bandwith

Results 1 - 22 of 22Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.     
Tags : 
cloud, applications, network, bandwith, saas
    
Blue Coat Systems
Published By: Cleversafe     Published Date: Mar 29, 2013
Cloud applications and web-based services, such photo sharing sites, create some monumental challenges for a storage infrastructure.
Tags : 
raid, cloud storage, storage, replication, capacity, bandwith, efficiency, web applications, backup and recovery, network attached storage, storage management, storage virtualization, application integration, application performance management, best practices, business technology
    
Cleversafe
Published By: Equinix     Published Date: Oct 20, 2015
The cloud is impacting WAN architectures. IT leaders looking to use a cloud-based infrastructure and/or application services, especially high-bandwidth, real-time voice and video over Internet Protocol applications, should strategically locate communications hubs outside the enterprise data center.
Tags : 
communication hubs, wan architectures, cloud-based infrastructure, application services, high-bandwith, networking, enterprise applications
    
Equinix
Published By: Citrix Systems     Published Date: Nov 10, 2014
Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates the performance of several Citrix NetScaler ADC models vs. that of comparable products. Learn how NetScaler fared and provided up to 480% the performance of F5.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security, data management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security, data management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
For the first time in several years, there has been a sharp increase in denial of service (DOS) attacks. In the past, these attacks have been directed at the networks of large companies. Now we are seeing the emergence of attacks targeting smaller companies and higher layers in the computing stack. Intruders are using low-bandwidth attacks disguised as legitimate transactions to bypass firewalls and basic intrusion prevention measures. Organizations need a better way to combat and prevent these attacks, and the right ADC can provide the solution. Learn how Citrix NetScaler can help protect against DOS attacks in the report, Citrix NetScaler: A Powerful Defense Against DOS Attacks (link).
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security, data management
    
Citrix Systems
Published By: Comcast Business     Published Date: Mar 24, 2015
For today’s businesses, fast Internet access is more than a competitive advantage. It is an operational necessity. Changes in the way companies are working – and the tools they are using – have created the need for high-speed connections to services and individuals off-site. Across the country, in-house servers are rapidly being replaced by cloud-based infrastructure. Videoconferencing is helping businesses cut travel costs. Mobile devices – with easy links to work-related content – are enabling more employees to be more productive, from any location. All of these applications have one factor in common: they require bandwidth. And plenty of it. Download this white paper to learn more about high-speed internet connections.
Tags : 
dsl, high-speed internet, cable, internet connection, productivity, bandwith, enterprise applications, data management
    
Comcast Business
Published By: Comcast Business     Published Date: Mar 24, 2015
New research findings, new technologies, and the evermore urgent needs for speed and cost-efficiency are converging to drive a revolution in medicine. Supporting this convergence are high-speed secure telecommunications networks, enabling unprecedented teamwork among institutions, researchers, practitioners and patients to create a new paradigm: telemedicine, the exchange of medical information via electronic communications among dispersed facilities and patients to improve patient health. Download this white paper to learn more about telemedicine.
Tags : 
bandwith, ethernet communications, medicine, telemedicine, telecommunications, healthcare technology, networking, it management, wireless
    
Comcast Business
Published By: Comcast Business     Published Date: Mar 24, 2015
Today’s K-12 schools are hungry for bandwidth. The reason is clear: highperforming, reliable and easily expanded network services support the latest classroom innovations, including videoconferencing, 1:1 computing, distance learning and modern learning management systems. It’s no surprise then that progressive educators now see a direct link between the overall success of their school districts and access to high-capacity networks. This emerged as a clear trend in new research by the Center for Digital Education (CDE) — a commanding 98 percent of administrators and IT representatives said the future of K-12 education hinges on ubiquitous connectivity. This white paper lays a framework for planning and implementing high-performance networks. In addition to explaining why now’s the time to plan network upgrades, this paper answers one of the fundamental questions asked by IT managers at schools everywhere: “How much network capacity will we actually need?”
Tags : 
education, network modernization, high-performance networks, bandwith, classroom innovations, networking, it management
    
Comcast Business
Published By: Comcast Business     Published Date: Mar 24, 2015
The introduction of bandwidth-intensive learning applications, including video and peer-to-peer applications in teaching has fundamentally transformed the way teachers teach and students learn. The federal E-rate program has forever changed the technology landscape of school districts and libraries in the United States. Receiving funding is not guaranteed, and following the E-rate process and procedures is critical – especially when thousands, even millions, of dollars are at stake for your district. The rewards that new, education-specific cutting edge education applications deliver to the classroom far outweigh the effort required to participate in the program. This paper briefly examines the promise of new, education-specific applications, the advanced network services that enable them, and the role of the E-rate program.
Tags : 
application-enabled learning, education, funding, bandwith, education applications, e-rate program, networking, it management, telecom
    
