> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 4351 - 4375 of 4630Sort Results By:Published Date | Title | Company Name

Panic Slowly: Integrated Disaster Response and Built-In Business Continuity

White Paper Published By: IBM     Published Date: Feb 08, 2008
Unexpected disasters threaten organizations across the globe daily. Surprisingly, many businesses are not prepared for such disasters. They lack business continuity plans which can provide both proactive and reactive strategies to minimize the impact of unforeseen setbacks.
Tags : 
disaster recovery, business continuity, natural disaster, infrastructure, ibm
    
IBM

Information Security: It's Not an Option

White Paper Published By: IBM     Published Date: Feb 08, 2008
Technology has helped financial institutions work harder and faster than ever before. The downside: Sensitive data is more vulnerable than ever before. Financial Insights offers ideas and solutions to improve Information Security (IS). Click to learn more on protecting your most important assets, your data.
Tags : 
bank, banks, financial, financial institutions, fisma
    
IBM

Learn the Secrets of Competing with Larger Financial Institutions

White Paper Published By: IBM     Published Date: Feb 08, 2008
It’s tough for community financial institutions to succeed, especially when faced with fierce competition from large banks with large budgets. See how IBM can help with solutions tailored for community banks. Click now and receive the new 18-page report from TowerGroup on CRM Metrics and how smart banks measure success.
Tags : 
customer data, customer centric, customer-centric, crm, customer relationship
    
IBM

Power and Cooling for VoIP and IP Telephony Applications

White Paper Published By: APC     Published Date: Feb 07, 2008
Voice Over IP (VoIP) deployments can cause unexpected or unplanned power and cooling requirements in wiring closets and wiring rooms. Most wiring closets do not have uninterruptible power available, and they do not provide the ventilation or cooling required to prevent equipment overheating. Understanding the unique cooling and powering needs of VoIP equipment allows planning for a successful and cost effective VoIP deployment. This paper explains how to plan for VoIP power and cooling needs, and describes simple, fast, reliable, and cost effective strategies for upgrading old facilities and building new facilities.
Tags : 
apc, voip, power, cooling, pbx
    
APC

Cooperative Control Wireless LAN Architecture

White Paper Published By: Aerohive     Published Date: Feb 06, 2008
Yesterday’s fat access points and legacy wireless LANs typically can’t handle mission-critical, real-time applications, nor do they have a migration path to 802.11n. Aerohive Networks has developed a new controller-less architecture that provides an innovative way to handle tomorrow’s wireless challenges – like voice over WLAN and migrating to 802.11n – without costing you a fortune. This paper discusses the benefits of this approach and the key underlying technologies of cooperative control, including best path forwarding and policy enforcement at the edge.
Tags : 
business, roi, tco, wireless lan, enterprise wireless
    
Aerohive

Driving Workforce Productivity with Unified Communications: The Path to Fixed/Mobile Convergence

White Paper Published By: Motorola     Published Date: Feb 06, 2008
Aberdeen's research shows that Unified Communications (UC) solutions have a measurable impact on the productivity of an organization's workforce. Read this report to learn how best-in-class organizations are leveraging their UC solutions as part of an integrated business-process mapping program to understand how UC solutions help the workforce most effectively impact those core business processes.
Tags : 
unified communications, soft phones, ivr, mobile, mobility
    
Motorola

Advances in Wireless LAN Architecture: The Aerohive Cooperative Control Architecture

White Paper Published By: Aerohive     Published Date: Feb 06, 2008
Craig Mathias, Principal of the Farpoint Group, explores the advent of cooperative control, an innovative new class of wireless infrastructure from Aerohive Networks. Aerohive’s cooperative control architecture gives you all of the benefits of autonomous access points and controller-based infrastructures, without the high OPEX or CAPEX associated with either approach. Cooperative control architecture represents an innovative approach to wireless LAN systems, one that incorporates a number of interesting features and corresponding benefits.
Tags : 
wireless lan, wlan, wireless architecture, wireless infrastructure, aerohive
    
Aerohive

The Economic Benefits of Cooperative Control Wireless LAN Architecture

White Paper Published By: Aerohive     Published Date: Feb 06, 2008
Are you looking to reduce the operational cost of your existing wireless LAN, and to make it support mission-critical, real-time applications and 802.11n? At the same time, are you challenged with the cost and complexity associated with most next-generation wireless LAN architectures? Check out the enterprise-class, cost-effective new cooperative control architecture from Aerohive Networks. In this real-world case study, you’ll see how Aerohive Networks' cooperative control architecture combines the linear cost modeling of autonomous APs and the operational advantages of controller-based approaches.
Tags : 
business, roi, tco, wireless lan, enterprise wireless
    
Aerohive

Panda Security for Business with TruPrevent Technologies

White Paper Published By: Panda Security     Published Date: Feb 06, 2008
Today’s targeted malware attacks are infecting unsuspecting businesses at astonishing rates, rendering traditional antivirus solutions ineffective. Reported and known viruses are becoming less important compared to the increase in unknown threats and attacks.
Tags : 
security, threats, ips, intrusion prevention, internet security
    
Panda Security

Benchmarking the Enterprise Road Warrior

White Paper Published By: Motorola     Published Date: Feb 06, 2008
In this paper, Aberdeen details how best-in-class organizations equip and manage their mobile workforce. You can also determine the steps your organization needs to take in order to maximize productivity for your road warriors.
Tags : 
mobility, wireless, remote workers, road warrior, global roaming connectivity
    
