> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 4501 - 4525 of 4630Sort Results By: Published Date | Title | Company Name

Why One Virus Engine is Not Enough

White Paper Published By: GFI     Published Date: Jun 12, 2007
This white paper examines why having multiple anti-virus scanners at mail server level substantially reduces the chance of virus infection and explores ways in which this can be achieved.
Tags : 
anti virus, anti-virus, virus, norton, network security
    
GFI

Why passwords are kicking wi-fiísÖ

White Paper Published By: Ruckus Wireless     Published Date: May 05, 2016
Password-based (PEAP, TTLS) networks experience high rates of user disruption based on password changes. Disconnected devices try to connect back to the network causing severe user disruption. So, whatís the solution to this? Certificate-based wi-fi, of course!
Tags : 
ruckus wireless, wi fi, passwords, certificate wifi, user experience
    
Ruckus Wireless

Why Replace your IPSec for Remote Access

White Paper Published By: Aventail     Published Date: Aug 21, 2009
To thrive in an increasingly competitive world, forward-thinking organizations are encouraging workforce mobility.  Read this white paper by security expert Dave Piscatello, for an assessment of key attributes in a secure remote access solution and how you can benefit from replacing your IPSec VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn
    
Aventail

Why Should You Archive Your Email With a Hosted Service?

White Paper Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation
    
123Together

Why SMBs Should Use Windows Server 2003 Migration as a Launchpad to IT Transformation

White Paper Published By: CDW     Published Date: Jun 08, 2015
This paper looks at the Windows Server Migration effort in the context of broader IT and business goals. It also steps through a decision process for SMB IT leaders who are considering hiring professional consultants to shape the project.
Tags : 
server, windows 2003, migrate, infrastructure, migration
    
CDW

Why SMBs Should Use Windows Server 2003 Migration as a Launchpad to IT Transformation

White Paper Published By: CDW     Published Date: Jun 15, 2015
This paper looks at the Windows Server Migration effort in the context of broader IT and business goals. It also steps through a decision process for SMB IT leaders who are considering hiring professional consultants to shape the project.
Tags : 
server, windows 2003, migrate, infrastructure, migration
    
CDW

Why Strong Authentication Is a Must for All Users

White Paper Published By: CA Technologies     Published Date: Jan 09, 2015
This white paper focuses on how the new trends impacting business today (cloud adoption, increased mobility, rise of social media and the increased amount of online data sharing) make the need for strong authentication more important than ever.
Tags : 
authentication, security, risk-based authentication, network security, access control
    
CA Technologies

Why the City of Lake Wales (Florida) Selected Astaro Security Gateway over Cisco-Pix

Case Study Published By: Astaro     Published Date: Aug 10, 2009
Previously, the network at the City of Lake Wales didn't possess any firewalls, intrusion protection or web filtering solutions. As a result the network, which is spread out to multiple locations (including law enforcement), was left wide open to security breaches and caused system performance problems as users unwittingly picked up spyware and malware.
Tags : 
astaro, security, gateway, cisco pix, web filtering
    
Astaro

Why the Hybrid Cloud Makes Sense

White Paper Published By: Equinix     Published Date: May 18, 2015
This white paper explores how CIOs and business leaders need to think much more broadly about how their technology fits into a global network of services due to the rise of cloud infrastructure, software as a service, the global data foot≠print, and mobile apps.
Tags : 
hybrid cloud, technology, data center, global network, cloud computing
    
Equinix

Why the Hybrid Rack Transfer System is Superior to Both ATS and STS Systems

White Paper Published By: Raritan     Published Date: Apr 10, 2015
Raritanís hybrid transfer switch offers surge protection, field replaceable fuses, and disaster recovery in case of a shorted load. Theyíre also energy efficient - consuming a mere 20W - and thereby produce less heat resulting in fewer issues during installation and day-to-day use.
Tags : 
raritan, power, data center power, hybrid rack, switching
    
Raritan

Why Traditional Network Monitoring Tools Fall Short

White Paper Published By: Emulex Corporation     Published Date: Nov 07, 2013
The status quo in network monitoring is no longer adequate for large organizations. Itís simply taking too long for enterprises with mission-critical networks to resolve and find the root causes of network incidents. To speed things up, enterprises must add dedicated incident response and root cause analysis capabilities that are 100% accurate and reliable to their network management arsenals. It takes so long to diagnose, fix, and eradicate network incidents that network uptime and performance are suffering. Because of this, organizations need to embrace incident response and root cause analysis capabilities to accelerate resolution times and avoid the network downtime and service degradation that can cost them thousands, if not millions, of dollars per minute. Download this Whitepaper for more information.
Tags : 
network monitoring, network visibility, technology, endace, best practices
    
Emulex Corporation

Why Traditional Network Monitoring Tools Fall Short

White Paper Published By: Endace     Published Date: Aug 20, 2012
The status quo in network monitoring is no longer adequate for large organizations. It's simply taking too long for enterprises with mission-critical networks to resolve and find the root causes of network incidents. To speed things up, enterprises must add dedicated incident response and root cause analysis capabilities that are 100% accurate and reliable to their network management arsenals.
Tags : 
endace, technology, white paper, network, network monitoring
    
