> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 76 - 100 of 1225Sort Results By: Published Date | Title | Company Name
White Paper Published By: Extreme Networks     Published Date: Aug 30, 2016
The goal of a Cloud-Managed Network is to make deployment, management and control over network infrastructure devices very easy, offset the need for trained IT staff at remote locations or for geographically dispersed organizations, and it provides both OpEx and CapEx savings. This comprehensive white paper provides you with information needed to successfully guide you through the decision-making process of determining the right network for your business.
Tags : 
extreme networks, networking, network, cloud, cloud networks
    
Extreme Networks
White Paper Published By: Extreme Networks     Published Date: Aug 30, 2016
Discover the 5 key justifications required to build a winning business case for your upgrade to the 802.11ac Wave 2 standard.
Tags : 
extreme networks, networking, wireless, wireless networking, 802.11ac wave 2
    
Extreme Networks
White Paper Published By: Kaminario     Published Date: Aug 23, 2016
Read this guide for three critical steps to maximize all-flash performance for your applications.
Tags : 
kaminario, flash, performance, storage, application performance
    
Kaminario
White Paper Published By: Kaminario     Published Date: Aug 23, 2016
Successful businesses are nimble and built to scale. At times you might need to grow your sales capacity by bringing more people on board. Other times you might simply need them to get more active, boosting performance. Sometimes you need to do both. To support the ebb and flow of your business your storage should be capable of scaling up capacity while increasing performance. Yet you might be surprised to know that only one All-flash vendor can do so, while keeping costs predictable. Read on to learn about 3 scalabity benefits that will transform your storage purchasing experienc
Tags : 
kaminario, flash, performance, storage, application performance
    
Kaminario
White Paper Published By: Kaminario     Published Date: Aug 23, 2016
Your three essential tips for building a smarter, more resilient storage strategy.
Tags : 
kaminario, flash, performance, storage, application performance
    
Kaminario
Webinar Published By: EMC Converged Platforms     Published Date: Aug 19, 2016
In this video, ESG analyst Colm Keegan discusses the new VCE VxRail. He explains the rationale for the product, where it fits in the VCE’s portfolio, and addresses the growing demand for HCI systems.
Tags : 
vce, esg, vxrail. hyper-converged, hci systems, networking
    
EMC Converged Platforms
Webinar Published By: EMC Converged Platforms     Published Date: Aug 19, 2016
A comprehensive overview of the VxRail hyper-converged appliance from Colin Gallagher, Senior Director of Product Marketing, VxRail, VCE.
Tags : 
vce, vxrail, product overview, hyper-converged, networking
    
EMC Converged Platforms
White Paper Published By: F5 Networks Inc     Published Date: Aug 16, 2016
With privacy breaches becoming increasingly common, many organizations look to SSL as a way to protect the integrity of their data online. However, the implementation of a comprehensive SSL strategy comes with its own challenges of visibility, performance and scale. Through proper planning and deployment, a strong SSL strategy mitigates the risk of breaches. Once the strategy is in place, the site will be positioned for future security, scalability, and reliability, putting the focus where it really matters--moving business forward.
Tags : 
ssl, ssl solutions, networking, privacy, security
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Aug 16, 2016
Download this white paper for an overview of SSL/TLS, its impact on the enterprise and the challenges associated with failing to inspect SSL/TLS traffic.
Tags : 
ssl, tsl, cyber threats, network security, security
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Aug 16, 2016
Together, VMware and F5 enable global IT leaders to empower the Anywhere Enterprise to deliver enterprise applications across all devices and clouds built on SDDC principles. Today VMware and F5 offer the most sophisticated, end-to-end solutions for mobility, application delivery and network security to help CTOs and CIOs: - Ensure unprecedented application agility with a software-defined infrastructure and application services platform; - Automate application delivery while ensuring performance, availability, scalability, efficiency and security; - Achieve simplified end-to-end networking through an application-centric approach.
Tags : 
anywhere enterprise, vmware, enterprise it, application agility, software-defined infrastructure
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Jul 22, 2016
The new matrix of technology deployment for IT is a real challenge—handling both customer-facing issues and internal, departmental challenges.
Tags : 
f5 networks, cisco, devops, software-defined networks, sdn
    
F5 Networks Inc
White Paper Published By: IBM     Published Date: Jul 14, 2016
Focusing on SaaS, this IDC report details considerations to help optimize your cloud security model to align with business requirements.
Tags : 
ibm, idc, ciso, cloud security, saas
    
IBM
White Paper Published By: IBM     Published Date: Jul 14, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : 
ibm, security, cloud applications, cloud, cloud-based threats
    
