> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 151 - 175 of 1260Sort Results By: Published Date | Title | Company Name
White Paper Published By: SunGard     Published Date: Aug 13, 2012
Whether your business is involved with it yet or not, cloud computing will play a significant role in the future of IT: it has already been enthusiastically embraced by small and medium sized businesses and its potential is also being accepted and exploited by larger enterprises.
Tags : 
services, cloud, infrastructure, cloud computing, significant
    
SunGard
White Paper Published By: Aventail     Published Date: Aug 21, 2009
Today's office is now anywhere that a user can get an Internet connection, a PC on a business partner's network, a handheld at a WiFi hotspot, an airport kiosk, or a computer on a home WiFi network. But secure access is not the only driving business factor remote access must be easy to use and administer as well.
Tags : 
secure remote access, remote access, wireless security, secure wifi, wifi security
    
Aventail
White Paper Published By: IBM     Published Date: Apr 09, 2015
IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Tags : 
ibm, user access, enhanced security, security risk, networking
    
IBM
White Paper Published By: Noction     Published Date: Jan 09, 2014
Service Providers have unique networking challenges as compared to other environments. Factor, differentiating Service Provider`s network from others, is the requirement for 100% uptime. The network stability is crucial to their customers’ business and is, therefore, intolerant to disruptions or outages, which may damage the company`s reputation and market position, or even affect it irreversibly. Downtime risks can no longer be mitigated by simply over-engineering the network, but rather deploying network optimization solutions, based on the intelligent monitoring and automated response, versus manual network troubleshooting and brute force time spending.
Tags : 
network performance, congestion, outages, downtime, hosting
    
Noction
White Paper Published By: Noction     Published Date: Feb 17, 2015
In this white paper you will learn how BGP performance automation ca help you boost network availability, minimize latency and packet loss as well as reduce operational costs by intelligently rerouting traffic across the Internet.
Tags : 
network performance, congestion, outages, downtime, hosting
    
Noction
White Paper Published By: IBM     Published Date: Oct 11, 2016
Gain speed and grow faster with the cloud How to utilize the cloud for your B2B (Business-to-Business) needs and remain focused on the core of your business. Simplify your approach and drive collaboration with your customers and suppliers.
Tags : 
ibm, commerce, b2b, b2b integration, cloud
    
IBM
Webinar Published By: Oracle     Published Date: Dec 17, 2015
View this on demand webcast to learn how the head of eCommerce and CIO of Carolina Biological partnered together to successfully make the switch to digital eBusiness, increase customer loyalty, and reduce costs and time to market.
Tags : 
oracle, webinar, digital ebusiness, customer loyalty, b2b ecommerce
    
Oracle
Webinar Published By: IBM     Published Date: Jan 12, 2009
Retail banks are in a state of transformation all over the world. They must integrate new remote payment systems, digitize process integration and update credit management. Watch this webcast to see how IBM WebSphere Portal is helping these companies deliver targeted information to support decision-making, and to aid in their transformation.
Tags : 
ibm, websphere portal banking initiative, websphere portal, portal solutions for retail banks, updating credit management
    
IBM
White Paper Published By: Network Automation     Published Date: Dec 02, 2008
Baptist Health is South Florida’s largest not-for-profit health care organization, encompassing six major medical facilities and a number of outpatient centers.
Tags : 
network automation, epremis, effective claims processing, networking, it management
    
Network Automation
White Paper Published By: Network Automation     Published Date: Dec 02, 2008
Baylor Medical Center at Frisco (BMCF), outside of Dallas, Texas, is one of approximately 100 hospital facilities run by United Surgical Partners International (USPI). In this large system, BMCF is known as the most profitable medical facility in the entire USPI system.
Tags : 
network automation, material management, automate, networking, it management
    
Network Automation
White Paper Published By: Oracle     Published Date: Sep 30, 2014
To succeed in today’s highly competitive business environment, your company needs to be customer obsessed. Your customers’ digital interactions are the narrative of your brand, and engaging with them proactively through their channels of choice is key to delivering exceptional experiences and creating loyal brand advocates. Download this paper to learn how to deliver connected buying journeys to your customers.
Tags : 
customer, obsessed, marketing, leader, digital
    
