> White Papers > Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 1 - 25 of 2928Sort Results By: Published Date | Title | Company Name
By: cPacket Networks     Published Date: Oct 02, 2014
The modern applications delivery environment is distributed and dependent on data centers and network connectivity. Therefore, users are increasingly dependent on consistent network performance for day-to-day activities. Join Gigaom Research and our sponsor cPacket for “Real-Time Pervasive Network Intelligence for a free analyst webinar on Thursday, Oct 2, 2014 at 10 a.m. PT.
Tags : cpacket, cpacket networks, data center, network intelligence, network performance
     cPacket Networks
By: Nutanix     Published Date: Oct 01, 2014
This webinar will help enterprises understand the fundamentals of web-scale IT and how other companies are using web-scale principles to build private cloud-like environments. Join Gigaom Research and our sponsor Nutanix on Wednesday, October 1, 2014 at 10 a.m. PT.
Tags : nutanix, cloud, convergence, hyperconvergence, virtualization
     Nutanix
By: Global Knowledge     Published Date: Sep 26, 2014
VMware NSX does for networks and physical network components what virtual machines did for data centers and physical servers. It allows you to use them in very different and more flexible ways. In this white paper, you’ll learn how VMware NSX changes the way you build, manage, and secure your network.
Tags : global knowledge, nsx, network, vmware, nsx changes
     Global Knowledge
By: Global Knowledge     Published Date: Sep 22, 2014
Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two devices are directly connected or remotely connected.
Tags : global knowledge, packet delivery, networked device, moving data, directly connected
     Global Knowledge
By: Global Knowledge     Published Date: Sep 22, 2014
Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two devices are directly connected or remotely connected.
Tags : global knowledge, packet delivery, networked device, moving data, directly connected
     Global Knowledge
By: Global Knowledge     Published Date: Sep 22, 2014
Increased interconnectivity via machine-to-machine (M2M) communications, the IoE, and smart systems holds profound implications for how business trends continue to evolve. In terms of M2M growth, key developments in security will be essential, from the design and manufacture of devices to more robust cloud security and ensuring the integrity of wireless data transmissions. Without these safeguards in place, organizations and industries that rely on M2M will continue to place themselves at risk.
Tags : global knowledge, machine to machine communication, m2m, m2m growth, wireless data transmissions
     Global Knowledge
By: Global Knowledge     Published Date: Sep 22, 2014
With VMware's recent release of the Horizon Suite (specifically View 6), VMware has taken the performance and usability features and put them all under the Blast moniker. This category of features is grouped from a marketing perspective but will retain their technical terms in the documentation, similar to how the term vSphere encompasses both ESXi and vCenter. Learn about the various features of the components that comprise the Blast family, including a brief discussion of what they are, improvements in version 6, and any notes or requirements for implementation.
Tags : global knowledge, vmware, esxi, vcenter, blast
     Global Knowledge
By: New Relic     Published Date: Sep 17, 2014
So you’re ready to plunge headlong into DevOps. Right on! You’ve done your homework, and you realize that in order to keep up with the rapid pace of business today, you need to implement DevOps practices at your organization. Yet despite the obvious benefits, such as faster deployments and fewer failures, the rest of your organization may not be so enthusiastic. This eBook will help you familiarize yourself with the common barriers to DevOps adoption so that you can come up with ways to win over the skeptics—and get your organization’s DevOps movement rolling.
Tags : devops, benefits, deployments and fewer failures, successful transition, common barriers
     New Relic
By: Lenovo     Published Date: Sep 16, 2014
Virtual Desktop Infrastructure (VDI) works best for smaller centrally located user bases that share a core set of application and file needs. As the world moves to the web and the cloud, is VDI still a good fit for emerging mobility and BYOD needs for your agency? See this infographic to learn more about the tradeoffs, and what you can do to take advantage of emerging cloud solutions to drive improved mobile productivity across your entire organization.
Tags : vid, cloud alternatives, emerging mobility, mobile productivity, it management
     Lenovo
By: IBM     Published Date: Sep 16, 2014
IBM’s new PowerLinux servers appeal to Linux buyers? Linux buyers are driven by the price advantages that Linux offers as compared with other operating environments (Linux is free open source code) Windows and Unix are chargeable licensed code). Linux buyers, therefore, look first and foremost at the total cost of acquisition of Linux based servers. Linux buyers also want rapid time to value (fast deployment); they often use decentralized procurement processes; they want their Linux servers to be simple to use and manage."
Tags : power-based systems, big data, linux, fast deployment, open source infrastructure
     IBM
By: Centrify Corporation     Published Date: Sep 16, 2014
The major trends challenging IT organizations today are the increasing dissimilarities and hybridization of platforms inside and outside the organization. And the rush to deploy SaaS applications and the explosion in smart phone and tablet devices that users are bringing to work for personal productivity. This fractured identity environment results in significant management challenges for IT, and frustration and lower productivity for users forced to remember multiple usernames and passwords. Unified identity architecture ensures your on-premise Active Directory infrastructure can be securely leveraged to quickly bring servers (UNIX, Linux, and Windows), applications (on-premise, SaaS, and mobile) and endpoints (Mac and Mobile devices) into line with security best practice and compliance. This paper will cover the practical path of unified identity management across multiple platforms including data center, cloud, and mobile.
