network application

Results 176 - 200 of 643Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jul 08, 2016
Cisco Helped to Deploy the World’s Largest 802.11ac Wave 2 Wireless Network for China University of Geosciences. China University of Geosciences at Wuhan is one of the country’s leading universities and a national key university directly under the Ministry of Education. Focusing on earth science, the university has national level-1 disciplines in geology, geological resources and geological engineering. in science and technology and a leader in applications instruction. Six years ago the university built a wireless network based on 802.11a/b/g—becoming the first university in Wuhan to deploy this type of wireless network—and has become one of the leaders among Chinese universities when it comes to wireless network development.
Tags : 
    
Cisco
Published By: Citrix     Published Date: Jun 15, 2018
To meet the growing challenges of a competitive world economy, a digital transformation is taking place in the enterprise. Organizations realize that to be competitive they need to be more agile. They need to reach their customers wherever they are, and they need to be able to scale their applications to meet customer demands. To meet these challenges, organizations are deploying new microservice applications that are changing the application delivery environment. These applications are agile, configured to enable new features to be added without disrupting applications in production, and designed to automatically instantiate instances in response to increasing user demand. In short, microservices are drastically changing the way that applications are deployed and managed. This introduces a high level of complexity to network infrastructures because traditional applications are not going away. Applications will continue to be designed for both microservices and traditional 3-tier imple
Tags : 
    
Citrix
Published By: Citrix     Published Date: Jun 15, 2018
It used to be that you would build out your datacenter with all the right considerations in place, purchasing equipment that was sized to meet the needs of your organization for today and the near term future. Change used to be merely planning for capacity upgrades or network expansion, or migrating to the latest application version—or more simply put: things we could measure, control and manage. With the advent of the cloud, the rise in cyber-based threats, and the need to do more, faster, we’re witnessing a perfect storm that is making it more and more difficult for the enterprise to plan for change, and to maximize the investments that they make in their IT infrastructure today. This eBook will focus on considerations that you should make when deciding on an ADC solution that can not only survive these changes, but help create opportunities for innovation as the enterprise strives towards digital transformation. This guide will help you understand the changes that are currently unde
Tags : 
    
Citrix
Published By: Citrix     Published Date: Jun 15, 2018
The world of IT is undergoing a digital transformation. Applications are growing fast, and so are the users consuming them. These applications are everywhere—in the datacenter, on virtual and/or microservices platforms, in the cloud, and as SaaS. More and more apps are now being moved out of datacenters to a cloud-based infrastructure. In order for an optimized and secure delivery of these applications, IT needs specific network appliances called Application Delivery Controllers (ADCs). These ADCs come in hardware, virtual, and containerized form factors, and are sized by Network Administrators based on the current and future usage of applications. The challenge with this is that it’s hard to foresee sizing or scalability requirements for these ADCs since users are constantly increasing, and applications are consistently evolving, as well as moving out of datacenters. Complicating matters, most ADCs are fixed-capacity network appliances that provide zero or minimum expansion capability
Tags : 
    
Citrix
Published By: nimsoft     Published Date: Apr 10, 2012
The Nimsoft for Network Monitoring solution provides complete network visibility to assure that the highest levels of business service quality are achieved. Having 360o network visibility is critical to today's network driven business and anything less can have costly bottom line implications.
Tags : 
nimsoft, network monitoring, technology, it management, service, application, analytics, technology management
    
nimsoft
Published By: AppNeta     Published Date: Oct 28, 2013
Let’s face it, users are impatient. They demand a blazingly fast experience and accept no substitutes. While the effects of poor performance are obvious, it makes one wonder about the relationship between client latency and the “perception of speed”. After all, the user can trigger many state change events (page load, submit a form, interact with a visualization, etc.) and all these events have an associated latency to the client. However, are certain types of latency more noticeable to the user then others?
Tags : 
appneta, web applications, applications, applications latency, web applications latency, latency, client latency, time to first byte
    
AppNeta
Published By: AppNeta     Published Date: Oct 28, 2013
6 things you should be doing today to assure fast availability and delivery of your critical web apps.
Tags : 
appneta, applications, application performance, application performance management, web applications, application delivery, network health, latency
    
AppNeta
Published By: Emulex Corporation     Published Date: Nov 07, 2013
Organizations don’t know what’s going on inside their networks, and that’s costing them real money. Deploying an intelligent recording fabric with guaranteed 100% packet capture, accuracy, and storage is fundamental to solving the problem. But how do you embrace the new paradigm? To get started, create a list of the system criteria that are mandatory to delivering reliable and complete visibility information to your engineers, so you can be sure their decision-making is on target. The impact of network performance problems on worker productivity has become a serious business risk. To mitigate it, organizations need to strategically embrace a network recording infrastructure that provides them with accurate, network-wide visibility. Only accurate visibility will empower them to slash maximum and mean response and repair times and keep network-reliant business applications and processes running. Download this Whitepaper for more information.
Tags : 
network monitoring, network visibility, technology, endace, best practices, networking
    
Emulex Corporation
Published By: Avaya     Published Date: Mar 10, 2016
When many of us started out in the networking business, we judged the worth of networking products by their speeds and feeds. Typically, these judgments were made based on which product boasted the best specifications. This methodology was easy and straightforward. It seemed quantitative, and appeared quite defensible.
Tags : 
network management, network secuirty, network optimization, network applications
    
