> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 4451 - 4475 of 4630Sort Results By: Published Date | Title | Company Name

What's Missing from SEM? Security Management is More than Event Management

White Paper Published By: NetIQ Corporation     Published Date: Jan 29, 2007
This white paper identifies what is required for a comprehensive and integrated security management solution and examines the difference between SEM, SIM and SIEM and the challenges of enterprise level security monitoring.
Tags : 
security management, event management, network security, monitoring, network security
    
NetIQ Corporation

What's New in VMware vSphere 4.1 for Small and Midsize Businesses

Webinar Published By: VMware     Published Date: May 03, 2011
For small and midsize businesses, the new VMware vSphere 4.1 delivers higher efficiency, greater agility and more freedom of choice than ever before, making it easier than ever to optimize existing assets and get always-on IT with comprehensive, cost-effective backup and recovery.
Tags : 
vmware, vsphere 4.1, smb, small and midsize businesses, optimization
    
VMware

What's Stealing Your Business Performance

White Paper Published By: Riverbed     Published Date: Aug 22, 2014
Businesses rely on SharePoint availability and performance. This infographic shows the impact of SharePoint slowdowns, challenges with delivering SharePoint and recommendations for an effective SharePoint deployment.
Tags : 
business performance, sharepoint availability, performance, challenges, delivery
    
Riverbed

What's Stealing Your Business Performance?

White Paper Published By: Riverbed     Published Date: Aug 19, 2014
Riverbed recommends the following simple steps to an effective SharePoint deployment and user acceptance.
Tags : 
sharepoint, user acceptance, business, performance, networking
    
Riverbed

What's the Big Deal with Managed Security Services?

White Paper Published By: MX Logic     Published Date: May 21, 2008
In this recent report, the Aberdeen Group’s research revealed that 100% of Best-in-Class companies consume some managed security services as part of their security strategy. The most widely deployed and easiest to implement managed security service is email security.
Tags : 
managed security services, managed services, email security, security solutions, web security
    
MX Logic

Whats missing from your BYOD strategy?

White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Learn how XenMobile uses EMM to enable BYOD and CYOD/COPE mobility programs without impacting user experience, and without inflating costs or introducing security risks.
Tags : 
citrix, byod, strategy, mobile, mdm
    
Citrix Systems, Inc.

When is Managed Colocation a Good Fit?

White Paper Published By: RackSpace Hosting     Published Date: Feb 17, 2010
Managed Colocation, is the hosting choice of many businesses because it provides the desired level of control while offloading some of the inconvenience, financial risk and upfront capital.
Tags : 
rackspace managed colocation, platform hosting, traditional colocation, web hosting, networking
    
RackSpace Hosting

When Java EE Is Overkill: Lightweight Application Server Benefits

Webinar Published By: VMWare - vFabric     Published Date: May 10, 2012
View this webcast to learn about real-world examples of companies that have adopted VMware vFabric tc Server and how to plan for future cloud deployments.
Tags : 
vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud
    
VMWare - vFabric

When Java EE Is Overkill: Lightweight Application Server Benefits - Webcast

Webinar Published By: VMware     Published Date: Aug 23, 2011
View this webcast to learn about real companies that have adopted VMware vFabric Server and how to plan for future cloud deployment
Tags : 
application server, data management, application monitoring and management, web server load balancing, enterprise messaging
    
VMware

When the App is the Business, the Business is the App Vol. 3

White Paper Published By: IBM MaaS360     Published Date: Jul 09, 2015
Volume III: Now that you know the app management basics, it’s time to learn not all apps are developed equally. Nor should they be; learn the layered security options for apps based on the privacy of data passing.
Tags : 
app management, app security, privacy, data passing, mobile app
    
IBM MaaS360

When Trust Online Breaks, Businesses Lose Customers

White Paper Published By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection
    
Venafi

Where have all my marketing investments gone?

White Paper Published By: IBM     Published Date: Oct 31, 2013
Turn marketing challenges into opportunities with marketing performance analytics
Tags : 
financial accountability, roi, return on investment, accountability, marketing analytics
    
IBM

Where is the ROI for UC?

White Paper Published By: Windstream     Published Date: Apr 17, 2013
One of the great challenges in deploying a Unified Communications (UC) solution is determining the ROI for the expenditure. Learn how Windstream Communications will work with you to understand how your business operates and has the ability to integrate UC into your business processes.
Tags : 
windstream, windstream communications, unified communications, ip networks, voip
    
Windstream

White Paper: Best Practices for Protecting Laptop Data

White Paper Published By: EVault Inc.     Published Date: Aug 22, 2012
Learn best practices for guarding your endpoint corporate data so you can mitigate the risk of regulatory and financial exposure, and more. This white paper explores: . Defining security policies for endpoint backup and recovery . Enforcing endpoint controls . Ensuring employee adoption . Keeping IT costs in check
Tags : 
white, paper, best, practices, for protecting
    
EVault Inc.

