Home > Research Library > Technology > Networking

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 76 - 100 of 2584Sort Results By: Published Date | Title | Company Name
White Paper Published By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : 
lumension, persistent threats, information security, it regimes, threat solution
    
Lumension
White Paper Published By: Lumension     Published Date: Feb 07, 2014
Being able to compare the impact of application control and traditional anti-virus solutions could help you improve your server's performance and security.
Tags : 
lumension, server performance, server security, application control, anti-virus solutions
    
Lumension
Webinar Published By: Lumension     Published Date: Feb 07, 2014
Sit in on an expert panel discussion about the concerns of cyber security for businesses.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks
    
Lumension
White Paper Published By: Liaison Technologies     Published Date: Feb 07, 2014
Businesses and their IT departments are increasingly looking into the Cloud to drive innovation and increase business agility. Are you on the cloud?
Tags : 
liaison, the cloud, cloud computing, hybrid approach, hybrid business
    
Liaison Technologies
White Paper Published By: Liaison Technologies     Published Date: Feb 07, 2014
Data integration and management can pave the way for quick realization of M&A success and time-to-value for every transaction. Have you looked into M&A?
Tags : 
liaison, data integration, data management, it resources, business continuity
    
Liaison Technologies
White Paper Published By: Liaison Technologies     Published Date: Feb 07, 2014
Big Data holds the promise of a virtually unlimited ability to gain insight – and foresight – to sharpen strategies and improve tactical execution but only if it can be harnessed and managed. Through this whitepaper, you can learn how.
Tags : 
liaison, data integration, data management, it resources, business continuity
    
Liaison Technologies
White Paper Published By: LogMeIn     Published Date: Jan 29, 2014
This guide details the factors that impact the purchasing decision of a remote support tool and provides a checklist for use as you work through your remote support solution selection process.
Tags : 
remote support, solution, complex, communication, sophistication
    
LogMeIn
White Paper Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Applications are the lifeblood of any business. If you spent time or budget to develop or acquire an application, then it’s important—and it should work. However, tectonic shifts in technology are making it increasingly difficult to achieve this simple objective. Today, the majority of applications are accessed via the web and cloud become the preferred application development platform. Against this backdrop of change, the sheer volume of applications is staggering. Given these rapid, drastic changes, organizations are left to grapple with how to deliver applications in a secure, timely, and reliable manner. Read this whitepaper to learn how your business can tackle this feat by implementing a new architectural vision for delivering application services.
Tags : 
f5 networks, f5 synthesis, applications, constraint, application performance
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Cloud computing and the "bring your own device" (BYOD) trend will impact the design of future datacenters and their supporting networks. To attain the kind of business agility that companies now demand, network infrastructure needs to provide the flexibility required by cloud application workloads and the changing traffic patterns fostered by BYOD. To make networks more agile, new approaches to network implementation need to be enabled. As these trends continue, application delivery controllers (ADCs) will be critical elements in the new network infrastructure. This Technology Spotlight examines these trends and the role that F5 Networks' integrated scalable platform plays in this strategic market.
Tags : 
f5 networks, idc, cloud, cloud computing, bring your own device
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Information technology is at a crucial turning point. Enterprise IT departments are under constant pressure to meet user and application demands, aware that cloud deployments offer an easier and faster alternative but often pinned down by legacy deployment models. The problem stems from the inability of those legacy models to adapt to meet expectations for rapid provisioning, continuous delivery, and consistent performance across multiple environments. Read this whitepaper to learn more about the evolution of application delivery and the services your enterprise can utilize to successfully manage the increased pressure on network and application infrastructure.
Tags : 
f5 networks, f5 software, software defined application services, application services, application layer
    