IBM
White Paper Published By: IBM     Published Date: Jul 08, 2016
In our 21-criteria evaluation of the dynamic case management (DCM) market, we identified the 14 most significant software vendors — Appian, bpm’online, Column Technologies, DST Systems, Eccentex, IBM, Isis Papyrus, Lexmark Enterprise Software, MicroPact, Newgen Software, OnBase by Hyland, OpenText, Pegasystems, and TIBCO Software — and researched, analyzed, and scored them. The evaluation focused on providers’ adaptive, analytics, and mobile features, all critical to helping enterprises tackle increasing volumes of varied and unstructured work. This report helps enterprise architecture (EA) professionals select the best providers to meet their unique needs.
Tags : 
ibm, forrester, forrester wave, dynamic case management, dcm
    
IBM
Webinar Published By: IBM     Published Date: Jul 07, 2016
Now in V8.7 of IBM Operational Decision Manager, IBM ODM Advanced applies insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. With IBM Operational Decision Manager Advanced, you gain scope, scale, speed, and simplicity. You can now capture events, build context, and apply it to operational decisions in real-time. This helps detect situations as they occur – presenting risks or opportunities – to enable action.
Tags : 
ibm, odm, middleware, ibm operational decision manager, application services
    
IBM
White Paper Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup
    
Commvault
White Paper Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access
    
Commvault
White Paper Published By: Commvault     Published Date: Jul 06, 2016
Today, nearly every datacenter has become heavily virtualized. In fact, according to Gartner as many as 75% of X86 server workloads are already virtualized in the enterprise datacenter. Yet even with the growth rate of virtual machines outpacing the rate of physical servers, industry wide, most virtual environments continue to be protected by backup systems designed for physical servers, not the virtual infrastructure they are used on. Even still, data protection products that are virtualization-focused may deliver additional support for virtual processes, but there are pitfalls in selecting the right approach. This paper will discuss five common costs that can remain hidden until after a virtualization backup system has been fully deployed.
Tags : 
storage, backup, recovery, best practices, networking
    
Commvault
White Paper Published By: Commvault     Published Date: Jul 06, 2016
Unsanctioned file sharing creates serious security and regulatory compliance issues. Read this infographic to learn how to sync, share and control data securely!
Tags : 
commvault, data security, protecting corporate data, commvault file sharing, virtual host costs
    
Commvault
White Paper Published By: Commvault     Published Date: Jul 06, 2016
Data conversations continue to change as all businesses are trying to figure out today's reality of the move to the cloud, anywhere/anytime computing, and the explosive growth of data. These trends have drastically reshaped the IT industry and data management forever. With continued market innovations in storage, cloud, and hyper-converged infrastructures, there are six key modern IT needs that are increasingly the focus of CIO and technology leaders.
Tags : 
commvault, modern data protection, data security, storage, cloud
    
Commvault
White Paper Published By: Commvault     Published Date: Jul 06, 2016
Enterprises today increasingly turn to array-based snapshots and replication to augment or replace legacy data protection solutions that have been overwhelmed by data growth. The challenge is that native array snapshot tools – and alternative 3rd party solutions – have varying degrees of functionality, automation, scripting requirements, hardware support and application awareness. These approaches can add risk as well as administrative complexity and make it more difficult to realize the full potential of snapshots – whether in single disk vendor estates or in heterogeneous storage environments. This checklist will enable you to build a shortlist of the 'must have' features needed for snapshots to deliver exactly what you require in your application environment or Private Cloud.
Tags : 
commvault, snapshot management, replication, array based snapshots, data protection solutions
    
Commvault
White Paper Published By: IBM     Published Date: Jul 06, 2016
Why good mobile apps are not good enough: Measure and move your mobile app to greatness
Tags : 
ibm, mobile, applications, apps, mobile apps
    
IBM
White Paper Published By: IBM     Published Date: Jul 06, 2016
Download to learn: - What continuous engineering is - How to continuously improve complex product designs - How to anticipate and respond to markets and clients - How to get the most out of your engineering resources
Tags : 
ibm, watson, iot, internet of things, product development
    
IBM
White Paper Published By: IBM     Published Date: Jul 06, 2016
Download this paper to learn: - What systems engineering is - How systems engineering can help you develop smart, connected products - Help expedite time-to-market, ensure business agility, and deliver high-quality smart products - How to cut costs
Tags : 
ibm, watson, iot, internet of things, product development
    
IBM
White Paper Published By: IBM     Published Date: Jul 06, 2016
Discover how to transform your engineering processes and tools to gain a competitive advantage from the Internet of Things
Tags : 
ibm, watson, iot, continuous engineering, internet of things
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.