> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 76 - 100 of 4630Sort Results By: Published Date | Title | Company Name

Choosing a Superior Cybersecurity Solution

White Paper Published By: iboss     Published Date: Jan 22, 2018
Choosing the right cybersecurity solution has never been more important. Organizations need to understand why all security technologies are not alike.
Tags : 
iboss, cybersecurity, intrusion detection, security, cyberattack
    
iboss

Security in a Remote Access World

White Paper Published By: iboss     Published Date: Jan 22, 2018
On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.
Tags : 
iboss, remote access, byod, cybersecurity, mobile workforce
    
iboss

GDPR Compliance and the iboss Distributed Gateway Platform

White Paper Published By: iboss     Published Date: Jan 22, 2018
When the General Data Protection Regulation (GDPR) replaces the European Union’s Data Protection Directive 95/46/ec on May 25, 2018, businesses across the globe will be subject to a wealth of potential fees and penalties for non-compliance.
Tags : 
iboss, gdpr, gdpr compliance, compliance, general data protection regulation
    
iboss

The Guide to Network Intelligence

White Paper Published By: ThousandEyes     Published Date: Jan 14, 2018
This guide explains why Network Intelligence is useful for modern networks and how it is implemented.
Tags : 
thousandeyes, network intelligence, network visibility, network management, bandwidth management
    
ThousandEyes

Ensuring Application Performance at ServiceNow

White Paper Published By: ThousandEyes     Published Date: Jan 14, 2018
ServiceNow relies on ThousandEyes to monitor their global infrastructure and triage network issues across the Internet to deliver a world-class service to their enterprise customers.
Tags : 
thousandeyes, application performance, infrastucture, monitoring, infrastructure
    
ThousandEyes

ThousandEyes for DDoS Attack Analysis

White Paper Published By: ThousandEyes     Published Date: Jan 14, 2018
ThousandEyes highlights the impact of an ongoing DDoS attack, provides visibility into the effectiveness of the mitigation and provides insight into the strategies of DDoS mitigation vendors.
Tags : 
thousandeyes, ddos, migration, network migration, network security
    
ThousandEyes

Making ‘Cloud First’ a Reality at Atkins

White Paper Published By: ThousandEyes     Published Date: Jan 14, 2018
Global design and engineering firm Atkins uses ThousandEyes to implement a 'cloud first' strategy, monitoring Office 365 user experience and performance from offices around the world.
Tags : 
thousandeyes, isp, office 365, cloud applications, cloud computing
    
ThousandEyes

ThousandEyes for Application Delivery

White Paper Published By: ThousandEyes     Published Date: Jan 14, 2018
ThousandEyes monitors and solves application delivery problems throughout the Internet due to data center outages, ISP performance, CDN caching and DNS availability.
Tags : 
thousandeyes, application delivery, isp performance, network performance, network monitoring
    
ThousandEyes

Removing Network Performance Blind Spots at Zendesk

White Paper Published By: ThousandEyes     Published Date: Jan 14, 2018
Steve Loyd, VP of Engineering Ops, uses ThousandEyes to gain visibility in application health and Internet service provider (ISP) performance.
Tags : 
thousandeyes, network performance, network intelligence, network performance management, application performance management
    
ThousandEyes

Transforming the Cisco WAN with Network Intelligence

White Paper Published By: ThousandEyes     Published Date: Jan 14, 2018
Learn how the integrated solution lets you repurpose existing infrastructure to build an intelligent and cloud-aware WAN.
Tags : 
thousandeyes, wide area networks, wan, network intelligence, integration
    
ThousandEyes

The Right Sensors Make Robots More Lifelike

White Paper Published By: Tekscan     Published Date: Dec 07, 2017
This white paper provides a look at the underlying sensor technology and discusses important considerations in designing sensors into a robotic application.
Tags : 
tekscan, robotic sensors, robotic manufacturing, manufacturing, design technology
    
Tekscan

Record to Report Insights: Ensuring a Successful Record to Report Transformation Delivery

White Paper Published By: Trintech, Inc.     Published Date: Nov 13, 2017
This eBook’s goal is to help you identify which technology best suits your business, how to get a project like this approved internally, and what you need to think about when it comes to delivery.
Tags : 
trintech, business automation, software implementation, business process automation, bpo
    
Trintech, Inc.

