local area network

Results 1 - 19 of 19Sort Results By: Published Date | Title | Company Name

ZK Research: Cisco’s Branch Infrastructure Powers the Hybrid WAN

Published By: Cisco     Published Date: Dec 08, 2015
The Time for the Hybrid WAN IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
cisco, canada, branch infrastructure, hybrid wan, wide area network, networking, it management, wireless, data management
    
Cisco

ZK Research: Cisco’s Branch Infrastructure Powers the Hybrid WAN

Published By: Cisco     Published Date: Jun 21, 2016
IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
    
Cisco

From Zero Touch Provisioning to Secure Business Intent

Published By: Silver Peak     Published Date: Apr 12, 2016
This white paper illustrates how the integration of zero touch provisioning with EdgeConnect profiles, and the further integration of local profiles into the global business intent of Silver Peak’s virtual overlays, fulfills the promise of SD-WAN with virtualised wide area networking.
Tags : 
security, integration, wan, software defined wan, edgeconnect, virtualisation, networking, network architecture, network management, network performance, application integration, virtualization, cloud computing, infrastructure
    
Silver Peak

Next-Gen LAN: Everything Except the Kitchen Sink

Published By: Brocade     Published Date: Sep 07, 2010
Tomorrow's local-area network will be the plumbing for everything business leaders want to do, from adding HC video to using FCoE to slash storage costs. So how we ensure our LANs are robust enough to handle the pressure?
Tags : 
brocade, lan, network computing, informationweek analytics, unified storage, data network, data center, hd videoconferencing, security, security management, video conferencing, voice recognition, voice over ip, cloud computing, data center design and management
    
Brocade

Cellular & Hybrid Networks Their pivotal role in M2M solutions.

Published By: Sprint     Published Date: Oct 18, 2010
This white paper outlines the many network considerations one must take into account when choosing to deploy an M2M solution.
Tags : 
sprint wholesale, cellular, hybrid networks, m2m deployment, wide-area wireless networks, local-area wireless networks, local area networking, remote access, wide area networks, mobile computing, wireless application software, wireless security
    
Sprint

Virtual Support Networks: Ten Tips for Delivering Managed Services to On-Site Systems

Published By: WebEx     Published Date: Apr 02, 2009
The business of taking care of remote hardware and software has never been bigger:-Managed systems and services for retail, point of sale, hospitality, and other distributed operations are a hot growth area.- Enterprise help desks manage an increasingly dispersed array of hardware and software.- Enterprise software providers are moving to managed services and other value added support offerings to preserve margins in the face of increasing price pressure.
Tags : 
webex, virtual support networks, virtual support network, vsn technology, standard remote management, it server management, local area network, lan, firewall, virtual private network, vpn, security, support costs, isdn, wifi, slas, tco, it management, local area networking, customer interaction service
    
WebEx

Relieving WAN Pain Points for Enterprises

Published By: Singtel     Published Date: Oct 28, 2014
Data connectivity has long been a necessity for enterprises big and small, as has the need to use that connectivity to extend enterprise Local Area Network (LAN) across networks. But the process of building an enterprise Wide Area Network (WAN) is anything but easy.
Tags : 
singtel, vpn, wan, lan, infrastructure, ip networks, ip telephony, local area networking
    
Singtel

Cisco Branch Infrastructure Powers the Hybrid WAN

Published By: Cisco     Published Date: Dec 21, 2016
IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
    
Cisco

ZK Research: Cisco’s Branch Infrastructure Powers the Hybrid WAN

Published By: Cisco     Published Date: Nov 18, 2015
IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
cisco, zk research, infrastructure, hybrid wan, networking
    
Cisco

Demystifying Beamforming

Published By: Ruckus Wireless     Published Date: Sep 28, 2009
In this free white paper, learn how it's now possible for wireless local area networks (WLANs) to deliver predictable throughput, reject interference, and generally behave just like Ethernet. Discover how beamforming, a specialized method of antenna-based RF transmission, renders inconsistent performance stable; rejects performance-impeding interference; supports reliability-sensitive applications like real-time voice and high-definition video; and eliminates packet loss, delays, and jitter. Download your copy of this free white paper now.
Tags : 
wifi, wi-fi, wlan, lan, access points, radio frequency, 802.11, phy, mac, txbf, ruckus, wireless, mobile computing, rfid, wireless infrastructure, wireless service providers
    
Ruckus Wireless

Performance Benefits and Best-practices for EMC RecoverPoint and Riverbed WAN Optimization

Published By: Riverbed     Published Date: Aug 19, 2014
EMC® RecoverPoint family provides cost-effective, local continuous data protection and/or continuous remote replication solutions that allow for any-point-in-time data recovery. Riverbed SteelHead WAN Optimization solutions deliver maximum performance for business applications and data transfers over Wide-Area Networks (WANs).
Tags : 
data protection, performance, optimization, data transfer, wan, networking, it management
    
Riverbed

Cisco CCNA Certification: Employers want it and so should you.