Tags : data center, cloud and mobile, saas applications, smart phone and tablet devices, directory infrastructure
     Centrify Corporation
By: Centrify Corporation     Published Date: Sep 16, 2014
IT professionals are grappling with not one, but three revolutions at the same time. • First, cloud computing provides easy and dynamic access to information technology. • Next, the ecosystem of cloud-based SaaS applications has exploded thanks to cloud computing. • Finally, this SaaS ecosystem has helped power an even bigger boom of consumer-friendly mobile devices and apps that access SaaS. This Essential Guide examines the opportunities and challenges of empowering, yet controlling, user access to SaaS applications. Specifically, identity management as a service promises to simplify secure access, and management of SaaS applications while reducing password sprawl. This guide will also review how mobile computing has added to the complexity of managing access to both corporate data and SaaS, and additionally help evaluate the options available on the market.
Tags : saas, cloud computing, consumer-friendly, mobile devices, access to saas
     Centrify Corporation
By: Cisco     Published Date: Sep 15, 2014
Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.
Tags : email, web security, quadrant, solutions, threats
     Cisco
By: CA Technologies     Published Date: Sep 11, 2014
This paper provides a number of capabilities your organization should look for in a Service Virtualization solution, enabling your extended teams to get high quality applications to market faster, with lower cost and risk
Tags : service virtualization solution, application testing, getting applications to market, speeding up application delivery time, application integration
     CA Technologies
By: CA Technologies     Published Date: Sep 11, 2014
This paper provides new methods to transform IT into a power node in the corporate network.
Tags : devops, service virtualization, business software, software development, application integration
     CA Technologies
By: Cloudera     Published Date: Sep 10, 2014
Omneo, a Division of Camstar Systems, has built a supply chain cloud solution that runs on an enterprise data hub (EDH) from Cloudera. Omneo's EDH provides electronic device manufacturers with a holistic, comprehensive, and interactive solution that helps them resolve supply chain issues before they impact the customer experience, or worse yet, the bottom line. In this video, various members of the Omneo team will discuss the big data challenge in supply chain and manufacturing, their own technology problems and evaluation for a big data solution, the decision to go with Cloudera, and benefits delivered by their new supply chain cloud solution.
Tags : enterprise data hub, electronic device manufacturers, supply chain, customer experience, cloud solution
     Cloudera
By: Riverbed     Published Date: Sep 05, 2014
Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach could place data at risk. A new kind of storage architecture allows IT to consolidate remote servers and data in the data center by decoupling storage from its server over any distance—even thousands of miles—and still get the same performance as if the storage remained local to the branch. Organizations can now consolidate remote infrastructure to increase security and ef?ciency, without adversely impacting end-user performance in branch of?ces.
Tags : consolidation, servers, remote, storage, isolated islands
     Riverbed
By: Riverbed     Published Date: Sep 05, 2014
The explosion in mobility and the increasing number of ways to connect with the corporate network has created an IT environment that is increasingly difficult to manage, and that leads to inconsistent user experience. Mobile WAN optimization can help overcome many of the challenges of running a distributed environment by improving the performance of critical enterprise applications, which lowers the cost of effectively supporting mobile workers and eliminates the need for many organizations to pursue expensive strategies and upgrades.
Tags : mobile, wan optimization, cut costs, it environment, user experience
     Riverbed
By: Riverbed     Published Date: Sep 05, 2014
The branch office has long been a critical dilemma for the IT organization. Branch offices for many organizations are a critical point of productivity and revenue generation, yet the branch has always come with a tremendous amount of operational overhead and risk. Worse yet, challenges are often exacerbated because the branch office too often looks like a carryover of outdated IT practices.
Tags : convergence, branch office, tco, transforming, operational overhead
     Riverbed
By: Riverbed     Published Date: Sep 05, 2014
Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach is costly and places data at risk. However, a new branch converged infrastructure architecture allows IT to consolidate in the branch office to minimize the IT footprint needed to run branch applications-all the while centralizing remote servers and data in the data center.
Tags : branch, infrastructure, lower costs, consolidation, servers
     Riverbed
By: CradlePoint     Published Date: Sep 04, 2014
In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.
Tags : cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering
     CradlePoint
By: IBM     Published Date: Sep 02, 2014
In this short e-book, learn the top ten ways that IBM Platform Computing customers are using technologies like IBM Platform LSF and IBM Platform Symphony to help obtain results faster, share resources more efficiently, and improve the overall cost-effectiveness of their global IT infrastructure.
Tags : ibm, cloud computing, infrastructure, roi, it spending
     IBM
By: NaviSite     Published Date: Sep 02, 2014
This whitepaper explores the reasons behind changing traditional desktop computing strategies, why cloud-hosted virtual desktops are a compelling solution for many businesses and how to leverage cliud-hosted desktops for windows 7 migrations, mobile and departmental workers, and disaster recovery scenarios.
Tags : virtual desktops, cloud hosted virtual desktops, navisite, remote access, cloud computing
     NaviSite
By: NaviSite     Published Date: Sep 02, 2014
This whitepaper explores the hybrid cloud, the traditional approaches to cloud computing and why companies are not opting for 100% cloud architecture or 100% physical architecture.
Tags : the hybrid cloud, cloud versus physical architecture, mobile computing, mobile workers, cloud computing
     NaviSite
By: NaviSite     Published Date: Sep 02, 2014
This whitepaper is structured for business leaders evaluating enterprise cloud services, and uses real-world customer experiences to examine the business impact of the Cloud.
Tags : the full value of the cloud, the business impact of the cloud, cloud adoption, navisite, mobile computing
     NaviSite
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search White Papers      

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.