traffic

Results 376 - 400 of 514Sort Results By: Published Date | Title | Company Name

IDC: Rethinking the Network as a Network Enforcer

Published By: Cisco     Published Date: Jul 11, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco

IDC - The New Need for Speed in the Datacenter Network

Published By: Cisco     Published Date: Jul 11, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco

The Inbound Marketing Guide for Link Building

Published By: Optify     Published Date: Aug 13, 2012
This is a must-read guide for B2B inbound marketing professionals. Learn safe strategies to get more high-quality inbound links and traffic from your SEO, content marketing and social media campaigns.
Tags : 
inbound marketing, link building, seo, link acquisition, link strategy, lead generation, search engine optimization, link value, optify
    
Optify

5 Steps to Building a Strategic B2B Keyword List

Published By: Optify     Published Date: Aug 13, 2012
Learn how to maximize traffic and leads from your SEO efforts by choosing strategic keywords that align with your business goals and target audiences.
Tags : 
b2b marketing, keywords, seo, search engine marketing, keyword diversity, optify, inbound marketing
    
Optify

Internet Failover with Bandwidth Aggregation for Disaster Recovery

Published By: Astrocom     Published Date: Dec 13, 2007
Enterprises with mission critical applications are exploring the benefits of disaster recovery sites for their data centers to ensure business continuity. Special network technology is needed to ensure that site failover and failback occurs reliably and predictably. An ideal solution should provide reliable network connections, manage inbound and outbound traffic over multiple WAN links, failover to a secondary data center if all links at the primary data center are down, and eliminate deployment barriers and costs of multi-homing with BGP (Border Gateway Protocol).
Tags : 
data center, datacenter, data centers, business continuity, disaster recovery, backup, recovery, failover, redundancy, high availability, astrocom, bandwidth management, backup and recovery
    
Astrocom

Configuring Quality of Service: Prioritizing Network Traffic

Published By: Astrocom     Published Date: Apr 23, 2008
Quality of Service (QoS) enables outbound network traffic to be identified and controlled to give priority to certain types of traffic. Network traffic may be categorized based on a variety of criteria including addressing information, protocol, port number (TCP and UDP), and packet length.
Tags : 
astrocom, networking, traffic, quality of service, traffic management, network management, network performance
    
Astrocom

Search Engine Optimization and Pay-Per-Click (PPC): A Holistic Approach

Published By: Fathom SEO     Published Date: Jan 28, 2008
A new guide from Fathom SEO explains how businesses can maximize search engine marketing efforts by adopting a holistic management plan for Pay-Per-Click and Search Engine Optimization. Learn how to effectively share data about keywords, ad copy and landing page performance.
Tags : 
seo, search engine, sem, search marketing, search engine marketing, ppc, pay per click, keywords, traffic generation, site traffic, web traffic, fathom, fathom seo, return on investment, web development, search engines
    
Fathom SEO

White Paper: 12 SEO Campaign Killers

Published By: Fathom SEO     Published Date: Jan 28, 2008
Learn what not to do when launching a search engine optimization (SEO) campaign to attract more visitors, leads and sales. This guide covers keyword performance, ROI considerations, holistic approaches and ranking analysis.
Tags : 
seo, search engine, sem, search marketing, search engine marketing, meta, meta tags, natural search, keywords, traffic generation, site traffic, web traffic, fathom, fathom seo, marketing automation, return on investment, web development, search engines
    
Fathom SEO

Search Engine Optimization for Press Releases

Published By: Vocus, Inc     Published Date: Dec 16, 2008
Identify ways to increase rankings in search engines and drive traffic to your website.  Get tips to optimize your press releases for search engines—reach a broader audience, deliver your message & drive traffic to your website.
Tags : 
seo press release, seo press releases, optimized press release, vocus, search engine optimization
    
Vocus, Inc

Google Analytics Goals Reporting

Published By: Pure Visibility, Inc.     Published Date: Sep 08, 2008
For marketing managers and business owners, understanding how Online marketing and your Web presence impact the bottom line is critical. Even more important, setting specific goals around the attraction and conversation of Web traffic is a strategic means of aligning online activities with offline marketing in a way that puts the business goals in the front and center of your marketing efforts.
Tags : 
google analytics, pure visibility, goal funnel, conversion, conversion funnel, tools, marketing analytics, goal, tracking, analysis
    
Pure Visibility, Inc.

