> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 4251 - 4275 of 4630Sort Results By: Published Date | Title | Company Name

Unlock the Key to Repel Ransomware

White Paper Published By: Kaspersky     Published Date: Jun 15, 2015
Download Kaspersky Lab’s Unlock the Key to Repel Ransomware to learn common ransomware scenarios and delivery mechanisms.
Tags : 
kaspersky, ransomware, cybercrime, cyberattack, hackers
    
Kaspersky

Unlocking engineering knowledge for rapid innovation

White Paper Published By: IBM     Published Date: Jan 22, 2016
By unlocking engineering knowledge with IBM Rational solutions, organizations can deliver fast, easy access to engineering information - across multiple disciplines - so engineers can make the right decisions at the right time to speed development, improve quality and advance innovation.
Tags : 
ibm, engineering, innovation, networking, software development
    
IBM

Unpacking the Complexities of Enterprise Collaboration

White Paper Published By: AVI-SPL     Published Date: Sep 01, 2016
There are a few factors that are influencing the complexity of enterprise collaboration. In this tech brief, we’ll examine three issues that often surface when we work with IT teams on a Collaboration Program Assessment.
Tags : 
collaboration, enterprise collaboration, video conferencing, video meetings, video
    
AVI-SPL

Unruly USB Devices Expose Networks to Malware

White Paper Published By: Lumension     Published Date: Feb 04, 2011
With cyberattacks inflicting increasingly greater damage following uncontrolled connection, it's time that government organizations got serious about outside threats.
Tags : 
usb security, network security, patch management, lumension, device management
    
Lumension

Unshackling Online Meetings for Business Users

White Paper Published By: join.me     Published Date: Jan 06, 2015
This White Paper provides information on how to avoid technology frustrations that sap productivity.
Tags : 
online meetings, business online meetings, how to improve online meetings, online conferences, network performance
    
join.me

Upgrading from AIX v5.3 to AIX v6.1

Webinar Published By: Mainline Information Systems     Published Date: Oct 27, 2009
This course will cover common considerations when upgrading from AIX v5.3 (or 5.2) to AIX v6.1. It includes basic instruction for the upgrade and will also prepare you for some of the common "gotchas."
Tags : 
aix, mainline information systems, migration, tunables, storage management
    
Mainline Information Systems

Uponor case study: On the road to marketing maturity with the Sitecore® Experience Platform™

Case Study Published By: Sitecore     Published Date: Sep 11, 2015
Download now to learn how Uponor tackled these challenges by leveraging The Sitecore® Experience Platform™ and using the Sitecore’s Customer Experience Maturity Model to create a custom marketing roadmap plan that creates extraordinary customer experiences.
Tags : 
marketing maturity, uponor, sitecore, crm, customer experience
    
Sitecore

Usability Campaign - The shifting role of IT: Balancing corporate needs and employee expectations

White Paper Published By: Dropbox for Business     Published Date: May 07, 2015
It's all about Usability. Help educate your prospects about the shifting role of IT and share best practices for evaluating technology in a BYOD world.
Tags : 
usability, employee performance, consumerization, application adoption, best practices
    
Dropbox for Business

Use Colocation Networking to Provide New Connectivity Paradigms and Drive Business Transformation

White Paper Published By: Equinix     Published Date: Oct 20, 2015
Colocation has evolved from simple space and power to become a key element in enterprise networking. Beyond simply connecting compute assets to the enterprise, colocation networking can enable new business models, support the move to hosting and the cloud, and reshape the enterprise WAN.
Tags : 
colocation, enterprise wan, enterprise networking, networking, business model
    
Equinix

Use of Efficient Data Storage Increases Revenue

Case Study Published By: Xiotech     Published Date: Apr 13, 2007
Data keeps growing with no signs of stopping. An effective storage solution seamlessly scales to meet an organization’s growing appetite for capacity, while ensuring availability and fast access.  SAN storage should be designed to deliver strong top-end performance so throughput does not degrade as storage needs scale higher.
Tags : 
storage area network, storage area networks, san, storage, storage performance
    
Xiotech

User Driven BI in the Cloud and Within Your Application

Free Offer Published By: Izenda     Published Date: Nov 20, 2014
If you’re responsible for delivery of a .NET application and your users have analytics requirements, you have some decisions to make. Watch Gigaom Research and our sponsor Izenda for “User Driven BI in the Cloud and Within Your Application,” a free recorded analyst webinar.
Tags : 
izenda, business intelligence, saas, saas applications, bi applications
    
Izenda

User Experience: 5 Essential Monitoring Metrics

White Paper Published By: Viavi Solutions     Published Date: Oct 11, 2013
Network teams are increasingly being told by management to track and manage the end user's experience without any clear guidance as to its meaning.
Tags : 
monitoring metrics, user experience, it managers, user experience metrics, essential monitoring
    
Viavi Solutions

User Scalability for the Enterprise: Microsoft Dynamics CRM 4.0

White Paper Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Microsoft, together with Unisys Corporation, completed benchmark testing of Microsoft Dynamics CRM 4.0 running on the Microsoft Windows Server 2008 operating system with Microsoft SQL Server 2008 database software. Benchmark results demonstrate that Microsoft Dynamics CRM can scale to meet the needs of an enterprise-level, mission-critical workload of 24,000 concurrent users while maintaining performance at sub-second response times.
Tags : 
microsoft crm, microsoft, microsoft dynamics, network architecture, network performance
    