White Paper: Cloud-Connected Backup and Recovery

White Paper Published By: EVault Inc.     Published Date: Aug 22, 2012
Go hybrid and get the best of both data protection worlds. Cloud-connected backup and recovery seamlessly combines cloud-based and onsite data protection technologies for fast, local restores and ensured, offsite disaster recovery. Read the white paper to: . Discover the benefits of transitioning from tape to disk . Learn how to get shorter backup windows and faster recovery times . Ensure your data is totally secure and easily recovered
Tags : 
white paper, cloud, connected, backup, recovery
    
EVault Inc.

White paper: Health Care Device Trends

White Paper Published By: Fujitsu     Published Date: Sep 02, 2016
Download this white paper today to better understand how devices are going to be used in the health care environments and how you can adjust your product plans accordingly.
Tags : 
fujitsu, mobile device, healthcare device, mobile computing, tablets
    
Fujitsu

Whitepaper: How to Enhance your Blue Coat with Zscaler Security

White Paper Published By: ZScaler     Published Date: Nov 18, 2011
Read this informative whitepaper to learn how, as a Blue Coat customer, you can reap the benefits of Zscaler's comprehensive cloud security solution. Learn how enterprises with legacy proxy appliances-such as Blue Coat ProxySG-will further enhance their security with our unmatched advanced threat protection.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security
    
ZScaler

Whitepaper: IT Analytics is Crucial to Make Trustworthy Business Technology Decisions

White Paper Published By: IBM     Published Date: Apr 15, 2015
Technology Adoption Analyst whitepaper by Forrester. This IBM-commissioned profile of IT operations decision-makers at enterprise companies in the US, UK and Germany evaluates IT operations analytics adoption, benefits, and challenges based on Forrester’s own market data and a custom study of the same audience.
Tags : 
ibm, it operations, decision makers, analytics, market analysis
    
IBM

Whitepaper: SAP HANA & Vormetric – Data Security in the Cloud

White Paper Published By: Vormetric, Inc.     Published Date: Jan 11, 2016
SAP has reviewed and qualified Vormetric’s Transparent Encryption as suitable for use in SAP HANA solution environments. Vormetric provides a proven approach to securing SAP data that meets rigorous security, data governance and compliance requirements. Vormetric Data Security can be quickly deployed to secure data while requiring no change to SAP, the underlying database or hardware infrastructure. This approach enables enterprises to meet data governance requirements with a rigorous separation of duties. Whether you are securing an existing SAP deployment or upgrading, to a new version, Vormetric delivers a proven approach to quickly secure SAP data while ensuring SAP continues to operate at optimal performance.
Tags : 
sap hana, data security, encryption, virtustream, cloud security
    
Vormetric, Inc.

Who's Big on Big Data?

White Paper Published By: Platfora     Published Date: Aug 03, 2015
A survey of more than 395 C-level executives, sponsored by Platfora, shows that senior leaders are optimistic about the capabilities of big data, but many still struggle with big data applications.
Tags : 
platfora, big data, hadoop, data center, big data analytics
    
Platfora

Who’s Spying on You?

White Paper Published By: Kaspersky Lab     Published Date: Feb 20, 2014
Don’t get caught in the crossfire. Read our special report "Who's spying on you?" to find out more about the threats of malware to your business.
Tags : 
kaspersky, malware threats, cyberespionage, internet perpetrators, security technology
    
Kaspersky Lab

Why 2011 Is The Year of Videoconferencing

White Paper Published By: LifeSize, a division of Logitech     Published Date: Jan 12, 2011
As an industry expert in VoIP and UC technologies, I am personally declaring "2011 as the Year of Videoconferencing". Yes videoconferencing is here and it's going mainstream - BIG time. Read this white paper to find out why.
Tags : 
lifesize, roi, telecommunication, voip, web conferencing
    
LifeSize, a division of Logitech

Why a Fully-Virtualized SAN is more Cost Effective than Legacy NAS, SAN and DAS

White Paper Published By: Dell Storage     Published Date: Mar 06, 2012
By enabling organizations to centralize desktop deployment, a VDI can help simplify admin and reduce costs while enhancing security and regulatory compliance and increasing IT flexibility and business agility. Don't wait - find out more now.
Tags : 
technology, dell, storage center, storage, san
    
Dell Storage

Why a Mobility Strategy Matters

White Paper Published By: Honeywell     Published Date: Feb 18, 2016
A revolution is taking place, and it’s happening in every corporate office across the globe. Mobile devices have completely transformed the way we work, and with the increasing capabilities of the next generation of devices, the need to incorporate mobility into your strategic planning is only going to increase.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, honeywell enterprise mobility, mobility
    
Honeywell

Why an HPC Solution is Right for your Business

White Paper Published By: Lenovo     Published Date: Aug 22, 2018
This paper will explore ways HPC systems are being used in a wide range of business domains and disciplines to solve complex problems efficiently with related research and statistics.
Tags : 
hpc, compute workloads, blades, blade computing, racks
    
Lenovo
Start   Previous    172 173 174 175 176 177 178 179 180 181 182 183 184 185 186    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Content Management, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.