Top 10 SEO mistakes. Are you ranking for keywords but still don't get relevant traffic/conversions?

Published By: Tsavo Agency     Published Date: Oct 29, 2009
Businesses managers and website owners today need to have some basic Search Engine Optimization (SEO) knowledge whether they work with an internal SEO team or hire an SEO agency to get top Search Engines rankings. Based on years experience optimizing websites for search engines, we have put together a list of the most problematic and common on page SEO issues. Find out if your site is suffering from any of these on page SEO issues.
Tags : 
tsavo, traffic, conversions, seo, search marketing, keywords, rich content, optimizing, cms, traffic
    
Tsavo Agency

Next Generation Security Buyer’s Guide

Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking, security, software development, it management, business technology
    
Cisco

Putting mobile first: best practices of mobile technology leaders - Findings from the IBM Global IT

Published By: IBM     Published Date: Oct 10, 2013
With 2.5 billion employee-owned mobile devices in the workplace today, enterprises are struggling to capture the business benefits while bracing their IT infrastructure against data breaches and a deluge of mobile traffic. A new study reveals that the most mobile-savvy organizations are employing specific best practices, including mobile planning, integration, optimization and management to achieve mobile infrastructure maturity.
Tags : 
mobiles, mobile technology, technology leaders, ibm, global it, it leaders, mobility, wireless, business benefits, mobile traffic, gaining traffic, employing practices, mobile infrastructure, infrastructure maturity, mobile devices, data breach, enterprises, it management, data management, ebusiness
    
IBM

4 Keys to Personalizing the Web Experience

Published By: IBM     Published Date: Oct 15, 2013
Discover the four key dimensions to personalized web marketing, and learn from the real life successes of enterprises that have made the personalized web a core part of their growth strategies.As you can see, web marketing can achieve comparable success when you make the four personalization steps your own.
Tags : 
ibm unica, click-throughs, personalizing web experience, customer needs, data sources, specific site analyses, across channels, sales and marketing opportunities, online and offline, customer interests, website traffic, referring sites, referring keywords, ibm smarter commerce, business intelligence, ebusiness, web service management, content delivery, customer experience management, search engines
    
IBM

Five Steps for Securing the Data Center

Published By: Cisco     Published Date: Apr 10, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
security, data center, performance, virtualization, application, internet, functionality, it management
    
Cisco

Miercom Green Report 2960-X

Published By: Cisco     Published Date: Apr 10, 2015
Cisco’s Catalyst WS-C2960X-48TD-L and WS-C2960XR-48TD-I Gigabit Ethernet switches were evaluated by Miercom under the Certified Green program for power consumption and energy Using a 1518-byte frame size with 100% Layer 2 traffic load, testing showed both switches to be 55% more efficient in power consumption, measured in Watts/ Gbps, than the Industry Average efficiency. Overall environmental impact and business-enabling green benefits of the Layer 2 and Layer 3 switches were also analyzed.
Tags : 
cisco, catalyst, networks, byod, mobile computing, wifi, mobile data systems, mobile workers, wireless hardware, wireless infrastructure, green computing
    
Cisco

The New Need for Speed in the Datacenter Network

Published By: Cisco     Published Date: Dec 21, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco

