> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 1 - 25 of 1225Sort Results By: Published Date | Title | Company Name
White Paper Published By: AMD     Published Date: Jul 20, 2012
Business agility be defined as a company's ability to respond to changes in business conditions quickly enough to benefit from them.
Tags : 
virtualization, it support, it management, data managemtn, cloud computing
    
AMD
White Paper Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal
    
ForeScout
Case Study Published By: Cleversafe     Published Date: Dec 07, 2012
Shutterfly and Cleversafe Partner for Big Data Performance, Availability and Reliability to Meet Growing Customer Needs
Tags : 
shutterfly, images, growing, reliability, performance
    
Cleversafe
White Paper Published By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : 
myths, cyber, threat, intelligence, fact
    
Cyveillance
White Paper Published By: Cisco     Published Date: Apr 11, 2016
Digital transformation isn’t a technology or a product. Rather, it’s a philosophy for using digital assets to change the way an organization runs. It involves realigning technology and modifying business processes to better engage employees, customers and other constituents of the extended enterprise. Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe.
Tags : 
cisco, digital transformation, best practices, digital assets, digitization
    
Cisco
White Paper Published By: Riverbed     Published Date: Jan 28, 2014
Riverbed Cascade provides enterprise-wide network and application visibility with a full set of application-centric, site-centric, and business-centric views. While Cascade can coexist or integrate with a variety of other IT management solutions, it will likely become your first line of defense against application performance problems.
Tags : 
application performance management, application performance monitoring, big data apm, network performance management, network performance monitoring
    
Riverbed
White Paper Published By: Oracle     Published Date: Sep 30, 2014
The right message, in the right place, at the right time, to the right audience. Content marketing doesn’t have to be painful. Want to know more about ending the chaos of your organization’s content creation, management and measurement? Download this report now!
Tags : 
oracle, marketing, cloud, content, customer base
    
Oracle
White Paper Published By: ITManagement     Published Date: Jul 24, 2008
The days of deploying new equipment for the sake of having the latest and greatest ended when the Internet bubble burst. So when you know it's time for a network upgrade, you need to have more than the technical facts — you need to arm yourself with a rock-solid business case. Start with these 10 ways to sell the members of your upper-management team on the network upgrade.
Tags : 
it management, upgrade, servers, management, network
    
ITManagement
White Paper Published By: Emulex Corporation     Published Date: Nov 07, 2013
Flying blind at 100G It might go something like this: Your company is a voracious consumer of bandwidth – perhaps a very large enterprise, a research lab, or a service or content provider of some description. Today you are running multiple 10Gbps network connections in the core of your network, but these links are rapidly approaching capacity. An upgrade in the not-too-distant future to 40/100G ultra-high-speed links now looks inevitable.
Tags : 
network monitoring, network visibility, technology, endace, best practices
    
Emulex Corporation
White Paper Published By: Oracle     Published Date: Oct 29, 2015
Learn the 20 key commerce metrics that you should be tracking to measure and optimize your commerce results. For each metric, you will learn what it means, why you should be tracking it, industry benchmarks. Download the eBook now.
Tags : 
oracle, commerce metrics, measuring commerce results, ebook, networking
    
Oracle
White Paper Published By: Viavi Solutions     Published Date: Mar 21, 2016
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users—from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
viavi solutions, hybrid clouds, networking, it management, wireless
    
Viavi Solutions
White Paper Published By: Aerohive     Published Date: Apr 11, 2012
Today Wi-Fi tends to be the primary network access method for many. This paper discusses key requirements to consider as you plan for a WLAN purchase.
Tags : 
aerohive, wlan, lan, branch office, cloud computing
    
Aerohive
White Paper Published By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance
    
Smarsh
White Paper Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud
    
Blue Coat Systems
White Paper Published By: Progress Software     Published Date: Mar 12, 2014
For IT managers, choosing the wrong vendor can lead to disruption, high costs, and the loss of confidence from within the business. Learn how to de-risk your vendor selections by aligning with market trends.
Tags : 
progress software, choosing vendors, datadirect, connectivity, saas applications
    
Progress Software
White Paper Published By: Polycom     Published Date: Jul 24, 2014
Download this survey to learn what 5,000 business professionals around the world say are their biggest collaboration challenges—and discover the strategies they deploy to overcome them. In late 2013, Polycom invited customers and partners around the world to participate in a survey that focused on collaboration challenges. More than 5,000 business professionals from all job levels, functions and vertical sectors responded, candidly sharing insights about their obstacles and the strategies they deploy to overcome them. The survey reveals that 85% of the respondents believe video conferencing helps them achieve their business goals. See how they successfully use video in their profession and how you can leverage technology to defy distance and improve remote collaboration within your organization as well.
Tags : 
polycom, collaboration video conferencing, defy distance, networking, it management
    
Polycom
White Paper Published By: Aerohive Networks     Published Date: Aug 22, 2014
Today Wi-Fi tends to be the primary network access method for many. This paper discusses key requirements to consider as you plan for a WLAN purchase. It will highlight top 10 features for a WLAN, help you decide on architectural choices and summarize how to use the RFP process to select a vendor.
Tags : 
wlan, wi-fi, network, rfp, process
    
Aerohive Networks
White Paper Published By: IBM     Published Date: Oct 13, 2015
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : 
ibm, data breach, ponemon institute, jp morgan, global analysis
    
IBM
White Paper Published By: IBM     Published Date: Jan 07, 2016
Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : 
ibm, data breach, analysis, ponemon institute, networking
    
IBM
White Paper Published By: Dice     Published Date: Jan 27, 2015
Get the new 2015 Dice Tech Salary Survey Report. Salaries and bonuses are on the rise for tech professionals, but compensation satisfaction is slipping. Download the report and find salary data by metro, state, title and tech skill.
Tags : 
dice, 2015 tech salary survey, networking
    
Dice
White Paper Published By: Okta     Published Date: Nov 03, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
okta, gartner, magic quadrant, identity and management, idaas
    
Okta
White Paper Published By: Cisco     Published Date: Nov 17, 2015
Contact center infrastructure vendors continue to expand their solution offerings to include broader feature sets, including omnichannel routing, and alternative delivery models. Companies should evaluate vendors' technology and ability to deliver in relevant regions.
Tags : 
gartner, cisco, magic quadrant, contact center infrastructure, networking
    
Cisco
White Paper Published By: Cisco     Published Date: Dec 04, 2015
Gartner defines contact center infrastructure (CCI) as the products (equipment, software and services) needed to operate call centers for telephony support and contact centers for multichannel support. This type of infrastructure is used by customer and employee service and support centers, inbound and outbound telemarketing services, help desk services, government-operated support centers, and other types of structured communications operations.
Tags : 
cisco, gartner, magic quadrant, contact center, infrastructure
    
Cisco
White Paper Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM Security as a leader in providing Intrusion Prevention Systems (IPS) appliances in the newly published Gartner Magic Quadrant for IPS technology.
Tags : 
ibm, security, network protection, ibm security network protection, intrusion prevention systems
    
IBM
White Paper Published By: Cisco     Published Date: Nov 17, 2015
Midsize businesses have ever-greater choice in premises-based unified communications, with providers extending features and go-to-market channels while trying to maintain ease of use and consistency. Midmarket IT planners should evaluate UC providers' delivery capabilities, not just their solutions.
Tags : 
cisco, gartner, unified communications, midsize enterprises, networking
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.