> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 76 - 100 of 1260Sort Results By: Published Date | Title | Company Name
White Paper Published By: Avi Networks     Published Date: Mar 17, 2016
A five-year-long quest for software-defined application delivery and services came to a fruitful end for this $4 billion enterprise when they chose Avi Networks and Cisco ACI as part of their move to a next generation data center architecture. Avi Networks represented the perfect complement to the network automation benefits delivered by Cisco ACI at the company.
Tags : 
avi networks, cisco, aci, application services, software defined application delivery
    
Avi Networks
White Paper Published By: Basho     Published Date: Jul 29, 2015
Download this white paper to learn why Riak KV Enterprise is especially suited to fulfill your Enterprise NoSQL requirements including operational simplicity.
Tags : 
nosql, riak kv enterprise, enterprise nosql, operational simplicity, applications
    
Basho
White Paper Published By: Basho     Published Date: Apr 13, 2015
Today’s consumers expect instant access to communications services whether they’re in the office, at home, or on the road. With data speeds increasing and international roaming costs decreasing, data usage is rapidly growing. Telecommunications Service Providers (TSPs) are under pressure to deliver more services to more people and approach 100% uptime all while lowering prices to consumers. Traditional relational databases can’t meet the requirements for massive scalability, availability, and fault tolerance that the rapid growth in data usage and rise of big data demands. Read this solution brief to learn how Riak excels at these. Riak is a distributed NoSQL database optimized for big data. Riak meets many of the challenges you may be facing with your own service operations systems.
Tags : 
riak, basho, telecommunications service provider, license fees, scalability
    
Basho
White Paper Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management
    
Bitium
White Paper Published By: BitSight Technologies     Published Date: Jan 11, 2016
Need some assistance with the creation of your vendor security risk assessment? This eBook contains vital questions you should be incorporating into your vendor risk management program.
Tags : 
networking, it management, knowledge management, data management, business technology
    
BitSight Technologies
White Paper Published By: BitSight Technologies     Published Date: Jan 11, 2016
Why does the cyber security performance of several industries differ? Download the latest BitSight Industry Benchmarking report to find out.
Tags : 
networking, it management, knowledge management, data management, it career advancement
    
BitSight Technologies
White Paper Published By: BitSight Technologies     Published Date: Jan 11, 2016
As third party data breaches have increased in recent years, regulators and organizations have moved from relying solely on static questionnaires and assessments, to continuously monitoring the security of vendors. Learn how financial institutions have adopted a continuous monitoring approach for their vendor risk management programs.
Tags : 
networking, it management, knowledge management, data management, it career advancement
    
BitSight Technologies
White Paper Published By: BitSight Technologies     Published Date: Jan 11, 2016
Is Illegal File Sharing Occurring Within Your or Your Vendors’ Cyber Ecosystem? Learn about the risks posed by peer-to-peer file sharing and why you should be monitoring this activity.
Tags : 
networking, it management, data management, it career advancement, business technology
    
BitSight Technologies
White Paper Published By: BitSight Technologies     Published Date: Feb 20, 2015
Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.
Tags : 
networking, software development, it management, knowledge management, storage
    
BitSight Technologies
White Paper Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
This document describes enterprise virtualization today and the anticipated uses of this technology, particularly leveraging the capabilities provided by widespread adoption of 10 Gigabit Ethernet (10GbE) as a single, converged network fabric.
Tags : 
blade network technologies, next-generation datacenter networks, virtualization today, 10gbe, network virtualization
    
BLADE Network Technologies
White Paper Published By: Blue Coat Systems     Published Date: Jun 26, 2013
As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from BlueCoat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.
Tags : 
saas, application, line-of-business owners, lobs, software-as-a-service
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
virtualization, security, consolidation, data, infrastructure
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.
Tags : 
network, bandwidth, saas, application, optimize traffic
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile threats, security, cloud, application
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Jun 26, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
secure web gateway, web-based threats, web, solution, technology
    