Simplify Your Network: Easy as 1+1=2

Published By: Cisco     Published Date: Dec 21, 2016
Imagine you manage a warehouse for a small shipping firm. You have a simple job: route packages. But your employer expands to 25 western cities and 50 locations. After further expansion you now need to track packages coming by truck, rail, and plane and route them based on contents and weight to 10,000 different locations worldwide. While keeping traffic in and out tightly secured, making sure each package reaches its destination on time, and without going over budget. You
Tags : 
    
Cisco

Rethinking the Network as a Security Sensor and Enforcer

Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco

The Cloud Architect's Guide to Load Balancing on AWS

Published By: Appcito     Published Date: Apr 09, 2015
Elastic Load Balancing automatically distributes incoming web tra?c across multiple EC2 instances. With Elastic Load Balancing, you can add and remove EC2 instances as your needs change without disrupting the overall ?ow of information. If an EC2 instance fails, Elastic Load Balancing automatically reroutes the tra?c to the remaining running EC2 instances. If a failed EC2 instance is restored, Elastic Load Balancing restores the tra?c to that instance.
Tags : 
cloud architect, web traffic, elastic load balancing, information flow, load balancer, application security, amazon web services, aws, visibility, networking, business technology
    
Appcito

Appcito CAFE Enables ViralMint to Turn Potential Disaster into Success

Published By: Appcito     Published Date: Apr 09, 2015
Social media marketing ?rm ViralMint rolled out a new feature that proved so popular that the increased customer tra?c swamped the capabilities of the existing load balancer solution and greatly increased application response times. Lacking visibility into the volume or nature of its tra?c, ViralMint had no clues for how to address its issues. A fortuitous conversation led to discovery of the Appcito Cloud Application Front End (CAFE) service, which allowed ViralMint to gain control of its cloud application tra?c, retain its customers’ trust and build on its unexpected success.
Tags : 
customer traffic, load balancer solution, application response times, visibility, cloud application service, cloud application delivery, aws, amazon web services, enterprise applications, cloud computing
    
Appcito

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to see why securing the data center requires a solution that can: -Provide visibility and control over custom data center applications -Handle asymmetric traffic flows and application transactions between devices and data centers -Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco -Application-Centric Infrastructures (ACIs) and beyond -Address the entire attack continuum: before, during, and after an attack -Integrate with security deployed across the entire network -Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments
Tags : 
data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis, networking, security, it management
    
Cisco

NGFW Requirements for SMBs and Distributed Enterprises

Published By: Cisco     Published Date: Feb 16, 2016
The need for threat-focused next-generation firewalls (NGFWs) that can effectively mitigate risks that traditional unified threat management (UTM) and point solutions cannot is highlighted by numerous studies, including one from Cisco that reported that every organization should assume it has been hacked. Cisco threat researchers found malicious traffic was visible on 100 percent of the corporate networks that they observed, with evidence that adversaries had often penetrated those networks and were frequently operating undetected over a long period.
Tags : 
network security, threat management, network management, security, productivity
    
Cisco

The Cost of a Bad App -- and How to Deliver a Good One, Fast

Published By: IBM     Published Date: Apr 06, 2015
How effective is your mobile app development process when it comes to meeting customer needs and business objectives? IBM commissioned Forrester to identify the key drivers of successful mobile apps and the costs of failure -- for both customer-facing and enterprise applications. Watch the webcast to understand the key cost drivers and why it’s more important than ever to get this right due to what Forrester calls the “mobile mind shift.” IBM customer, Bank of Montreal, also shares their mobile app dev story. A good app can increase traffic, sales, productivity and brand satisfaction. And a bad app will do the opposite (you could risk doubling your costs if you’re not mindful of the key cost drivers).
Tags : 
mobile app development, customer-facing applications, enterprise applications, ibm, mobile moments, traffic, sales, productivity, brand satisfaction, software development, business technology
    
IBM

IBM Commerce Eighth Annual Online Retail Holiday Readiness Report

Published By: IBM     Published Date: Sep 30, 2015
Online shopping trends and best practices to maximize holiday returns.
Tags : 
mobile traffic, trends, best practices
    
IBM
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.