F5 Networks Inc
White Paper Published By: hightail     Published Date: Jan 17, 2014
Learn 6 tips and tricks that can help you better organize and utilize your email in order to increase productivity and improve your workflow.
Tags : 
knowledge management, enterprise applications, security management, email archiving, cloud computing
    
hightail
White Paper Published By: hightail     Published Date: Jan 17, 2014
Learn how the method of data collection and storage has changed and learn the 4 essential stages of managing your content in the digital age.
Tags : 
enterprise applications, data management, secure content management, cloud computing
    
hightail
White Paper Published By: hightail     Published Date: Jan 17, 2014
Learn 3 essential values for securing the cloud and see how you can better prioritize security and improve your organization’s productivity.
Tags : 
knowledge management, data management, mobile computing, mobile data systems, application integration
    
hightail
White Paper Published By: hightail     Published Date: Jan 17, 2014
Learn 5 ways the cloud will enhance your professional life in 2014 and how understanding the technology will improve how organizations store and share files.
Tags : 
data management, security management, mobile computing, mobile data systems, application integration
    
hightail
White Paper Published By: IBM     Published Date: Jan 09, 2014
According to Dr. Barry Devlin of 9sight Consulting, the truth behind all the talk about big data and the possibilities it can offer is not hard to see, provided that organizations are willing to return to the principles of good data management processes.
Tags : 
ibm, big data, 9sight consulting, data, it management
    
IBM
White Paper Published By: F5 Networks Inc     Published Date: Jan 03, 2014
Today, the expanding boundaries of computing make it imperative for IT to ensure responsive systems. As a result, a confluence of technological advances has shifted the dynamics of application performance, putting a greater pressure on IT to improve application performance. Download this whitepaper to learn about new technologies that are in the marketplace that will help your business tackle this new demand.
Tags : 
cloud, mobility, productivity, application, application performance
    
F5 Networks Inc
White Paper Published By: IBM     Published Date: Jan 02, 2014
This study highlights the phases of the big data journey, the objectives and challenges of midsize organizations taking the journey, and the current state of the technology that they are using to drive results. It also offers a pragmatic course of action for midsize companies to take as they dive into this new era of computing.
Tags : 
ibm, analytics, global business service, big data, business value
    
IBM
White Paper Published By: Verint     Published Date: Nov 19, 2013
Companies have a wealth of customer data—but they often have difficulty consolidating and analyzing it to gain strategic advantage. This paper examines how organizations can apply text analytics to analyze information captured in customer interactions, and use it to enhance customer service while gaining a variety of business advantages.
Tags : 
verint, text analytics, social media, chat interactions, email
    
Verint
White Paper Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This white paper examines the DDoS threat spectrum including conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
Tags : 
distributed denial of service, ddos, ddos threat spectrum, network attacks, conventional network attacks
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This whitepaper utilizes end-user interviews to better understand their DDoS defense plans, where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and explains the basic process required to have a chance of defending against a DDoS attack.
Tags : 
denial of service, distributed denial of service, ddos, ddos attacks, denial of service attacks
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Oct 31, 2013
Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.
Tags : 
distributed denial of service, ddos, mitigation, f5 technology, taxonomy
    
F5 Networks Inc
White Paper Published By: Comcast     Published Date: Oct 17, 2013
Ethernet Gains World Domination By Being Better, Faster, and Cheaper Than Other Networks Protocols
Tags : 
comcast, ethernet primer, enterprise intranet, production lan, networking
    
Comcast
White Paper Published By: Comcast     Published Date: Oct 17, 2013
Learn how Ethernet has grown from a little-known networking protocol to the industry standard and is the best way for your IT team to cut costs, while increasing productivity.
Tags : 
comcast, ethernet primer, enterprise intranet, production lan, ethernet
    
Comcast
White Paper Published By: Riverbed     Published Date: Sep 19, 2013
Unified communications (UC) is a powerful technology with a multifaceted value proposition. UC can significantly reduce the cost of communications but more importantly raises productivity by streamlining the collaboration process. Download now to read how UC can increase your company productivity.
Tags : 
riverbed, unified communications, ip networks, mobile workers, smartphones
    
Riverbed
White Paper Published By: Riverbed     Published Date: Sep 17, 2013
Learn how Riverbed® OPNET Unified Communications Xpert™ (UC Xpert) software provides end-to-end service management for Unified Communications and remote troubleshooting.
Tags : 
riverbed, service management, ip communications, ip networks, ip telephony
    
Riverbed
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search Research Library      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.