Home > Research Library > Technology > Networking

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 1 - 25 of 2822Sort Results By:Published Date | Title | Company Name
Live Event Published By: Trifacta     Published Date: Sep 24, 2014
The popularity of the data lake architecture is rapidly growing. However, deriving value from the data lake, whether for data visualization, discovery of insights or advanced analytics, requires transforming data from a “mayhem” of varied raw data into shape ready for analysis. Join this analyst roundtable webinar on Wednesday, September, 24th, 2014 at 10:00 a.m. PT, and find out.
Tags : 
trifacta, hadoop, big data, data storage, data visualization
    
Trifacta
Live Event Published By: Cleversafe     Published Date: Sep 23, 2014
Capturing and analyzing information are only part of the big data equation. Businesses must store ingested data in a format that is accessible and resilient, yet still economical. Join Gigaom Research and our sponsor Cleversafe for “Big Storage for Big Data: The Right Storage Tools for the Job,” a free analyst webinar on Tuesday, September 23, 2014 at 10:00 a.m. PT.
Tags : 
cleversafe, big data, data analytics, data storage, storage
    
Cleversafe
White Paper Published By: New Relic     Published Date: Sep 17, 2014
So you’re ready to plunge headlong into DevOps. Right on! You’ve done your homework, and you realize that in order to keep up with the rapid pace of business today, you need to implement DevOps practices at your organization. Yet despite the obvious benefits, such as faster deployments and fewer failures, the rest of your organization may not be so enthusiastic. This eBook will help you familiarize yourself with the common barriers to DevOps adoption so that you can come up with ways to win over the skeptics—and get your organization’s DevOps movement rolling.
Tags : 
devops, benefits, deployments and fewer failures, successful transition, common barriers
    
New Relic
Webinar Published By: EMA     Published Date: Sep 16, 2014
Everyone knows that effective network management practices start with establishing a full foundational understanding of the network. But simply monitoring individual elements can only get you so far. Historically, going the next step requires manually building and maintaining the knowledge of how those disparate elements are connected and how they interact with one another to deliver applications and communications. In other words, you need to understand network-level dependencies.
Tags : 
enterprise management, network dependencies, network discovery tools, applications and communications, networking
    
EMA
White Paper Published By: Lenovo     Published Date: Sep 16, 2014
Virtual Desktop Infrastructure (VDI) works best for smaller centrally located user bases that share a core set of application and file needs. As the world moves to the web and the cloud, is VDI still a good fit for emerging mobility and BYOD needs for your agency? See this infographic to learn more about the tradeoffs, and what you can do to take advantage of emerging cloud solutions to drive improved mobile productivity across your entire organization.
Tags : 
vid, cloud alternatives, emerging mobility, mobile productivity, it management
    
Lenovo
White Paper Published By: IBM     Published Date: Sep 16, 2014
IBM’s new PowerLinux servers appeal to Linux buyers? Linux buyers are driven by the price advantages that Linux offers as compared with other operating environments (Linux is free open source code) Windows and Unix are chargeable licensed code). Linux buyers, therefore, look first and foremost at the total cost of acquisition of Linux based servers. Linux buyers also want rapid time to value (fast deployment); they often use decentralized procurement processes; they want their Linux servers to be simple to use and manage."
Tags : 
power-based systems, big data, linux, fast deployment, open source infrastructure
    
IBM
White Paper Published By: Centrify Corporation     Published Date: Sep 16, 2014
The major trends challenging IT organizations today are the increasing dissimilarities and hybridization of platforms inside and outside the organization. And the rush to deploy SaaS applications and the explosion in smart phone and tablet devices that users are bringing to work for personal productivity. This fractured identity environment results in significant management challenges for IT, and frustration and lower productivity for users forced to remember multiple usernames and passwords. Unified identity architecture ensures your on-premise Active Directory infrastructure can be securely leveraged to quickly bring servers (UNIX, Linux, and Windows), applications (on-premise, SaaS, and mobile) and endpoints (Mac and Mobile devices) into line with security best practice and compliance. This paper will cover the practical path of unified identity management across multiple platforms including data center, cloud, and mobile.
Tags : 
data center, cloud and mobile, saas applications, smart phone and tablet devices, directory infrastructure
    
Centrify Corporation
White Paper Published By: Centrify Corporation     Published Date: Sep 16, 2014
IT professionals are grappling with not one, but three revolutions at the same time. • First, cloud computing provides easy and dynamic access to information technology. • Next, the ecosystem of cloud-based SaaS applications has exploded thanks to cloud computing. • Finally, this SaaS ecosystem has helped power an even bigger boom of consumer-friendly mobile devices and apps that access SaaS. This Essential Guide examines the opportunities and challenges of empowering, yet controlling, user access to SaaS applications. Specifically, identity management as a service promises to simplify secure access, and management of SaaS applications while reducing password sprawl. This guide will also review how mobile computing has added to the complexity of managing access to both corporate data and SaaS, and additionally help evaluate the options available on the market.
Tags : 
saas, cloud computing, consumer-friendly, mobile devices, access to saas
    
Centrify Corporation
White Paper Published By: Cisco     Published Date: Sep 15, 2014
Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.
Tags : 
email, web security, quadrant, solutions, threats
    
Cisco
White Paper Published By: Sitecore     Published Date: Sep 15, 2014
Are too many technologies preventing you from having a single customer view? Find out the latest customer lifetime value trends in the new Forbes Insights report.
Tags : 
strategies, technology, customer, relationship, loyalty
    
