> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 4576 - 4600 of 4630Sort Results By:Published Date | Title | Company Name

The Intersection of Security & Compliance: The New Risk Assessment

White Paper Published By: RiskWatch     Published Date: Feb 05, 2007
As corporate security policies and compliance regulations are created to address the increasingly dangerous post 9/11 environment, security risk management is becoming an increasingly important tool in corporate governance. Learn more in this white paper by RiskWatch.
Tags : 
network security, security, compliance, glba, hipaa
    
RiskWatch

Business Rules Extracting (BRE) and Legacy to SOA Auto Re-architecting (L2S) Webcast

Free Offer Published By: Xactis     Published Date: Feb 02, 2007
Learn the 'bottom-up' approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.  This is a "how-to" presentation addressing how to get started and eventually establish an internal L2S Center of Excellence.
Tags : 
soa, service oriented architecture, service-oriented architecture, business rules extracting, legacy system
    
Xactis

Business Intelligence for Mid-Size Organizations: It's Not Just for Industry Giants

White Paper Published By: BusinessObjects     Published Date: Jan 30, 2007
Download this step by step guide to learning how mid-size companies can benefit from Business Intelligence. You'll learn the benefits of BI and why mid-size companies need it for effective decision-making and improved results.
Tags : 
performance management, data quality, msrs, microsoft reporting services, cognos 8
    
BusinessObjects

What's Missing from SEM? Security Management is More than Event Management

White Paper Published By: NetIQ Corporation     Published Date: Jan 29, 2007
This white paper identifies what is required for a comprehensive and integrated security management solution and examines the difference between SEM, SIM and SIEM and the challenges of enterprise level security monitoring.
Tags : 
security management, event management, network security, monitoring, network security
    
NetIQ Corporation

Practical Power Guidelines for VoIP and Internet Telephony Applications

White Paper Published By: Tripp Lite     Published Date: Jan 24, 2007
Voice over IP (VoIP) is exploding in popularity as an application for business data networks. As a result, a company can lower its hardware and service costs while raising productivity through the use of more customizable telephony applications.
Tags : 
voice over ip, voip, ip telephony, call center management, quality of service
    
Tripp Lite

The Integration of Information Security, Integrated Systems Security & Physical Security

White Paper Published By: RiskWatch     Published Date: Jan 23, 2007
The single most important trend in security in the next ten years will be the integration of various security elements such as information security, physical security and integrated systems security into a single security function.
Tags : 
physical security, network security, security management, cso, chief security officer
    
RiskWatch

Enterprise Video Communications

White Paper Published By: Aomega     Published Date: Jan 18, 2007
This white paper summarizes Enterprise Video Communications (EVC) and includes a high level plan to perform an EVC assessment helping ensure deployment success.
Tags : 
video conference, video conferencing, video communications, ip networks, video conference
    
Aomega

Risk Assessment & Compliance: A Management Tool for the IT Security Infrastructure

White Paper Published By: RiskWatch     Published Date: Jan 17, 2007
Risk assessment is the cornerstone of security.  The risk assessment process includes gathering information about the assets of the organizations, including all information assets, and all physical assets.
Tags : 
risk assessment, compliance assessment, risk management, security, it management
    
RiskWatch

Web Hosting Service Company Benefits From XLink SQL & IIS High Availability Software

Case Study Published By: XLink Technology Inc.     Published Date: Jan 15, 2007
At the wake of hurricanes and other natural disasters, Vanguard has taken steps to provide disaster data recovery for its clients.
Tags : 
servers, high availability, data protection, web hosting, backup
    
XLink Technology Inc.

XLink ClusterReplica Enterprise software for SQL and IIS Server High Availability and CDP Protection

White Paper Published By: XLink Technology Inc.     Published Date: Jan 15, 2007
XLink ClusterReplica Enterprise software, based on CDP technology, combines conventional High Availability solutions and Microsoft DPM-like functions to create the next generation of business continuity software. ClusterReplica ENT offers real-time data replication and auto failover for MSSQL, IIS Web Server and File Servers.
Tags : 
servers, data protection, windows server, high availability, data replication
    
XLink Technology Inc.

Neutralizing the Spyware Threat

White Paper Published By: 8e6 Technologies     Published Date: Jan 12, 2007
Add spyware to the list of urgent security concerns. With resources already stretched thin in fighting viruses and stopping spam, companies now also have to defend against a threat that strikes silently and does much of its damage before it’s even detected.
Tags : 
spyware, anti spyware, malware, vulnerability management, anti virus
    
8e6 Technologies

Templates for More Efficient Virtualization Management

White Paper Published By: SWsoft     Published Date: Dec 12, 2006
Using templates, administrators can consolidate OS and application management so that only a single instance of a software package is required and managed on a physical machine regardless of the number of virtual environments that use the software.
Tags : 
virtualization, servers, networking, server virtualization, swsoft
    
SWsoft

Murphy Exploration and Production Company, Improves Server Manageability and Flexibility

Case Study Published By: SWsoft     Published Date: Dec 12, 2006
When Katrina hit in 2005, Murphy Exploration and Production Company, USA was among the many companies impacted by the devastation. Challenged to implement a new infrastructure quickly with more business continuity considerations, Murphy deployed Virtuozzo across its server infrastructure.
Tags : 
disaster recovery, business continuity, swsoft, infrastructure, servers
    