Oracle
White Paper Published By: IBM     Published Date: Sep 30, 2013
A transformation is taking place in how people interact and how relationships form and develop and this is changing the way we socialise, the way we work and the way we engage with our customers. The new normal is that customers are leading the conversations that define your brand, competitors are crowd-sourcing ideas to bring new offerings to market and employees are using social media in all facets of their lives, including work. This shift in technology and human behaviour presents an opportunity for organisations to improve everything from reinventing customer relationships to how work gets done. A Social Business embraces networks of people to create business value and activates networks of people that apply relevant content and expertise to improve and accelerate core and ad hoc processes, delivering unprecedented return for the time invested.
Tags : 
ibm, ibm global business services, social media, social business, networking
    
IBM
White Paper Published By: Symantec     Published Date: Jan 10, 2013
Transport Layer Security, widely known as Secure Socket Layer or SSL is the most popular application of public key cryptography in the world. Sometimes, TLS can give illusion of security when it is not. This paper explains TLS and its best uses.
Tags : 
tls, ssl, transport layer security, secure socket layer, best practices
    
Symantec
White Paper Published By: SunGard     Published Date: Aug 13, 2012
Recovery-as-a-Service (RaaS) has been available for some time, and has leveraged a number of infrastructure options and recovery platforms. Many of these options have provided a recovery solution that is flexible, scalable, and secure. And in some cases, service providers offer fully managed solutions with the expertise to support heterogeneous IT environments.
Tags : 
cloud, recovery-as-a-service, raas, infrastructure, platforms
    
SunGard
White Paper Published By: Sightline Systems     Published Date: Apr 29, 2015
The purpose of this article is to provide the performance analyst with a systematic approach to performance evaluation and point out some common mistakes that can be avoided.
Tags : 
performance evaluation, performance analyst, performance metrics, evaluation technique, networking
    
Sightline Systems
White Paper Published By: IBM MaaS360     Published Date: Jul 09, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
mobile application lifecycle, application lifecycle management, security, malm, app protection
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
maas360, ibm, fiberlink, mobile application, lifecycle management
    
IBM MaaS360
Live Event Published By: Aerohive     Published Date: Oct 27, 2015
Das Webinar richtet sich an IT-Spezialisten, die mehr über die Möglichkeiten im Bereich WLAN erfahren möchten bzw. an Organisationen, die planen, WLAN einzusetzen oder ihre bestehende WLAN-Infrastruktur zu erneuern.
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
White Paper Published By: Epicor     Published Date: Oct 17, 2016
Why investing in better business intelligence tools is critical to your success
Tags : 
data, success, metrics, business intelligence, success
    
Epicor
White Paper Published By: Logicalis     Published Date: Mar 12, 2014
Steps you can take for a successful network rationalization exercise, and how to make a business case for the project.
Tags : 
logicalis, modular computing, data optimization, cloud computing, network rationalization
    
Logicalis
White Paper Published By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : 
data security, ibm, converged network security, security risk, networking
    
IBM
White Paper Published By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : 
data security, ibm, risk management, network security, security threat
    
IBM
White Paper Published By: SAS     Published Date: Nov 04, 2015
Big data evolution: forging new corporate capabilities for the long term is an Economist Intelligence Unit report, sponsored by SAS. It explores how far along companies are on their data journey and how they can best exploit the massive amounts of data they are collecting.
Tags : 
sas, big data, big data evolution, economist intelligence unit, eiu
    
SAS
White Paper Published By: IBM     Published Date: Oct 21, 2015
IBM SPSS Solutions offer a straightforward, visual solution that is easy to use on the front end and highly scalable on the back end.
Tags : 
ibm, data, analytics, data scientist, statistician
    
IBM
White Paper Published By: F5 Networks Inc     Published Date: Jul 08, 2009
BIG-IP devices have long been a tool for applying "rolling upgrades" to the applications and systems that sit behind the BIG-IP device. With Live Install, this "stage->reboot->go live" sequence can now be applied to the BIG-IP device directly, creating a rolling upgrade scenario like those of the application systems behind it. Live Install also enables snapshot versioning for future versions of the BIG-IP system, a critical feature for both production and testing environments.
Tags : 
big-ip, tool, application, system, device
    
F5 Networks Inc
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.