> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 576 - 600 of 4630Sort Results By: Published Date | Title | Company Name

Best Practices for Deploying LAN Security and NAC

White Paper Published By: Nevis Networks     Published Date: Sep 04, 2007
Companies are yearning for a solution to guard their network from security risks such as external or untrusted users, and unmanaged endpoints on their internal LAN. NAC technology works well, but a strategic solution is required to fully address the problem of the dissolving network perimeter.
Tags : 
lan, local area networking, nac, access control, network security
    
Nevis Networks

Best Practices for File Sync & Share & Content Management

White Paper Published By: Box     Published Date: Jul 15, 2013
In this Forrester's Wave File Sync and Share Platforms Q3 2013 report, the global research and advisory firm evaluates 16 file sync and share vendors: Accellion, Acronis, AirWatch, Alfresco, Box, Citrix, Dropbox, Egnyte, EMC, Google, Hightail (formerly YouSendIt,) IBM, Microsoft, Novell, Salesforce.com and WatchDox.
Tags : 
best practices, file sync, file share, content management, remote access
    
Box

Best Practices for First-Contact Resolution - Your Performance Driver

White Paper Published By: Citrix Online     Published Date: Jul 01, 2010
This new white paper explores the strategic role first-contact resolution plays in support environments, provides best practices for optimising performance and outlines steps for achieving consistent FCR.
Tags : 
citrix online tech, best practices, first-contact resolution, performance driver, fcr
    
Citrix Online

Best Practices for Localization Kit Preparation

White Paper Published By: Jonckers Translation & Engineering     Published Date: Jul 13, 2010
Download our Localization Kit guide to learn best practices in localization kit development.
Tags : 
jonckers, localization service provider, lsp, software, graphics
    
Jonckers Translation & Engineering

Best Practices for Mobile Application Architectures

White Paper Published By: Sybase     Published Date: Aug 21, 2009
The paper will explore the differences between smart-client and thin-client mobile architectures. It will then examine the details of common smart-client architectures, including what type of back-end systems they integrate with, the types of devices they support, how data is managed within the architecture, and development languages that can be used to build the application.
Tags : 
mobile app, mobile apps, mobile architecture, mobile device, mobile application
    
Sybase

Best Practices for Mobile Application Lifecycle Management

White Paper Published By: IBM MaaS360     Published Date: Jul 09, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
mobile application lifecycle, application lifecycle management, security, malm, app protection
    
IBM MaaS360

Best Practices for Mobile Application Lifecycle Management

White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
maas360, ibm, fiberlink, mobile application, lifecycle management
    
IBM MaaS360

Best Practices for Monitoring the End User Experience within Virtual Desktop Infrastructures

White Paper Published By: Aternity     Published Date: Aug 26, 2011
This whitepaper provides insight, best practices, and recommendations for monitoring the end user experience within Virtual Desktop Infrastructures (VDI).
Tags : 
aternity, vdi, real end user experience, fpi, frontline performance intelligence
    
Aternity

Best Practices for Remote Replication for Oracle 10g Using XP Continuous Access

White Paper Published By: HP     Published Date: Jun 23, 2008
This paper provides a comprehensive set of test-proven best practices for properly configuring, deploying, and operating an Oracle 10g database on an HP StorageWorks XP12000 Disk Array (XP12000) in an HP-UX environment using HP StorageWorks XP Continuous Access Software as the remote copy infrastructure.
Tags : 
replication, remote replication, storageworks, hp disaster proof, disaster proof
    
HP

Best Practices for Server Virtualization in Mission-Critical Healthcare IT

White Paper Published By: Stratus Technologies     Published Date: Feb 12, 2008
This paper provides an introduction to server virtualization for hospitals and healthcare delivery organizations. It also offers best practices you can use to benefit from virtualization, while avoiding missteps that could affect the availability and performance of mission-critical healthcare IT.
Tags : 
server virtualization, virtual, virtual server, virtual machine, healthcare
    
Stratus Technologies

Best Practices Guide to Cisco Enterprise Campus Infrastructure

White Paper Published By: Cisco     Published Date: Oct 08, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides. The best practices conclusions are derived from thorough solution-level end-to-end characterization of various levels of system types, network design alternatives, and enterprise applications.
Tags : 
cisco infrastructure, enterprise network, network design, infrastructure, migration
    
Cisco

Best Practices in Digital Rights Management

White Paper Published By: Neustar Inc.     Published Date: Oct 14, 2013
As the digital universe evolves in both volume and scope, companies must be diligent about protecting their content. Fortunately, companies can easily leverage IP information to protect themselves. This paper explores the best practices of using IP intelligence for digital rights management to reduce risk to online content.
Tags : 
digital rights management, ip intelligence, best practices, neutar, security
    
Neustar Inc.