SWsoft

Using Neterion 10 GbE for Enterprise iSCSI Storage

White Paper Published By: Neterion     Published Date: Dec 05, 2006
The relentless growth of data and network-intensive applications such as digital imaging, multimedia content, and broadcast/video continues to drive volumes of enterprise data and network traffic. As growth continues, IT managers are challenged with implementing solutions without interrupting critical business processes.
Tags : 
network infrastructure, traffic management, bandwidth management, bandwidth, network management
    
Neterion

Enabling Virtualization in the Datacenter

White Paper Published By: Neterion     Published Date: Dec 05, 2006
Virtualization is a key strategy for simplifying deployment of IT resources and maximizing their utilization. Specifically, virtualization refers to the concept of abstracting physical resources such as compute cycles, data storage, and network bandwidth, and then provisioning and sharing these resources amongst multiple applications.
Tags : 
virtualization, data center, data centers, datacenters, resource management
    
Neterion

Enabling Cost Effective Global Enterprise Storage Area Networks Using 10 Gigabit Ethernet

White Paper Published By: Neterion     Published Date: Dec 05, 2006
The demands on Storage Area Networks (SANs) go far beyond where they were only a few years ago. It is no longer good enough to just provide a large pool of scalable storage with good performance.
Tags : 
gigabit, storage area network, ethernet, sans, storage area networks
    
Neterion

The Role of Ethernet in Consolidation and Virtualization

White Paper Published By: Force10 Networks     Published Date: Dec 04, 2006
This white paper explores the technologies needed to ensure businesses are prepared to meet the new challenges and opportunities of the emerging “answer economy”.
Tags : 
virtualization, ethernet, it consolidation, consolidation, data center
    
Force10 Networks

Building Scalable, High Performance Cluster and Grid Networks: The Role of Ethernet

White Paper Published By: Force10 Networks     Published Date: Dec 04, 2006
With Grid computing, computer systems and other resources aren’t necessarily constrained to be dedicated to individual users or applications, but can be made available for dynamic pooling or sharing to meet the changing needs of the organization.
Tags : 
ethernet, cluster, grid computing, performance cluster, utility computing
    
Force10 Networks

Cenzic Software: Identity Theft Laws And Application Security

White Paper Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps companies comply with AB 1950, allowing companies to use automated processes to manage their security. Hailstorm is a key tool for preventing breaches.
Tags : 
identity theft, application security, password management, security management, compliance
    
Cenzic

Application Security: No Room for False Positives

White Paper Published By: Cenzic     Published Date: Nov 21, 2006
Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.
Tags : 
application security, web application security, hacker detection, cenzic, cenzic hailstorm
    
Cenzic

Fresh Approaches to Solving the Malware Problem

White Paper Published By: Secure Computing     Published Date: Nov 20, 2006
Organizations need to be protected from both known and unknown threats, and all the varieties and forms that sophisticated malware can take.  Learn about the changing nature of malware attacks and how the Webwasher Anti-Malware from Secure Computing can provide a highly effective defense against malicious content.
Tags : 
anti spam, anti spyware, anti virus, application security, security
    
Secure Computing

Log Law: Is Your Log Data Guilty?

White Paper Published By: NetIQ Corporation     Published Date: Nov 18, 2006
This white paper is a must read for those involved in the process of log management for legal use. You'll examine the admissibility of log data in court cases; maintaining the authenticity of log data; and how log data can be attacked and stand up to scrutiny. And, learn legal terms like Hearsay, Best Evident Rules, etc.
Tags : 
log file, data protection, log management, legal log, log data
    
NetIQ Corporation

How Fast-Growing Companies Obtain CRM Success

White Paper Published By: NetSuite     Published Date: Nov 18, 2006
This white paper reveals the most vital elements needed to develop a seamless value chain; one that realistically enables an SMB to develop valuable 2-way relationships with their most valuable customer segments.
Tags : 
crm, customer relationship management, smb, small business networks, customer service
    
NetSuite

Application Software Testing: A Practical Guide to Improving Software Quality

White Paper Published By: SoftLanding Systems     Published Date: Nov 18, 2006
This no-nonsense primer covers the benefits and basic principles of good testing, offers practical advice for getting the most out of your testing efforts, and pinpoints several areas where automation will help you achieve the most cost-effective results.
Tags : 
software testing, quality assurance, application testing, test and measurement, database development
    
SoftLanding Systems

Introducing Symantec Backup Exec 11d for Windows Servers

Webinar Published By: Symantec     Published Date: Nov 17, 2006
The latest release of Backup Exec allows you to eliminate backup windows and recover individual Exchange messages, folders, and mailboxes - without mailbox backups. Learn more about how Symantec Backup Exec™ 11d for Windows® Servers provides continuous, cost-effective, and high-performance disk-to-disk-to-tape backup and recovery for Windows server data.
Tags : 
disaster recovery, backup and recovery, storage management, network management, network performance
    
Symantec
Start   Previous    172 173 174 175 176 177 178 179 180 181 182 183 184 185 186    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Content Management, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.