Comcast Business
Published By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to learn 7 reasons why you should centralize your communications. - Lower fixed costs - Less "stranded" bandwith - Free site-to-site calling - Simplified business continuity planning - Reduced staffing requirements - Consistent feature set across sites - Centralized management
Tags : 
business communications, phone system, centralization, scalability
    
XO Communications
Published By: Aerohive Networks     Published Date: May 06, 2015
Learn how organizations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.
Tags : 
wi-fi, security, network security, bandwith limitations, ssid
    
Aerohive Networks
Published By: Silver-Peak     Published Date: Mar 21, 2012
What is the secret sauce of WAN Optimization (WAN Op)? First time users are always amazed at the performance results. Download now to learn about the cool technologies behind today's leading WAN Op architecture.
Tags : 
wan optimization, technology, silver peak, wan op, bandwith, data center design and management
    
Silver-Peak
Published By: Silver-Peak     Published Date: Mar 21, 2012
Noted author Jim Metzler reports on the emergence of vWOCs, or virtual WAN Optimization Controllers. From the data center to the branch, virtualization is enabling a revolution in how WAN optimization is acquired and deployed. Whether combined with traditional physical appliances or fully virtualized, the new choices make universal network optimization a reality.
Tags : 
virtualization, technology, data center, data management, wan, wan optimization, vwoc, router, bandwith, data center design and management
    
Silver-Peak
Published By: Silver-Peak     Published Date: Mar 21, 2012
This whitepaper shows how you can finally meet your recovery objectives, provide seamless failover between multiple sites, improve remote application performance, and lower your ongoing bandwidth costs.
Tags : 
wan, optimization, technology, network management, bandwith
    
Silver-Peak
Published By: Silver-Peak     Published Date: Mar 21, 2012
Choose the hypervisor flavor of your choice. Download the software. Get the license keys in your mailbox. And off you go. No sales call. No waiting.
Tags : 
wan optimization, wan op, silver peak, technology, network management, network performance, bandwith
    
Silver-Peak
Published By: Silver Peak     Published Date: Feb 12, 2013
When faced with their EqualLogic replication not completing due to limited WAN bandwidth and consistently missing their RPO, ZLTO needed a solution. Learn how Silver Peak’s virtual appliances reduced their bandwidth used for replication by 86%.
Tags : 
wan, bandwith, rpo, zlto, virtualization, data center, replication
    
Silver Peak
Published By: VeloCloud Networks     Published Date: Dec 19, 2014
Delivering combination of real time voice, video, and data is bandwidth intensive and requires complex network configuration to ensure the delivery of these time sensitive applications. Download this paper to learn the recent WAN technology trends to enable companies to roll out and support UC without the cost and complexity of traditional WAN.
Tags : 
velocloud, cloud-delivered, wan, real time video, bandwith, software development
    
VeloCloud Networks
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.
Tags : 
distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks, business logic attacks, security, protections, data loss prevention, attack tools, network reconnaissance, low-bandwith asymmetric attacks, anti-attack technology
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This white paper examines the DDoS threat spectrum including conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
Tags : 
distributed denial of service, ddos, ddos threat spectrum, network attacks, conventional network attacks, http floods, ssl floods, low bandwith threats, threat vectors, service platforms, mitigation
    
F5 Networks Inc
Published By: SonicWall     Published Date: Sep 10, 2009
Hear real-world examples of how companies like yours consolidated their security to lower their total cost of ownership, optimized existing resources, increased their security and dramatically improved productivity!
Tags : 
sonicwall, free pcmagcast webinar, unified threat management, a different, efficient, costly bandwith, consolidating multiple solutions, run bandwidth on your web 2.0 apps, long term costs of owning solutions, potamac hospital, sonicwall clean wireless solution, integrates wireless access points, utm firewall, deep packet inspection technology
    
SonicWall
Published By: Comcast Business     Published Date: Apr 25, 2013
Learn how an Ethernet dedicated Internet access service will reduce IT costs and increase your bandwidth options.
Tags : 
ethernet, t1s, internet access, dia, dia services, cost effective, roi, bandwith, it costs
    
Comcast Business
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com