> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 476 - 500 of 1256Sort Results By: Published Date | Title | Company Name
Webinar Published By: IBM     Published Date: May 07, 2015
In this On Demand session learn about using cloud-based social collaboration tools to streamline key areas of your business, increasing time to invest in new product development. Hear how one manufacturer turned to an IBM Business Partner to implement IBM SmartCloud Connections.
Tags : 
cloud technologies, social collaboration tools, ibm, networking, it management
    
IBM
Webinar Published By: IBM     Published Date: May 07, 2015
Register now and get ready for an extreme mail makeover: re-imagined for the future of work. Register now!
Tags : 
email, social technologies, ibm, cloud, networking
    
IBM
White Paper Published By: Tyco Integrated Security     Published Date: May 05, 2015
With security management apps, you can better protect your livelihood -- wherever and whenever you want.
Tags : 
mobility, mobile devices, networking, security, it management
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: May 05, 2015
52 percent of all businesses are likely to be victimized within the next three years. Download this white paper top learn how accessible, easy-to-use solutions can help lower security costs and give you peace of mind.
Tags : 
small businesses, affordability, security, accessibility, networking
    
Tyco Integrated Security
White Paper Published By: Red Hat     Published Date: May 05, 2015
In this Forrester report: How the infrastructure/operations (I&O) role changes in a hybrid cloud world. How they accelerate the cloud application delivery life cycle to exceed business expectations of cloud & Which management capabilities must be mastered to take on the role of hybrid cloud manager.
Tags : 
red hat, forrester, hybrid cloud, management, developers
    
Red Hat
White Paper Published By: Dell     Published Date: May 04, 2015
Replacing an aging desktop fleet is an important investment in your business. Faster and more reliable systems that offer the latest technology provide your employees an opportunity to be more productive with less waiting while they work. New desktops also benefit your IT staff, with significantly lower power costs and support for out-of-band management to reduce costly desk side visits.
Tags : 
performance, repair, aging desktops, desktop replacement, employee productivity
    
Dell
White Paper Published By: Sightline Systems     Published Date: Apr 29, 2015
The purpose of this article is to provide the performance analyst with a systematic approach to performance evaluation and point out some common mistakes that can be avoided.
Tags : 
performance evaluation, performance analyst, performance metrics, evaluation technique, networking
    
Sightline Systems
White Paper Published By: QTS Data Centers     Published Date: Apr 28, 2015
In this white paper, 451 Research looks into the cloud to see what’s driving the purchase of cloud security technologies.
Tags : 
cloud security, macro trends, budget trends, compliance, security pain points
    
QTS Data Centers
White Paper Published By: Riverbed     Published Date: Apr 24, 2015
Download this infographic to see the advantages of using SteelHead SaaS and Microsoft Office 365.
Tags : 
steelhead saas, microsoft office 365, network latency, app delivery, networking
    
Riverbed
White Paper Published By: Riverbed     Published Date: Apr 24, 2015
Enterprise IT has gone through several waves of evolution since the birth of computing. The computing platform has evolved from mainframe computing to minicomputers, shifted to client/server computing, and finally moved to Internet computing in the cloud era. Read this white paper to learn more about the need for location-independent computing.
Tags : 
hybrid enterprise, location-independent computing, enterprise it, computing platform, cloud computing
    
Riverbed
White Paper Published By: Riverbed     Published Date: Apr 24, 2015
Read this white paper to learn how to turn your network into an enabler of your hybrid enterprise, increase reliability, and reduce costs with Riverbed SteelHead hybrid networking.
Tags : 
riverbed steelhead, hybrid network, saas, user experience, reliability
    
Riverbed
White Paper Published By: Riverbed     Published Date: Apr 24, 2015
Riverbed Technology has been addressing performance issues on private and cloud enterprise networks with Steelhead wide-area network (WAN) optimization. Since 2012, Riverbed has applied its technology to Office 365 and Salesforce with Riverbed® Steelhead® Cloud Accelerator. Steelhead Cloud Accelerator combines WAN and Internet optimization to ensure bandwidth reductions and a superior user experience.
Tags : 
microsoft office 365, riverbed technology, wide area network optimization, salesforce, cloud
    