Digital Transformation with the Node.js DevOps Stack

White Paper Published By: NodeSource     Published Date: Nov 10, 2017
Digital transformation is “the use of technology to radically improve performance or (business) reach. But for digital-native businesses that have never needed to make that shift — e-commerce, social media, web-based services — it involves a sharpening of that focus combined with an ongoing evolution of process and infrastructure.
Tags : 
nodesource, xml, software development, digital transformation, open source
    
NodeSource

Don’t let Energy Consumption Eat Your Profits. Fluke Power Quality Analyzers Can Help.

White Paper Published By: Fluke Networks     Published Date: Nov 05, 2017
Get helpful tips to reduce energy use and information on how power quality analyzers verify realized efficiencies.
Tags : 
fluke, fluke networks, data center energy, data center power, energy
    
Fluke Networks

eBook: The Path To The Cloud And The Role Of The Network

White Paper Published By: Juniper Networks     Published Date: Sep 29, 2017
To try and understand the path to the cloud in greater detail, we’ve created this eBook from an extended interview conducted by the team at DatacenterDynamics with Juniper Networks’ Andy Ingram, the Global Vice President for Data Center and Cloud.
Tags : 
juniper, public cloud, cloud, cloud applications, data center
    
Juniper Networks

GDPR Survival Basics: 5 Ways to Help Prepare

White Paper Published By: RSA     Published Date: Sep 19, 2017
This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.
Tags : 
rsa, rsa security, data breach, data protection, gdpr
    
RSA

How GDPR Could Impact Your Business Operations

White Paper Published By: RSA     Published Date: Sep 19, 2017
This must-read report featuring insights from respected legal and security experts outlines specific GDPR compliance challenges you probably haven’t considered.
Tags : 
rsa, rsa security, gdpr, data protection, compliance
    
RSA

TCLAD: Tools for an Optimal Design

White Paper Published By: Henkel     Published Date: Aug 09, 2017
This white paper will address design recommendations for circuit image, soldermask, legend and mechanical fabrication. .
Tags : 
henkel, mechanical fabrication, circuit boards, design, part design
    
Henkel

NFV Network Services Benchmark vFW VNF Approximation (Japanese)

White Paper Published By: Intel     Published Date: May 19, 2017
Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) deployments are challenged by a lack of broadly accepted industry benchmarks to drive conformance to carrier-grade requirements.
Tags : 
network services, sdn, nfv, network, infrastructure
    
Intel

NFV Network Services Benchmark vPE VNF Approximation (Japanese)

White Paper Published By: Intel     Published Date: May 19, 2017
Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) deployments are challenged by a lack of broadly accepted industry benchmarks to drive conformance to carrier-grade requirements.
Tags : 
nfv, network services, virtualization, sdn, infrastructure
    
Intel

Software-Defined Infrastructure on Bare Metal Boosts Performance

White Paper Published By: Intel     Published Date: May 19, 2017
An unprecedented level of network traffic is driving enterprises and communications service providers (CommSPs) to look for equipment that delivers greater operational agility and economics.
Tags : 
infrastructure, data, software, nfv, intel
    
Intel

NFV Security Gateway for Communications Service Providers (Japanese)

White Paper Published By: Intel     Published Date: May 19, 2017
Intel is accelerating Network Functions Virtualization (NFV) with unique capabilities that enable optimal use of data center resources to deliver communications services.
Tags : 
nfv, security, virtualisation, data, network architecture
    
Intel

Simplify NFV Deployment for Service Providers and Enterprises (Korean)

White Paper Published By: Intel     Published Date: May 19, 2017
For today’s service providers and enterprises, bandwidth demands continue to increase and evolve. The introduction of Internet of Things (IoT) solutions, such as smart homes, smart cities, connected cars, and connected medical devices, is forcing organizations to change existing business models and to build more cost-effective networks.
Tags : 
nfv, enterprises, service providers, internet of things, network performance
    
Intel

Understanding and Improving Performance in Network Functions Virtualization Environments (Japanese)

White Paper Published By: Intel     Published Date: May 17, 2017
The network functions virtualization (NFV) revolution – where software-based services running in virtualized environments on Intel® architecture servers replace purpose built appliances – has taken communications service providers by storm.
Tags : 
intel, vmware, nfv infrastructure, nfvi, network functions virtualization
    
Intel

Ransomware Survival Guide: What Every Organization Needs to Know Before, During, and After an Attack

White Paper Published By: Proofpoint     Published Date: May 17, 2017
In this complimentary guide you will learn why ransomware is surging and what to do before, during, and after an attack.
Tags : 
proofpoint, ransomware, intrusion prevention, cyberattack, data protection
    
Proofpoint
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Content Management, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.