Home > Research Library > Technology > Networking

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 1 - 25 of 3459Sort Results By:Published Date | Title | Company Name
Live Event Published By: destinationCRM.com     Published Date: Jun 17, 2015
Customers want to be recognized for their past business with your company and engageg in a way that makes sense for them. In this Best Practices Guide, we’ll take a look at how technology is enabling personalized conversations along the customer journey in a way that builds loyal, engaged customers and prospects.
Tags : 
customer communications, customer service, nurturing, customer conversation, ip telephony
    
destinationCRM.com
Live Event Published By: destinationCRM.com     Published Date: Jun 10, 2015
Delivering great customer experiences depends on consistency, accuracy, and convenience and this roundtable will focus on how to create and support a call center that balances inbound, outbound and intelligent call routing to make the most of the voice channel.
Tags : 
call center, call center routing, inbound ivr, ivr, ip networks
    
destinationCRM.com
Webinar Published By: Aternity     Published Date: May 20, 2015
“End User Experience Monitoring” or EUEM is used pervasively by vendors in the APM market. But comprehensive EUEM requires a deeper look. This 30-minute webinar that will help you navigate these EUEM landscape and learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring, but can often leave enterprise IT Ops teams blind to what their users are actually experiencing.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management
    
Aternity
White Paper Published By: Verisign     Published Date: May 19, 2015
To help meet the performance, availability and functional requirements of operating critical Internet infrastructure, Verisign developed its innovative DDoS mitigation platform, called Athena™.
Tags : 
ddos mitigation platform, internet infrastructure, cloud, athena, networking
    
Verisign
White Paper Published By: Verisign     Published Date: May 19, 2015
This data sheet shows how Verisign OpenHybrid architecture helps organizations protect their critical assets and applications across distributed environments from DDoS attacks. By integrating intelligence from existing security defenses, Verisign OpenHybrid ensures faster detection and mitigation of DDoS attacks, while providing increased visibility of DDoS threats across multiple environments such as datacenters and public clouds.
Tags : 
verisign openhybrid, asset protection, security defense, ddos attach mitigation, ddos threats
    
Verisign
White Paper Published By: Verisign     Published Date: May 19, 2015
This data sheet shows how the Verisign DDoS Protection Service and the Verisign OpenHybrid architecture works with and augments embedded security features available on the AWS platform to protect against complex and volumetric DDoS attacks. This enables customers to use a full suite of DDoS mitigation capabilities that can intelligently distinguish and filter DDoS attack traffic from legitimate traffic.
Tags : 
public cloud services, amazon web services, verisign ddos protection services, ddos mitigation, networking
    
Verisign
White Paper Published By: Verisign     Published Date: May 19, 2015
Download this infographic to see observations and insights about attack size and frequency derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and insights from iDefense Security Intelligence Services, from October-December 2014.
Tags : 
ddos attack trends, ddos protection services, security, networking, it management
    
Verisign
Case Study Published By: Verisign     Published Date: May 19, 2015
Download this case study to see why Verisign asserts that such adaptable and well-orchestrated DDoS attacks point to a rapidly evolving threat landscape, where asymmetries afforded to adversaries require rapid response and layered security defenses that can accommodate an ever-expanding array of attack vectors.
Tags : 
ddos attack, security defenses, attack vectors, networking, security
    
Verisign
White Paper Published By: Verisign     Published Date: May 19, 2015
This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services and the security research of Verisign iDefense Security Intelligence Services. It represents a unique view into the attack trends unfolding online for the previous quarter, including attack statistics and behavioral trends.
Tags : 
ddos trends, ddos attack mitigation, ddos protection services, behavioral trends, networking
    
Verisign
White Paper Published By: Verisign     Published Date: May 19, 2015
Download this white paper to see why the best approach for protecting your entire infrastructure is to supplement your organization’s security intelligence service with a cloud-based DDoS protection service. By moving toward a more holistic, proactive approach to addressing all potential DDoS security threats, you help ensure the availability and security of your business-critical network in today’s online-driven economy.
Tags : 
infrastructure protection, ddos threats, security threats, intelligence services, networking
    