Avaya
Published By: Avi Networks     Published Date: Mar 06, 2018
Vendors such as F5 Networks and Citrix NetScaler have done little to keep up with the needs of modern applications. Learn how deploying the Avi Vantage Platform resulted in TCO savings for global enterprises in our free whitepaper.
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: May 14, 2018
Avi Vantage is the only solution that delivers built-in application analytics in addition to enterprise-grade load balancing and application security. With millions of data points collected in real time, the platform delivers network-DVR like capabilities with the ability to record and display application analytics over specific time intervals (last 15 minutes, hour, day, week etc.) or for individual transactions. These application insights including total round trip time for each transaction, application health scores, errors, end user statistics, and security insights (DDoS attacks, SSL vulnerabilities, ciphers etc.) simplify troubleshooting of applications.
Tags : 
    
Avi Networks
Published By: Ciena     Published Date: Aug 09, 2016
Download this white paper to learn more about these benefits of evolving to a higher-performance network: ? Scales capacity cost-effectively ? Extends the life of existing routers ? Simplifies network operations ? Improves service delivery time ? Lowers network space and power cost ? Supports growing variety of applications
Tags : 
    
Ciena
Published By: Juniper Networks     Published Date: Aug 08, 2017
The constant growth of cloud, IoT, virtualization, mobility, and digital transformation has brought tectonic changes to the world of networking. Long viewed as a bastion of single-purpose, inflexible, and closed solutions, networks have started to transform in line with the demands for flexibility, scalability, ease of management, interoperability, and application support. Networking departments need to achieve all of the tasks above while keeping costs under control. Additionally, security requirements for the new network are not letting up — quite the opposite, as the virtualized network (and general IT) environment requires rethinking, virtualization, and evolution of security architectures.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Cloud, social, big data, and the Internet of Things (IoT) are increasingly central to business decisions as the pace of digitization accelerates. The impact of software-defined networking (SDN), virtualization, and converged and hyperconverged infrastructure within the datacenter is substantial. These technologies add complexity but offer enticing opportunities for new business models, revenue streams, operating efficiencies, and agility that organizations must pursue if they want to remain competitive and viable. This pursuit requires businesses to keep up with current and emerging technologies and applications and transform the ways in which they conduct business. At the core of "keeping up" is an organization's datacenter strategy — with an associated technology and services strategy that will either create industry laggards or accelerate innovators.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
How will you choose a network solution for your data center to deliver the right blend of performance and cost efficiency? Performance isn’t just throughput. It’s also the intelligence to support your applications with a high quality of experience.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
Citrix and Google are collaborating to bring the best, most secure way to deliver virtual apps and desktops from Google Cloud. The Citrix Workspace solutions traditionally installed on data center servers—including Citrix Virtual Apps and Desktops, Citrix Networking, and Citrix Content Collaboration (formerly known as Citrix ShareFile)—are now enabled on Google Cloud Platform services. Citrix enables customers to choose the workload deployment option that best aligns with their enterprise cloud strategy and offers a variety of ways to securely deploy Citrix solutions to meet unique application needs. Whether deployed on-premises, cloud-hosted, as a Citrix Workspace service, or with a service provider—customers choose how much and which components of app workloads to manage and when and where to securely deploy business apps, data, and desktops.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Four Winds Interactive     Published Date: Jul 19, 2019
When it comes to implementing and managing an effective digital signage network, every organization has to start somewhere. Regardless of how many screens you have or what applications you’ve deployed, there’s always something new to learn. But you don’t have to learn every lesson on your own. We’ve compiled a list of tips and best practices from organizations of all sizes—companies with implementations ranging from 10 screens to 2,000 screens. Use this resource to learn from the people that have successfully implemented and scaled digital signage within their organizations.
Tags : 
    
Four Winds Interactive
Published By: Oracle     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle
Published By: Palo Alto Networks     Published Date: Jul 05, 2012
The Application Usage and Risk Report from Palo Alto Networks provides a global view into enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide.
Tags : 
palo alto networks, risk report, application usage, business technology
    
Palo Alto Networks
Published By: BlueCat     Published Date: Aug 20, 2013
To enable always-on application access and business connectivity, you need a rock-solid network foundation. The increasingly complex, dynamic and fluid relationship between networks and devices requires a new approach to IP Address Management (IPAM) – one that unifies mobile security, address management, automation and self-service to provide actionable network intelligence and a broad span of control. This paper discusses the critical role of IPAM in providing a smarter way to connect mobile devices, applications, virtual environments and clouds.
Tags : 
device management, ipam, ip address management, ip management, dns management, dhcp management, network security, network management
    
BlueCat
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: F5 Networks Inc     Published Date: Apr 17, 2012
Learn how to unburden your VDI infrastructure and gain added security, network performance improvements and optimizations, while improving the architecture for non-VDI application specific systems.
Tags : 
virtual desktop, virtual desktop infrastructure, vdi, vdi impact on the network, vdi performance, vdi security, vdi management, vmware view
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Apr 18, 2012
Efforts to reduce capital and operating expenditures by consolidating data centers can fail if applications and network are not optimized. Learn about a consolidation strategy that goes beyond centralizing servers, routers, software, and switches to solve multiple business problems.
Tags : 
data center consolidation, data center virtualization, data center strategies, centralizing services, dynamic data centers, data center transformation, data center network, application delivery
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
The application delivery controller has evolved into a key component of the data center architecture, and enterprises should evaluate ADCs based on how they integrate with this architecture and support more-advanced features, such as user and traffic control and monitoring.
Tags : 
gartner, f5 networks, application delivery, data center architecture, enterprises, adcs, infrastructure, application management
    
F5 Networks Inc
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.