Motorola

Banks and Data Leak Prevention

White Paper Published By: Quocirca     Published Date: Feb 05, 2008
The financial services industry deals with a commodity that is primarily electronic — money. Consequently it spends more per employee on IT than any other industry.  Despite this, there is a worrying tendency for information that should be confidential to end up in the public domain. Why is this and what can be done?
Tags : 
quocirca, bank, banks, financial services, finserve
    
Quocirca

Managing Risk for Effective Access Governance

White Paper Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk
    
Aveksa

Are We Doomed? Security Predictions For 2008

Free Offer Published By: ESET     Published Date: Feb 01, 2008
With the ever evolving threat landscape, what will 2008 hold for IT Managers?  This podcast provides a high level overview of a few trends to watch for this year.
Tags : 
2008 predications, it security predictions, it security, mobile devices, laptops
    
ESET

Building a Threat Model for Small and Medium Sized Businesses

Free Offer Published By: ESET     Published Date: Feb 01, 2008
It is important for businesses to have a plan in place that addresses the changing threat landscape.  This podcast discusses various items for businesses to consider when developing an IT threat model.
Tags : 
threat planning, testing, penetration testing, defense in depth, multilayered
    
ESET

AIC Reduces Costs and Boosts Productivity with VMware Infrastructure 3

Case Study Published By: VMware Dell     Published Date: Jan 31, 2008
AIC, Canada’s largest privately held mutual fund company, aimed to shrink their data center footprint and manage IT infrastructure more effectively. With the VMware Infrastructure 3 suite, AIC has been able to handily address its IT challenges and create a scalable, manageable IT infrastructure. Find out how much they saved, and how VMware impacted their organization's workload and productivity.
Tags : 
vmware, virtual, virtualize, virtualization, virtual machine
    
VMware Dell

Aternity Streamlines Software Testing and Deployment with VMware

Case Study Published By: VMware Dell     Published Date: Jan 31, 2008
Aternity, Inc. is the leader in Frontline Performance Intelligence for Global 1000 enterprises. Two of the biggest challenges Aternity faces as a software developer are: 1) testing its software in different IT environments; and 2) deploying its software at customer sites.  Fortunately, VMware software was able to address both these challenges.
Tags : 
vmware, software testing, virtual, virtualization, virtualize
    
VMware Dell

Perimeter Church Simplifies IT Administration with VMware

Case Study Published By: VMware Dell     Published Date: Jan 31, 2008
As Perimeter Church's congregation expanded, their IT staff needed to find a way to meet the growing IT needs of the church with limited staff. Download this case study to learn how the Perimeter IT team has been able to perform its administrative functions much more effectively with VMware technology.
Tags : 
server management, servers, server, virtual server, virtual machine
    
VMware Dell

Virtualization: Not Just for Big Business

White Paper Published By: VMware Dell     Published Date: Jan 31, 2008
A virtualized data center is a more nimble, responsive, and efficient data center. This report discusses the trend towards x86 virtualization and customer benefits, and examines how (in defiance of conventional wisdom) SMB customers have been embracing – and benefiting from – x86 virtualization at about the same rate as larger enterprises.
Tags : 
gabriel, gabriel consulting, vmware, virtual, virtual server
    
VMware Dell

Configuration and Change Management for IT Compliance and Risk Management

White Paper Published By: Tripwire     Published Date: Jan 30, 2008
Learn from industry analysts how IT organizations are using configuration management to meet compliance requirements and instill best practices. Find out how these organizations are applying the resulting processes to enhance security and improve operational efficiency in order to increase their level of service delivery.
Tags : 
cmdb, change management, configuration management, risk management, compliance
    
Tripwire

Securing Mobile Connectivity with Two-Factor Authentication

White Paper Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers
    
Secure Computing

Best Practices for Authenticating Mobile Workers and Securing Data Access

White Paper Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers
    
Secure Computing

Internet-Based Phone Service for Small to Mid-Size Companies

White Paper Published By: Vendor Guru     Published Date: Jan 16, 2008
Small businesses are faced with a difficult task when it comes to selecting or upgrading their telecommunications system. Very often, companies will conduct research based on their current size and where they project they will be in a year.
Tags : 
voip, ip telephony, voice over ip, small business, soho
    
Vendor Guru

40% PCI Non-Compliance? How to Beat The Stats Without Breaking a Sweat

White Paper Published By: Solidcore     Published Date: Jan 15, 2008
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. These PCI requirements exist to protect sensitive data - yet, research indicates that these are among the least satisfied requirements across Level 1 merchants, with almost 40% non-compliance. 
Tags : 
security, monitoring, auditing, compliance, data protection
    
Solidcore

Information Security for SMBs: Ensuring End-to-End Care of Data Assets

White Paper Published By: Quocirca     Published Date: Jan 11, 2008
Small and medium-sized businesses (SMBs) can benefit from the expansive use of information technology (IT) just as much as their larger counterparts. Indeed, in many cases they have to, because to trade they need to interact with business partners of all sizes and IT failure affects not just internal users but those of third parties.
Tags : 
insight report, quocirca, smb, small business, soho
    
Quocirca

Major Concerns for Network and Systems Administrators in 2008

White Paper Published By: GFI     Published Date: Jan 11, 2008
2008 brings with it new challenges and issues that network and systems administrators should be aware of, particularly vulnerabilities brought on by users. This white paper examines the top concerns which network security professionals should be prepared to face in 2008, and how they can be mitigated.
Tags : 
gfi, employees, employee vulnerability, vulnerability management, vulnerability
    
GFI
Start   Previous    168 169 170 171 172 173 174 175 176 177 178 179 180 181 182    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Content Management, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.