Published By: NetCom Info     Published Date: Jul 16, 2009
NetCom's CCNA certification course teaches clients how to configure, install and maintain the following protocols:• Introduction to wireless networking concepts & terminology• Internet Protocol (lP)• Enhanced Interior Gateway Routing Protocol (EIGRP)• Serial Line Interface Protocol Frame Relay• Routing Information Protocol Version 2 (RIPv2)• Virtual Local Area Network (VLANs)• Ethernet and access control lists (ACLs)
Tags : 
ccna, cisco, networking, routing and switching, cisco certification, ccnp, it career advancement
    
NetCom Info

Best Practices for Securing Your Enterprise LAN

Published By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : 
wireless, best practices, enterprise security, wi-fi, wireless security, network security, intrusion prevention, lan, local area network, local area networking, hacker detection, airtight, airtight networks, wlan, vulnerability management
    
AirTight Networks

WLAN Design Considerations for Stationary CE Applications

Published By: Texas Instruments     Published Date: Aug 21, 2009
Designing wireless local area networking (WLAN) capabilities into stationary customer electronics (CE) systems is most successful when certain design issues are considered early in the development cycle.
Tags : 
wireless lan, wlan, wlans, consumer electronics, ce systems, vcr, consumer electronic, ce design, digital media, product development, texas instruments, wireless, mobile data systems, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless service providers
    
Texas Instruments

Smart Mobile: Next-Generation WLAN Architecture for High Performance Networks

Published By: Trapeze Networks     Published Date: Apr 16, 2007
This paper identifies the requirements for next-generation WLANs, examines the limitations of existing approaches, and describes an innovative WLAN architecture from Trapeze Networks called Smart Mobile™, which overcomes those limitations.
Tags : 
802.11n, wireless, wi-fi, wireless local area network, wlan, wireless network, mobile, voice over ip, voip, voice over wlan, vowlanm, network access points, infrastructure, controllers, switches, network management, trapeze networks, cisco, aruba, ip telephony
    
Trapeze Networks

Who Leads in WLAN Security? Comparative Evaluation of Vendor Offerings and Positioning

Published By: Trapeze Networks     Published Date: Apr 16, 2007
This analyst report written by Stan Schatt, VP & Research Director, Networking at ABI Research  helps you decipher the WLAN security alphabet soup, understand architectural approaches to WLAN security, upcoming standards for roaming, load balancing and management frame encryption, and key security requirements that you should consider for you next WLAN deployment.
Tags : 
wi-fi, wireless, wlan, remote technologies, roaming, encryption, access point, service set identification, ssid, authentication, virtual local area network, vlan, switches, wids, wips, wireless security, wlan security, trapeze networks, cisco, aruba
    
Trapeze Networks

Solving the Firewall/NAT Traversal Issue of SIP

Published By: Ingate Systems     Published Date: May 31, 2007
Session Initiation Protocol (SIP) represents the third wave of Internet usage after SMTP (email) and HTTP (Web). Download this free guide now and learn why all firewalls will need to be SIP capable in order to support the wide-scale deployment of enterprise person-to-person communications.
Tags : 
communication, communications, voip, voice over ip, lan, local area network, ip networks, ip telephony, internet security, firewall, firewalls, ingate, ingate systems, local area networking
    
Ingate Systems

Remote Site Management Solutions Address SNMP Weakness

Published By: Asentria Corporation     Published Date: Sep 04, 2007
SNMP (Simple Network Management Protocol) is an industry standard network management protocol for managing wide area and local area networks. It is easy to use, cost-effective, and is built into most networking devices. One of SNMP’s best assets is its use of in-band management, yet, this is also its biggest weakness.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation

Best Practices for Deploying LAN Security and NAC

Published By: Nevis Networks     Published Date: Sep 04, 2007
Companies are yearning for a solution to guard their network from security risks such as external or untrusted users, and unmanaged endpoints on their internal LAN. NAC technology works well, but a strategic solution is required to fully address the problem of the dissolving network perimeter.
Tags : 
lan, local area networking, nac, access control, network security, infrastructure, lan security, nevis, nevis networks, precision prospects
    
Nevis Networks
Search      

Add Research

Get your company's research in the hands of targeted business professionals.