Endace

Why Use Cisco Network Storage Systems for Your Business

White Paper Published By: Cisco     Published Date: Feb 13, 2009
This white paper highlights two new additions to the Cisco® Small Business Network Storage System (NSS) line of products. The Cisco NSS2000 Series is a 2-bay network attached storage (NAS) system, and the Cisco NSS3000 Series is a 4-bay system.
Tags : 
cisco, storage systems, network storage system, networking, security
    
Cisco

Why Voice Still Matters

White Paper Published By: Asentria Corporation     Published Date: Sep 04, 2007
Simple voicemail has evolved into complex integrated messaging platforms and the generic black handset has been replaced by a plethora of devices. Service providers can become critical partners for companies looking to ensure availability of their voice network.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access
    
Asentria Corporation

Why web security is best served in the cloud

White Paper Published By: Webroot UK     Published Date: Mar 22, 2010
Move protection to where the threats are managing web-borne threats is becoming a major headache for today's resource-strapped organizations.
Tags : 
webroot, web security, cloud-based computing, malware, threat protection
    
Webroot UK

Why You Are Missing Your Backup Window

White Paper Published By: Logicworks     Published Date: Jan 27, 2014
In this whitepaper, you will learn how to overcome 3 fundamental problems that organizations face in the context of managing their backup windows.
Tags : 
logicworks, backup, backup window, back-as-a-service, baas
    
Logicworks

Why You Need an Email Exploit Detection Engine

White Paper Published By: GFI     Published Date: Jun 12, 2007
Virus-writers are using increasingly complex and sophisticated techniques in their bid to circumvent anti-virus software and disseminate their viruses. Anti-virus software, though essential, cannot combat such threats alone; an email exploit detection tool is also necessary.
Tags : 
email security, trojan, trojans, anti-virus, anti virus
    
GFI

Why You Need To Be A Modern Marketer: The Business Impact Of Marketing Maturity In The Age Of The Cu

White Paper Published By: Oracle     Published Date: Feb 24, 2015
Oracle commissioned Forrester to interview 498 marketing decision-makers from across the US and Europe, finding that most companies are in the process of evolving marketing practices, but on average they are only about halfway to the goal of becoming customer obsessed or modern marketers. Read all the results. Get the report.
Tags : 
oracle, forrester, brand management, digital marketing, marketing automation
    
Oracle

Why You Need to Consider Cloud-Based Security in 2012

White Paper Published By: Proofpoint     Published Date: Apr 06, 2012
Download this white paper from Osterman Research and Proofpoint to learn how the protection of corporate data from sophisticated malware and phishing attacks is at top of mind of IT decision makers.
Tags : 
cloud-based security, advanced persistent threat, threat protection, cloud security, phishing
    
Proofpoint

WHY YOU NEED TO MONITOR THE WEB, A live Webinar sponsored by GFI Software

Webinar Published By: Osterman Research, Inc.     Published Date: Jul 08, 2011
Join Michael Osterman of Osterman Research and GFI Software who will discuss the current state of the dangers of simple Web surfing and what you can do to address these concerns quickly and easily.
Tags : 
web monitoring, gfi, osterman, messaging, directory
    
Osterman Research, Inc.

Why you should care about Identity-as-a-Service (IDaaS): An Expertís perspective

Software Download Published By: Rackspace     Published Date: Mar 08, 2016
Why you should care about Identity-as-a-Service (IDaaS): An Expertís perspective
Tags : 
organization, identity solutions, cloud management, access management, best practices
    
Rackspace

Why You Should Consider Cloud-Based Email Archiving

White Paper Published By: SilverSky     Published Date: Mar 26, 2014
In this white paper, authored by technology market research firm The Radicati Group, the paper covers the ten reasons you should outsource your archiving solution, the seven unique benefits of archiving in the cloud and the how the SilverSky solution, powered by IBM compares.
Tags : 
silversky, ibm, radicati group, technology market research, cloud mailbox
    
SilverSky

Why Your Company Should Have an Appetite for Lunch

White Paper Published By: ClickSoftware     Published Date: Aug 13, 2014
This paper evaluates how the shrinking lunch break impacts the business.
Tags : 
managing a mobile workforce, lunch breaks, length of lunch breaks, effects of missing lunch, mobile workforce management
    
ClickSoftware

Why Your Current Service Desk is Failing Your Business, and What To Do About It

White Paper Published By: CA Technologies     Published Date: Aug 01, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in todayís business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas
    
CA Technologies

Why Your Current Service Desk is Failing Your Business, and What To Do About It

White Paper Published By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in todayís business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas
    
CA Technologies
Start   Previous    172 173 174 175 176 177 178 179 180 181 182 183 184 185 186    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Content Management, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.