Best Practices in High Availability Cluster MultiProcessing

White Paper Published By: IBM     Published Date: Feb 25, 2008
IBM HACMP supports a wide variety of configurations, and provides the cluster administrator with a great deal of flexibility. With this flexibility comes the responsibility to make wise choices. This paper discusses the choices that the cluster designer can make, and about the alternatives that make for the highest level of availability.
Tags : 
high availability, backup, recovery, utility computing, network management
    
IBM

Best Practices in Siebel CRM Performance Management

White Paper Published By: Knoa     Published Date: Jul 17, 2007
What is often overlooked is that application performance is just one of three key drivers of return on investment (ROI) from your Siebel application. An efficient infrastructure is critical. It's important to optimize the Siebel application for your own unique business environment, user needs and usage patterns. But, it's all for naught if you do not build and sustain adoption and efficient and effective use of the Siebel application by your end users.
Tags : 
epm, performance management, experience management, knoa, siebel
    
Knoa

Best practices to architect applications in the IBM Cloud

White Paper Published By: IBM Cloud Business     Published Date: Jul 12, 2011
Comprehensive product capability discussed throughout this 15-page technical paper, including 11 Best Practices for the IBM Cloud. Written for IT Managers, IT Architects, and developers, learn how you can better manage SaaS cloud applications and bring new applications on line in the future.
Tags : 
best practice, emerging technologies, ibm corp., managed hosting, software as a service (saas)
    
IBM Cloud Business

Best Practices When Enabling Smart Card Authentication in a KVM System

White Paper Published By: Raritan Inc.     Published Date: Mar 05, 2009
This White Paper examines these considerations in greater detail and defines best practices when evaluating and deploying a Smart Card Authentication solution.
Tags : 
power distribution unit, raritan, pdu, power monitoring, environmental monitoring
    
Raritan Inc.

Best Practices: LAN Security and 802.1X

White Paper Published By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : 
security policies, policy management, authentication, access control, lan
    
Nevis Networks

Betrachtung Ihres WLAN - Technische und budgetmäßige Planung

Live Event Published By: Aerohive     Published Date: Oct 27, 2015
Das Webinar richtet sich an IT-Spezialisten, die mehr über die Möglichkeiten im Bereich WLAN erfahren möchten bzw. an Organisationen, die planen, WLAN einzusetzen oder ihre bestehende WLAN-Infrastruktur zu erneuern.
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive

Better Data Drives Growth

White Paper Published By: Epicor     Published Date: Oct 17, 2016
Why investing in better business intelligence tools is critical to your success
Tags : 
data, success, metrics, business intelligence, success
    
Epicor

Better, faster, stronger: six steps that lead to a better network

White Paper Published By: Logicalis     Published Date: Mar 12, 2014
Steps you can take for a successful network rationalization exercise, and how to make a business case for the project.
Tags : 
logicalis, modular computing, data optimization, cloud computing, network rationalization
    
Logicalis

Beyond the Next Generation: Putting Advanced Network Security To Work

White Paper Published By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : 
data security, ibm, converged network security, security risk, networking
    
IBM

Beyond the Next Generation: Putting Advanced Network Security To Work

White Paper Published By: IBM     Published Date: Jul 15, 2015
In this report, EMA highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application.
Tags : 
network management, network security, enterprise management, security technology, converged security systems
    
IBM

Beyond the Next Generation: Meeting the Converging Demands of Network Security

White Paper Published By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : 
data security, ibm, risk management, network security, security threat
    
IBM

Beyond the Public Cloud: Keys to Understanding Private and Hybrid Cloud Technology

White Paper Published By: Equinix     Published Date: Jul 31, 2012
This GigaOM Pro paper reviews the metrics and the technologies you should consider when migrating to the private cloud. Get your complimentary 10-page report now.
Tags : 
public, cloud, private, technologies, technology
    
Equinix

Beyond the Sandbox: Strengthen Your Edge-to-Endpoint Security

White Paper Published By: Cisco     Published Date: Feb 16, 2016
Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats.
Tags : 
technology, security, security management, malware analysis, network management
    
Cisco
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Content Management, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.