Home > Research Library > Technology > Networking

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 76 - 100 of 3355Sort Results By: Published Date | Title | Company Name
White Paper Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to properly empower your organization for mobile productivity and see how you can deploy and provision for this device-based access with improved security and management policies.
Tags : 
mobile productivity, mobile access, security, connectivity, byod
    
PulseSecure
White Paper Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to enable fast and secure network, cloud, and application access in order to maximize productivity for those employees who work remotely or are constantly travelling.
Tags : 
mobile connectivity, byod, device security, policy compliance, enduser
    
PulseSecure
Webinar Published By: IBM     Published Date: Apr 01, 2015
In this On Demand session learn about using cloud-based social collaboration tools to streamline key areas of your business, increasing time to invest in new product development. Hear how one manufacturer turned to an IBM Business Partner to implement IBM SmartCloud Connections.
Tags : 
cloud technologies, social collaboration tools, ibm, networking, it management
    
IBM
Webinar Published By: IBM     Published Date: Apr 01, 2015
Every day, emails flood our inbox: tasks are left undone, messages go unanswered, and meetings overwhelm us. Why does work have to be such hard work? The truth is, it doesn’t have to be. Join our video panel discussion and hear how IBM’s latest solution offers an easy way to take back control of your day. Using advanced design thinking, the latest in social analytics and delivered from the cloud to your mobile device or desktop, this new solution: • Understands your needs, working style and priorities—and anticipates what you need and when you need it. VP and Principal Analyst Alan Lepofsky of Constellation Research, will discuss the critical importance of re-assessing the way we are currently working and what the future of work holds. • Provides less clutter and more clarity with an interface that shows only what you need, so you can make quicker, smarter decisions. Hear Phil Gilbert, General Manager, IBM Software Group Design, explain how the IBM Design Studio developed an entirely new experience from the ground up. • Enables a shift from “me” to “we” through intelligent, secure and engaging social apps that foster real-time understanding, cooperation and communication. Jeff Schick, General Manager, IBM Enterprise Social Solutions, will talk about why information from our social networks is crucial for collaboration and innovation, and why email must evolve to accommodate it. As an added bonus, watch for details on becoming part of the beta! Register now and get ready for an extreme mail makeover: re-imagined for the future of work. Register now!
Tags : 
email, social technologies, ibm, cloud, networking
    
IBM
White Paper Published By: Network Instruments     Published Date: Apr 01, 2015
Big data projects are becoming reality for nearly every major enterprise. According to a recent survey, 49 percent of respondents say they are implementing, or likely to implement big data projects in the future. Twelve percent already have. With big data comes surprising impacts to your network. The 4 Steps to Surviving Big Data white paper will help you identify problems before they start.
Tags : 
big data, data projects, network performance, data management, network impact
    
Network Instruments
White Paper Published By: Network Instruments     Published Date: Apr 01, 2015
Ready to effectively monitor in the cloud? It’s time to go beyond vendor provided data and establish performance metrics and baselines that matter. The 3 Key Cloud Monitoring Metrics IT Brief helps you identify cloud monitoring challenges while providing the strategies to succeed.
Tags : 
cloud monitoring, cloud metrics, business analytics, performance monitoring, data
    
Network Instruments
Webinar Published By: CDW     Published Date: Mar 31, 2015
A wireless network is a platform for enabling enterprise-wide access to an organization's applications and data. Wireless infrastructure allows users to take the office with them wherever they go. The wireless network provides employees and guest workers with untethered access to voice, video, data and applications regardless of their physical location. With the influx of mobile devices and increase in Wi-Fi connections, organizations are already starting to see a paradigm shift to "wireless by default" and "wired by exception." Watch this video to see how our solution architects upgraded the Shawnee Mission School District's aging network infrastructure.
Tags : 
wireless network, networking, applications, data, infrastructure
    
CDW
White Paper Published By: CDW     Published Date: Mar 31, 2015
The stadium has long been a communal gathering place. The excitement of a live event bonds fans and teams together, and technology can enhance that visceral connection as well as expand the in-stadium experience to the outside world. Download this infographic to see how the right technology - deployed effectively - can make a major difference.
Tags : 
networking, stadium wifi, wi-fi, technology, customer experience
    
CDW
White Paper Published By: CDW     Published Date: Mar 31, 2015
As mobile computing becomes an increasingly important technology, the need for robust, reliable wireless networks is growing. In addition to enterprise-issued devices, users are bringing their own tablets and smartphones and demanding access to IT resources. Organizations need a wireless infrastructure that can support these demands. Our research shows that in addition to mobile demands, aging hardware is driving many organizations' wireless upgrade plans. Download this white paper to read more about the research.
Tags : 
wireless, infrastructure, wi-fi, mobile computing, byod
    