Sitecore
White Paper Published By: CA Technologies     Published Date: Sep 11, 2014
This paper is a high-level outline of how application release operations will change in response to the cloud, and it defines the key ingredients needed to help ensure that your enterprise’s release operations for production applications don’t get left behind.
Tags : 
cloud, application release, enterprise release operations, application testing, application integration
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Sep 11, 2014
This paper provides a number of capabilities your organization should look for in a Service Virtualization solution, enabling your extended teams to get high quality applications to market faster, with lower cost and risk
Tags : 
service virtualization solution, application testing, getting applications to market, speeding up application delivery time, application integration
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Sep 11, 2014
This paper provides new methods to transform IT into a power node in the corporate network.
Tags : 
devops, service virtualization, business software, software development, application integration
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Sep 11, 2014
An executive brief on release automation and how it is meeting marketing demands for delivery of innovative, new application services.
Tags : 
release automation, application testing, speeding up application delivery, application integration, application performance management
    
CA Technologies
Case Study Published By: Cloudera     Published Date: Sep 10, 2014
Omneo, a Division of Camstar Systems, has built a supply chain cloud solution that runs on an enterprise data hub (EDH) from Cloudera. Omneo's EDH provides electronic device manufacturers with a holistic, comprehensive, and interactive solution that helps them resolve supply chain issues before they impact the customer experience, or worse yet, the bottom line. In this video, various members of the Omneo team will discuss the big data challenge in supply chain and manufacturing, their own technology problems and evaluation for a big data solution, the decision to go with Cloudera, and benefits delivered by their new supply chain cloud solution.
Tags : 
enterprise data hub, electronic device manufacturers, supply chain, customer experience, cloud solution
    
Cloudera
White Paper Published By: Riverbed     Published Date: Sep 05, 2014
Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach could place data at risk. A new kind of storage architecture allows IT to consolidate remote servers and data in the data center by decoupling storage from its server over any distance—even thousands of miles—and still get the same performance as if the storage remained local to the branch. Organizations can now consolidate remote infrastructure to increase security and ef?ciency, without adversely impacting end-user performance in branch of?ces.
Tags : 
consolidation, servers, remote, storage, isolated islands
    
Riverbed
White Paper Published By: Riverbed     Published Date: Sep 05, 2014
The explosion in mobility and the increasing number of ways to connect with the corporate network has created an IT environment that is increasingly difficult to manage, and that leads to inconsistent user experience. Mobile WAN optimization can help overcome many of the challenges of running a distributed environment by improving the performance of critical enterprise applications, which lowers the cost of effectively supporting mobile workers and eliminates the need for many organizations to pursue expensive strategies and upgrades.
Tags : 
mobile, wan optimization, cut costs, it environment, user experience
    
Riverbed
White Paper Published By: Riverbed     Published Date: Sep 05, 2014
The branch office has long been a critical dilemma for the IT organization. Branch offices for many organizations are a critical point of productivity and revenue generation, yet the branch has always come with a tremendous amount of operational overhead and risk. Worse yet, challenges are often exacerbated because the branch office too often looks like a carryover of outdated IT practices.
Tags : 
convergence, branch office, tco, transforming, operational overhead
    
Riverbed
White Paper Published By: Riverbed     Published Date: Sep 05, 2014
Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach is costly and places data at risk. However, a new branch converged infrastructure architecture allows IT to consolidate in the branch office to minimize the IT footprint needed to run branch applications-all the while centralizing remote servers and data in the data center.
Tags : 
branch, infrastructure, lower costs, consolidation, servers
    
Riverbed
White Paper Published By: Brocade Communications Systems     Published Date: Sep 05, 2014
The arrival of virtualization, cloud computing, and mobility has strained data center networks—and IT staff—like never before. This Market Spotlight explains how data center network fabrics provide a foundation for automated provisioning, configuration, and management of network-based services in a new era of IT agility.
Tags : 
network automation, virtualization, cloud computing, agility, network-based
    
Brocade Communications Systems
White Paper Published By: Brocade Communications Systems     Published Date: Sep 05, 2014
Deploying the right Ethernet fabric is key for any organization, but selecting one can be daunting. Fortunately, the Lippis guide “Top 6 Recommendations for Selecting an Ethernet Fabric” provides insight and deployment tips based on the results of a recent study.
Tags : 
ethernet, fabric, deployment tips, recommendations, selecting
    
Brocade Communications Systems
White Paper Published By: CradlePoint     Published Date: Sep 04, 2014
In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.
Tags : 
cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering
    
CradlePoint
White Paper Published By: McAfee     Published Date: Sep 04, 2014
Sepa cómo gestionar el riesgo hoy significa comprender más los datos: análisis de vulnerabilidad, registros de aplicaciones y bases de datos, flujos, registros de acceso y sesiones, alertas y análisis de tendencias.
Tags : 
arquitectura de seguridad conectada, big security data, big data, administración de registros, administración de logs siem
    
McAfee
White Paper Published By: McAfee     Published Date: Sep 04, 2014
SANS Institute analizó cómo se puede evitar los ataques de red utilizando una plataforma de SIEM que combina datos históricos con datos en tiempo real de fuentes de red y políticas de seguridad para obtener informes mejores y más precisos.
Tags : 
siem, sans, endpoint, red, correlación
    
McAfee
White Paper Published By: McAfee     Published Date: Sep 04, 2014
El equipo de análisis de SANS Insitute examinó el software McAfee ESM, con enfoque específicamente en las aplicaciones de SIEM y observó un “sistema de SIEM fácil de usar capaz de ejecutar un análisis de eventos amplio y profundo, además de ofrecer una evaluación rápida”.
Tags : 
siem, almacenamiento de datos, análisis de datos, ataques, análisis forense
    
McAfee
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search Research Library      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.