Microsoft Dynamics

User's Guide to WebSphere eXtreme Scale

White Paper Published By: IBM Corporation     Published Date: Sep 20, 2010
The IBM WebSphere eXtreme Scale product provides a high-performance, scalable cache framework. This chapter is an introduction to WebSphere eXtreme Scale.
Tags : 
ibm caching and cloud, websphere extreme scale, scalable cache framework, query engine, network deployment
    
IBM Corporation

Users Beware: 10 Security Tips to Share with Your Users

White Paper Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Users Beware: 10 Security Tips to Share with Your Users - ThreatTrack Security has compiled these 10 tips to help your users avoid common online threats. The following information is available to IT admins to share with users so they are more aware of the security traps they face every day.
Tags : 
threattrack, security, threat, track, information
    
ThreatTrack Security

Users Want Mobile File Access. IT Managers Want Control. You Can Have Both.

White Paper Published By: GlobalSCAPE     Published Date: Jul 16, 2012
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks.
Tags : 
globalscape, mobile devices, mobile security, file sharing, mobile workers
    
GlobalSCAPE

Using Analytics to Proactively Deter Insider Threats (Insider Threat & VI)

White Paper Published By: SAS     Published Date: Mar 31, 2016
The pace and sophistication of data breaches is growing all the time. Anyone with valuable secrets can be a target, and likely already is. According to the Privacy Rights Clearinghouse, at the time of this writing, 884,903,517 records were breached in 4,621 incidents documented since 2005.
Tags : 
analytics, prevention practices, best practices, data security, data management
    
SAS

Using BI and BPM to address the information challenges of midsize companies

White Paper Published By: IBM Software     Published Date: Feb 07, 2011
Learn about the challenges faced by organizations as they progress through the "midsize" stage. See how to use BI and BPM to meet those challenges in this paper from Technology Evaluation Center.
Tags : 
ibm cognos, mid market, business intelligence, midsize companies, bpm
    
IBM Software

Using Blade Systems to Cut Costs and Sharpen Efficiencies

White Paper Published By: Sponsored by HP     Published Date: Feb 26, 2013
Download this paper to learn best practices for Blade environments from Jed Scaramella, research manager of IDC's Services program on behalf of HP's customers.
Tags : 
blade servers, virtualization, network, storage, datacenter
    
Sponsored by HP

Using C++ Efficiently In Embedded Applications

White Paper Published By: Mentor Graphics     Published Date: Apr 03, 2009
Moving to C++ presents opportunities for higher programmer productivity. The requirements of embedded systems, however, demand that the adoption of C++ be carefully measured for the performance impact of run-time costs present in C++, but not in C. This talk suggests strategies for developers who are starting their acquaintance with C++.
Tags : 
c++, coding, developer, programming, programmer
    
Mentor Graphics

Using Convergence to Simplify Mobility

White Paper Published By: Windstream     Published Date: Apr 03, 2014
Misconceptions about unified communications (UC) may lead IT to dismiss it. Find out how UC can solve productivity woes for your mobile workforce.
Tags : 
windstream, convergence, mobility, unified communications, mobile enterprise
    
Windstream

Using Deep Data Insights to Get and Keep Clients

White Paper Published By: Socialbakers     Published Date: Jan 20, 2015
In this exclusive report, you’ll find out how to use deep social media data to pursue new clients, perfect your data-driven pitches, and master the results with custom, easy-to-read reporting. It’s a data world, and agencies need to bring the best insights on the market to win new clients and keep existing business. This guide will get you started.
Tags : 
benefits of using social media data, data center design and management, content management
    
Socialbakers

Using Digital, Web 2.0 Tactics to Boost B2B Marketing Results

Free Offer Published By: Marketo, INC.     Published Date: Sep 25, 2008
In this free 15-minute podcast, Laura Ramos of Forrester Research explains how B2B marketers can leverage Web 2.0.  Listen at your desk or on the road and discover: how to enhance marketing ROI by driving real engagement and dialog ... how to reach key decision-makers ... reasons behind the move from demand generation toward more organic demand management ... and more.  Understanding Web 2.0 tactics is a must for B2B marketers who want to compete.  Find out why; listen to this free podcast now.
Tags : 
using digital, promo code: wp2, marketing, b2b marketing, social marketing
    
Marketo, INC.

Using HP StoreOnce for NDMP backup with Symantec NetBackup

White Paper Published By: Intel Corp.     Published Date: Aug 08, 2012
The report outlines the benefits of using HP StoreOnce with NetBackup's integrated Network Data Management Protocol (NDMP) backup capabilities to enhance administrators' abilities to effectively manage NDMP-enabled NAS server backup and recovery.
Tags : 
using, storeonce, ndmp, backup, symantec
    
Intel Corp.

Using Neterion 10 GbE for Enterprise iSCSI Storage

White Paper Published By: Neterion     Published Date: Dec 05, 2006
The relentless growth of data and network-intensive applications such as digital imaging, multimedia content, and broadcast/video continues to drive volumes of enterprise data and network traffic. As growth continues, IT managers are challenged with implementing solutions without interrupting critical business processes.
Tags : 
network infrastructure, traffic management, bandwidth management, bandwidth, network management
    
Neterion
Start   Previous    164 165 166 167 168 169 170 171 172 173 174 175 176 177 178    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Content Management, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.