Verisign
White Paper Published By: Verisign     Published Date: May 19, 2015
Download this white paper to see why organizations need to align their security approach and adopt a novel – yet proven – approach for striking a balance between availability and security of applications in the cloud.
Tags : 
security solution, cloud security, applications, security threat, hybrid cloud
    
Verisign
Webinar Published By: Verisign     Published Date: May 19, 2015
Watch this video to see how Verisign OpenHybrid architecture helps organizations protect their critical assets and applications across distributed environments from DDoS attacks.
Tags : 
verisign openhybrid, asset protection, security defense, ddos attach mitigation, ddos threats
    
Verisign
White Paper Published By: Aternity     Published Date: May 19, 2015
Read this new whitepaper to navigate through the End User Experience Monitoring (EUEM) landscape. Learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management
    
Aternity
Webinar Published By: Aternity     Published Date: May 19, 2015
Learn how Aternity redefines end user experience management in this series of brief videos.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management
    
Aternity
Case Study Published By: Aerohive     Published Date: May 19, 2015
The Leys School had an objective to provide pupils with a home-like IT experience.
Tags : 
wi-fi solutions, eduaction, aerohive wi-fi solution benefits, wi-fi network challenges, wi-fi experience
    
Aerohive
Case Study Published By: Aerohive     Published Date: May 19, 2015
This case study explores the solutions provided by choosing the controller-less wireless technology of Aerohive.
Tags : 
wi-fi solutions, eduaction, aerohive wi-fi solution benefits, wi-fi network challenges, wi-fi experience
    
Aerohive
White Paper Published By: Waterline Data     Published Date: May 18, 2015
In this report, Forrester Research recommends that application development and delivery (AD&D) professionals working on BI and big data initiatives get the best out of both by designing and integrating them in a flexible data platform.
Tags : 
waterline, big data, automation, cataloging, processing
    
Waterline Data
White Paper Published By: Waterline Data     Published Date: May 18, 2015
This analysis profiles products that can accelerate the shift toward business-user-oriented, visual, interactive data preparation.
Tags : 
waterline, big data, automation, cataloging, processing
    
Waterline Data
White Paper Published By: Waterline Data     Published Date: May 18, 2015
Information governance and master data management initiatives are complex and require participation from a broad range of enterprise constituents.
Tags : 
waterline, big data, automation, cataloging, processing
    
Waterline Data
White Paper Published By: Equinix     Published Date: May 18, 2015
This paper illustrates how organisations are becoming digital enterprises due to the technology implications of scale and volume.
Tags : 
technology, digital economy, network, become a digital enterprise, mobile
    
Equinix
White Paper Published By: IBM     Published Date: May 18, 2015
How "delivering fast" companies use DevOps to consistently deliver software every one-to-three weeks while also achieving high levels of quality and achieving business goals.
Tags : 
software delivery, software development, application development, devops, cycles times
    
IBM
White Paper Published By: Equinix     Published Date: May 18, 2015
Download this infographic to find out how to maximise the benefits of the cloud for your unique business needs.
Tags : 
cloud, power of the cloud, benefits of cloud, cloud computing, maximise benefits of cloud
    
Equinix
Case Study Published By: IBM     Published Date: May 18, 2015
TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused.
Tags : 
testing solutions, mobile testing, testing times, survey insights, release cycles
    
IBM
White Paper Published By: Aternity     Published Date: May 18, 2015
Download this whitepaper to learn the five reasons why End User Experience Management is much more than a dimension of APM.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management
    
Aternity
White Paper Published By: IBM     Published Date: May 18, 2015
This book defines the basics of application release and deployment, and provides best practices for implementation with resources for a deeper dive. Inside you will find: • Business and technical drivers behind automated application release and deployment • Evaluation guides • Success stories that utilize application release and deployment solutions
Tags : 
application delivery, application deployment, software delivery methods, deployment solutions, automated application release
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search Research Library      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.