> White Papers > Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 1 - 25 of 2798Sort Results By: Published Date | Title | Company Name
By: Citrix     Published Date: Jul 25, 2014
After its extensive vendor evaluation, Gartner has recognized Citrix as a Leader, highlighting strengths in its mobile app portfolio that improve the user experience.
Tags : mobility management, citrix, mobile app, networking
     Citrix
By: Citrix     Published Date: Jul 25, 2014
As organizations embrace smartphones, tablets and mobile applications, they are moving beyond simply providing mobile email and browser capability to offering mobile access to Windows-based and other corporate applications.
Tags : app, mobile, smartphones, tablets, mobile
     Citrix
By: Citrix     Published Date: Jul 25, 2014
Managing mobile devices, data and all types of apps—Windows, datacenter, web and native mobile—through a single solution.
Tags : enterprise, mobility, challenge, data, windows
     Citrix
By: Citrix     Published Date: Jul 25, 2014
Mobile devices and applications are quickly becoming as important and widespread in the enterprise as PCs and traditional business apps. Thanks to the consumerization of IT and bring-your-own-device (BYOD) programs, the workplace has expanded beyond the office and even the home to wherever the user happens to be. Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.
Tags : mobile, enterprise, application gap, pcs, byod
     Citrix
By: Citrix     Published Date: Jul 25, 2014
Android, iOS and Windows-based mobile devices—including smartphones, tablets and everything in between—have transformed enterprise computing, providing new mobility and flexibility for people and IT. At the same time, they compound the challenge of maintaining effective security and privacy of business information. Read this Citrix technical how-to guide—updated for Android 4.4, iOS 7.1, and Windows Phone.
Tags : enterprise information, secure, android, apple ios, microsoft window tablets
     Citrix
By: Citrix     Published Date: Jul 25, 2014
Smartphones, tablets and other mobile devices increase productivity by accelerating decision making and responsiveness. As a result, the number of business users relying on corporate and bring-your-own (BYO) mobile devices continues to grow rapidly—with email serving as the primary app to service customers and facilitate collaboration.
Tags : email, mobile, collaboration, smartphone, tablets
     Citrix
By: Citrix     Published Date: Jul 25, 2014
Learn how Citrix XenMobile can empower your organization to move from traditional corporate issued BlackBerry devices to any user-owned mobile device without sacrificing security and control.
Tags : blackberry, byod, citrix xenmobile, control, security
     Citrix
By: Citrix     Published Date: Jul 25, 2014
Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.
Tags : mobility, management, boyd, secure app, data delivery
     Citrix
By: Citrix     Published Date: Jul 25, 2014
While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.
Tags : secure, mobility, management, checklist, networking
     Citrix
By: Citrix     Published Date: Jul 25, 2014
According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise mobile is not something you can avoid. But you can do it safely. This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.
Tags : enterprise mobile, executive checklist, security, byod, networking
     Citrix
By: Citrix     Published Date: Jul 25, 2014
Discover how to select technologies and develop policies for your BYOD program.
Tags : boyd, simple, secure, technologies, networking
     Citrix
By: Citrix     Published Date: Jul 25, 2014
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.
Tags : network security, application security, compliance, email security, hacker detection
     Citrix
By: Citrix     Published Date: Jul 25, 2014
This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.
Tags : citrix, enteprise mobility, mobile workers, byod, remote access
     Citrix
By: Polycom     Published Date: Jul 24, 2014
Download this survey to learn what 5,000 business professionals around the world say are their biggest collaboration challenges—and discover the strategies they deploy to overcome them. In late 2013, Polycom invited customers and partners around the world to participate in a survey that focused on collaboration challenges. More than 5,000 business professionals from all job levels, functions and vertical sectors responded, candidly sharing insights about their obstacles and the strategies they deploy to overcome them. The survey reveals that 85% of the respondents believe video conferencing helps them achieve their business goals. See how they successfully use video in their profession and how you can leverage technology to defy distance and improve remote collaboration within your organization as well.
Tags : polycom, collaboration video conferencing, defy distance, networking, it management
     Polycom
By: CBeyond     Published Date: Jul 22, 2014
This guide was created to offer a preliminary understanding of Cloud computing, so that business owners and managers will be better positioned to make the move toward Cloud services sooner, rather than later.
Tags : cbeyond, cloud computing, cloud applications, cloud security, virtual applications
     CBeyond
By: OpenText     Published Date: Jul 21, 2014
Learn about Virtual Network Computing and find out how to whether the platform you have selected will be the right fit for your Global Virtual Design Center and what you can do if that is not the case.
Tags : opentext, virtual network computing, system on chip, global virtual design center, vnc
     OpenText
By: OpenText     Published Date: Jul 21, 2014
Learn about Virtual Network Computing and find out how to whether the platform you have selected will be the right fit for your Global Virtual Design Center and what you can do if that is not the case.
Tags : opentext, virtual network computing, system on chip, global virtual design center, vnc
     OpenText
By: Citrix     Published Date: Jul 18, 2014
This Citrix Key Project Design Guide provides an overview of the solution architecture and implementation used in the key project on remote access for enterprise PCs.
Tags : citrix, enterprise pc, remote access, remote network management, network architecture
     Citrix
By: Riverbed     Published Date: Jul 18, 2014
Recent developments and trends such as BYOD, advances in enterprise video technologies, and a proliferation of employee collaboration platforms have prompted more and more organizations to develop comprehensive unified communications (UC) strategies. Compelled by the prospect of reducing communication costs and raising employee productivity, 78% of organizations report they already have a strategic plan and budget in place for at least some components of UC. Download to learn more!
Tags : riverbed, unified communications, communication costs, enterprise video technologies, employee collaboration
     Riverbed
By: AlienVault     Published Date: Jul 16, 2014
“AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : alienvault, alienvault usm, security operations center, smb, javvad malik
     AlienVault
By: CA Technologies     Published Date: Jul 16, 2014
A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.
Tags : improving consumer experience, optimal it service delivery, cloud service management, mobile computing, mobile data systems
     CA Technologies
By: CA Technologies     Published Date: Jul 16, 2014
This paper provides findings and statistics on users demands and an important list of 5 ways to satisfy both business and user demands for IT Service.
Tags : cloud service management, mobile computing, mobile data systems, customer interaction service, service management
     CA Technologies
By: CA Technologies     Published Date: Jul 16, 2014
This paper focuses on the changing demands from consumers and how the right IT Management Solution can help.
Tags : it service management, changing consumer demands, consumer experience, byod, saas
     CA Technologies
By: Riverbed     Published Date: Jul 15, 2014
Application environments and the underlying IT infrastructure that supports them are becoming much more dynamic and complicated. New architectures are being deployed to help accelerate time to market, applications are distributed and modular, leveraging web-based or Service Oriented Architectures (SOA). Read this to learn the latest trends.
Tags : big data, integrated, end-user, experience, it infrastructure
     Riverbed
By: Riverbed     Published Date: Jul 15, 2014
Your business is complex. Big data promises to manage this complexity to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, fueling more complexity, delays, and downtime. Forrester predicts this will inevitably get worse. To combat this onslaught, you can no longer just accelerate current practices or rely on human intelligence. You need machines to analyze conditions to invoke the appropriate actions. These actions themselves can be automated. To perform adaptive, full-service automation, you need IT analytics, a disruption to your existing monitoring and management strategy.
Tags : big data analysis, it analytics, manage, complex, automation
     Riverbed
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search White Papers      

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.