Blue Coat Systems
White Paper Published By: BlueArc Corporation     Published Date: Apr 24, 2008
It’s no secret: The scale and pace of business change today is challenging all of us to do more -- better, faster and with ever greater efficiency. Customers are demanding more and wanting it now. Market expectations for product and process innovation are growing. Mergers and acquisitions in many industries are at or near all-time highs. Complex global supply chains and highly distributed organizations are the norm.
Tags : 
bluearc, it management, networking
    
BlueArc Corporation
White Paper Published By: BMC ESM     Published Date: Aug 20, 2009
Using the five step process outlined in this white paper, we were able to eliminate more than 2,000 servers from our own IT infrastructure, saving an estimated $10 million dollars in data center costs.
Tags : 
data center consolidation, it infrastructure, bmc, esm, capacity
    
BMC ESM
White Paper Published By: BMC ESM     Published Date: Aug 20, 2009
Can consolidating your data center yield long-term savings sufficient enough to warrant the project? There is no doubt. By right-sizing your data center, you can often recoup the project costs in months, not years.
Tags : 
data center consolidation, consolidation, data center, bmc, cobit
    
BMC ESM
White Paper Published By: BMC ESM     Published Date: Aug 19, 2009
Would you trust your network monitoring tools enough to know when something is truly halting a business service? While Mary Nugent won’t use this podcast to attempt to tell you technical details on the correct alarming thresholds, she will share some excellent stories about predicting a system’s behavior. Run Time: 11:30.
Tags : 
network, networking, monitoring, podcast, bmc
    
BMC ESM
White Paper Published By: BMC ESM     Published Date: Aug 19, 2009
Data Centers consume more energy than any other environment in most companies. This paper presents a holistic approach that addresses Green IT within the broader context of increasing business service efficiency and reducing the cost of IT.
Tags : 
bmc, data center, green, green it, energy costs
    
BMC ESM
White Paper Published By: BMC ESM     Published Date: Aug 19, 2009
Virtualization adds a whole new level of complexity to the IT infrastructure, introducing new challenges in every step of the process – from planning to configuration and management. Read how effective service management can help tackle the challenges of virtualization in this white paper from BMC Software.
Tags : 
bmc software, virtualization, service management processes, service management solutions, virtualization enabled
    
BMC ESM
White Paper Published By: BMC ESM     Published Date: Aug 19, 2009
The paper discusses the agility enabled by virtualization, the resulting control challenges, and a way to meet those challenges. It describes seven major requirements for success and reviews how the BMC/VMware approach helps IT ensure control over the virtualized data center and maintain compliance with corporate policies and government regulations.
Tags : 
bmc software, virtualization, vmware, virtualized data center, networking
    
BMC ESM
White Paper Published By: BMC Software     Published Date: Oct 23, 2014
Rapid shifts in the ways that technology and information are consumed and delivered— through cloud computing, big data, social networking, and smart devices—are transforming how companies compete. IT is at the center of the fray, working with business leaders to develop and execute a digital transformation strategy that capitalizes on these major new technologies. In order to lead this transformation, IT executives must focus on three areas: collaborating with business leaders to build a strategic vision, modernizing technology infrastructure, and rebuilding IT organizations to execute against new digital business goals.
Tags : 
saas, cloud, itsm, integrating itsm, itsm integration
    
BMC Software
White Paper Published By: BMC Software     Published Date: Oct 23, 2014
Gartner clients often ask for a comparison of BMC and ServiceNow as viable strategic partners in the ITSSM tool space. Both vendors provide strong ITSSM offerings and benefit from excellent global brand recognition, but the similarities end there. Outside of ITSSM, BMC and ServiceNow are two different companies with two different strategic road maps. Choosing between BMC and ServiceNow requires IT organizations to determine how value will be gained beyond the use of their ITSSM offerings.
Tags : 
itssm, strategic partners, it organizations, itsm integration, saas
    
BMC Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.