect and counter today’s Malware.
Tags : 
antivirus, journaling. rollback, behavior recognition, client/cloud, client/cloud architecture
    
Webroot Inc
White Paper Published By: Code 42     Published Date: Mar 04, 2014
Valuable enterprise data lives on endpoint devices, changes constantly and flows freely throughout organizations. But what happens when that data is inappropriately shared or breached because a business user adopts an unsafe consumer-based sync and share tool?
Tags : 
code 42 software, enterprise sync, share flexibility, share app, cloud strategies
    
Code 42
White Paper Published By: nettime solutions     Published Date: Mar 04, 2014
This whitepaper covers the best practices, methods and standards for time off accruals that are affecting PTO policies and will explain how a customizable, automated time and attendance platform can provide workforce analytics and labor management solutions.
Tags : 
nettime solutions, accruals, improving time, time off accruals, enhance pto policies
    
nettime solutions
White Paper Published By: Oracle     Published Date: Mar 04, 2014
In This Paper • Internal technology services that lack resources, rigor or efficiencies are prime candidates for the cloud • Understand the business and regulatory requirements around the data to be moved to the cloud • Know your cloud provider’s security and privacy commitments, and what responsibilities you retain
Tags : 
oracle, oracle cloud services, security, cloud provider, privacy
    
Oracle
White Paper Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature
    
FireEye
White Paper Published By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance
    
Smarsh
White Paper Published By: IBM     Published Date: Feb 27, 2014
Why should we bother automating deployments in the first place? What should the scope of the automation effort be? How do we get started? This white paper provides a solid introduction to these topics.
Tags : 
ibm, ibm software, deployment automation, manual deployments, automation
    
IBM
White Paper Published By: Limelight Networks     Published Date: Feb 20, 2014
Just 400 milliseconds - the blink of an eye - is too long for users to wait for a webpage to load. Discover the website performance bottlenecks that push visitors to your competition, and mitigation strategies that will drive marketing success.
Tags : 
limelight, webpage speed, acceleration, load time, marketing
    
Limelight Networks
White Paper Published By: Limelight Networks     Published Date: Feb 20, 2014
IT organizations need a new, better way to achieve superior website performance that will enhance, instead of undermine, customer engagement. This eGuide offers 7 principles for scaling your web infrastructure to meet availability and performance SLAs.
Tags : 
limelight, website availability, site speed, user experience, acceleration
    
Limelight Networks
White Paper Published By: Limelight Networks     Published Date: Feb 20, 2014
A slow website will impact the success of your marketing programs. This eGuide offers tips for marketing pros to bridge the gap between marketing strategy and IT reality to improve web performance and user experience.
Tags : 
limelight, website speed, website performance, user experience, lag time
    
Limelight Networks
White Paper Published By: Limelight Networks     Published Date: Feb 20, 2014
An evolving Internet architecture, the growth of dynamic content, and billions of connected devices are having a dramatic impact on web performance. This paper offers a new look at how content delivery and front-end acceleration can improve performance.
Tags : 
limelight, internet architecture, static content, dynamic content, devices
    
Limelight Networks
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search Research Library      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.