CDW
White Paper Published By: CDW     Published Date: Mar 31, 2015
A new Cisco Systems infrastructure provides Spencer-East Brookfield Regional School District with a robust, scalable foundation for future technology initiatives. Read this case study to find out how the district could effectively demonstrate the value that a smart IT investment could provide to its educational mission.
Tags : 
network, wifi, infrastructure, scaling, technology
    
CDW
White Paper Published By: Internap     Published Date: Mar 30, 2015
Selecting an Infrastructure-as-a-Service (IaaS) provider can be a complex exercise that involves an array of considerations including business needs, budget, and application requirements. Buyers frequently respond to this complexity by filtering vendors based on variables that are more easily comparable, usually product features, location, and price. By contrast, performance, which is a critical factor to ensuring fit with business needs and ultimately satisfaction with the service, is often ignored. Virtual machine (VM) performance can be challenging to assess because it can vary drastically across vendors, instance sizes and prices, as well as in terms of a particular application’s unique requirements.
Tags : 
infrastructure, benchmarking, cloud computing, database, storage management
    
Internap
White Paper Published By: Internap     Published Date: Mar 30, 2015
This white paper explores technologies and trends that are changing the colocation landscape and providing valuable benefits to businesses.
Tags : 
cloud computing, colocation, infrastructure, cloud computing, data center
    
Internap
Webinar Published By: OpenText     Published Date: Mar 27, 2015
When you have a global workforce, you need them to be able to work anytime, anywhere, no matter the type of project, so why restrict them to on-site applications only? Understanding what it takes to be more competitive, we’ve built OpenText Exceed VA TurboX to help you speed up your time to market and enable your global 24 x 7 workforce, all while helping you make better use of your computing resources through centralization.
Tags : 
opentext exceed va turbox, remote access, productivity, resources, networking
    
OpenText
Webinar Published By: OpenText     Published Date: Mar 27, 2015
Join Solutions Consultant expert, Erick Marroquin, as he looks at the enterprise and IT developments that have arisen since Exceed onDemand’s last release in 2011. He discusses how the changing landscape of the global workforce, the rising demand for compliance and intellectual property protection, and the critical need for organizations to be more competitive have inspired the new features of Exceed VA TurboX. Watch the webinar to understand: The basic differences between Exceed onDemand and our new Exceed VA TurboX solutions How Exceed VA TurboX’s unique features can improve performance from an end-user and administrative perspective How Exceed VA TurboX can extend your reach for remote UNIX/Linux application access and support your centralization initiatives
Tags : 
exceed ondemand, exceed va turbox, remote access, intellectual property protection, networking
    
OpenText
Webinar Published By: OpenText     Published Date: Mar 27, 2015
In this webinar, Product Manager Mark Wevers, teaches you about Exceed VA TurboX’s new web-based access portal, which provides centralized, managed access to all of your virtual desktops and applications. This webinar will cover both the end user and administrator experience, and will include topics such as: Launching and managing applications from the user dashboard Managing users, profiles, and security settings as an administrator Reporting and logging features System maintenance
Tags : 
access portal, user experience, exceed va turbox, applications, users
    
OpenText
White Paper Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data
    
CDW-Trend Micro
White Paper Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In today’s business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : 
endpoint security, data security, endpoint protection, enterprise protection, technology
    
CDW-Trend Micro
White Paper Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
New business models and employee work styles are adding pressure on existing endpoint security strategies. A recent survey shows most companies are dissatisfied with current approaches to endpoint security. As a result, most companies are eyeing vendor changes in the coming year. Download this infographic to learn more.
Tags : 
endpoint security, security policy, mobile devices, networking, security
    
CDW-Trend Micro
White Paper Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security
    
CDW-Trend Micro
White Paper Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Traditional security solutions can’t keep up with new trends in user behavior. Turning to point products to address discrete challenges only serves to increase complexity and may inadvertently leave gaps in your security. Plus, you need to consider how you will secure users as your IT philosophy progresses from on-premise to the cloud. To effectively counter today’s evolving threat landscape, you need a tightly woven mesh of security that consolidates your view across all layers of protection and all deployment models. Read this white paper to learn how Trend Micro Smart Protection Complete can protect your users.
Tags : 
user protection, security, cloud, endpoint, application
    
CDW-Trend Micro
White Paper Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
The targeted attacks and advanced threats that are increasingly used to breach enterprise networks are purpose-built to evade traditional defenses. Enterprises require an advanced approach to protection that identifies these attacks and enables organizations to prevent breaches and their costly consequences. Read this white paper to learn how the Trend Micro Custom Defense can prevent the collateral damage associated with targeted attacks and advanced threats.
Tags : 
custom defense, security threats, enterprise networks, intellectual property, networking
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : 
security threats, trend micro, security solutions, mobile devices, network
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : 
networking, security, it management
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro
Tags : 
trend micro, targeted attacks, security solutions, technology, networking
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro
Tags : 
mobile security, apps, cyber criminals, cyber security, trend micro
    
CDW-Trend Micro
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search Research Library      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.