Riverbed
White Paper Published By: Riverbed     Published Date: Apr 24, 2015
Ebook covering best practices and utilization of network monitoring and troubleshooting.
Tags : 
network monitoring, troubleshooting, integration, application performance, networking
    
Riverbed
White Paper Published By: Riverbed     Published Date: Apr 24, 2015
Read this white paper to learn 3 critical legacy application evaluation activities to ensure cloud migration success. Activity #1: Determine if there is a cost justification Activity #2: Conduct a cloud readiness study to better understand the business and technical factors Activity #3: Conduct a pre- and post-migration study to understand how the app will behave in the cloud
Tags : 
legacy application evaluation, cloud migration, cloud readiness, mobile, networking
    
Riverbed
White Paper Published By: Riverbed     Published Date: Apr 24, 2015
Read this white paper to learn how to: • Architect an integrated WAN to support evolving application deployment models using the Internet in concert with MPLS. • Create a WAN solution that can optimize traffic flows between the Internet and the MPLS for all applications and between both internal and external users. • Deploy a solution across all independent network services that can monitor, report, control and optimize end-to-end path forwarding for all endpoints.
Tags : 
enterprise wan, integrated wan, public cloud services, connectivity, application performance
    
Riverbed
White Paper Published By: Riverbed     Published Date: Apr 24, 2015
This brief focuses on performance gains when using SteelHead SaaS with Office 365 for multi-tenant cloud services.
Tags : 
steelhead saas, microsoft office 365, optimization, cloud services, networking
    
Riverbed
White Paper Published By: Riverbed     Published Date: Apr 24, 2015
To better serve business demands for information everywhere, enterprises must develop new strategies for optimizing multiple kinds of networks. Read this white paper to learn more about accelerating delivery of data, increasing employee productivity, and creating optimal user experiences by powering the hybrid enterprise.
Tags : 
data delivery, employee productivity, user experience, hybrid enterprise, networking
    
Riverbed
White Paper Published By: Basho     Published Date: Apr 13, 2015
Today’s consumers expect instant access to communications services whether they’re in the office, at home, or on the road. With data speeds increasing and international roaming costs decreasing, data usage is rapidly growing. Telecommunications Service Providers (TSPs) are under pressure to deliver more services to more people and approach 100% uptime all while lowering prices to consumers. Traditional relational databases can’t meet the requirements for massive scalability, availability, and fault tolerance that the rapid growth in data usage and rise of big data demands. Read this solution brief to learn how Riak excels at these. Riak is a distributed NoSQL database optimized for big data. Riak meets many of the challenges you may be facing with your own service operations systems.
Tags : 
riak, basho, telecommunications service provider, license fees, scalability
    
Basho
White Paper Published By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : 
myths, cyber, threat, intelligence, fact
    
Cyveillance
White Paper Published By: Appcito     Published Date: Apr 09, 2015
Elastic Load Balancing automatically distributes incoming web tra?c across multiple EC2 instances. With Elastic Load Balancing, you can add and remove EC2 instances as your needs change without disrupting the overall ?ow of information. If an EC2 instance fails, Elastic Load Balancing automatically reroutes the tra?c to the remaining running EC2 instances. If a failed EC2 instance is restored, Elastic Load Balancing restores the tra?c to that instance.
Tags : 
cloud architect, web traffic, elastic load balancing, information flow, load balancer
    
Appcito
White Paper Published By: IBM     Published Date: Apr 09, 2015
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts explore the complexities of mobile test environments, the value of the mobile device cloud, the unique role crowd sourcing can play, and how teams can leverage automation to help deliver quality apps.
Tags : 
mobile apps, mobile app testing, mobile device cloud, crowd sourcing, ibm
    
IBM
White Paper Published By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : 
data security, ibm, risk management, network security, security threat
    
IBM
White Paper Published By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : 
data security, ibm, converged network security, security risk, networking
    
IBM
White Paper Published By: IBM     Published Date: Apr 09, 2015
Access the latest Gartner Magic Quadrant for Intrusion Prevention Systems to learn more about IBM's position and the latest developments in the market.
Tags : 
magic quadrant, ibm, intrusion prevention systems, security, security risk
    
IBM
White Paper Published By: IBM     Published Date: Apr 09, 2015
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.
Tags : 
access management solution, ibm, security risk, security compliance, networking
    
IBM
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.