> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 501 - 525 of 1799Sort Results By: Published Date | Title | Company Name
White Paper Published By: Cisco     Published Date: Aug 24, 2015
This buyer’s guide provides an in-depth explanation of the factors that impel organizations to look at next-generation security solutions. It also offers: -An analysis of the capabilities you should look for (and demand) in your network security solutions -Arms you with the information you need to be an educated buyer -Helps you get what you need, and not a set of future capabilities packaged in a “marketecture” that you can’t deploy
Tags : 
network security, buyer's guide, next-generation security solutions, security solutions, networking
    
Cisco
White Paper Published By: SnapLogic     Published Date: Aug 17, 2015
Five key drivers to engage stakeholders of data and application integration disciplines to articulate, intersect and work together.
Tags : 
converging applications, data integration, deployment costs, saas, application integration
    
SnapLogic
White Paper Published By: SnapLogic     Published Date: Aug 17, 2015
This report summarizes the changes that are occurring, new and emerging patterns of data integration, as well as data integration technology that you can buy today that lives up to these new expectation
Tags : 
data integration, cloud computing, mass data storage, integration requirements, integration strategies
    
SnapLogic
White Paper Published By: Cloud Sherpas     Published Date: Aug 10, 2015
This white paper outlines exactly what the Google solution delivers and the top five reasons why more enterprises are choosing to move to the cloud with Google every day.
Tags : 
google enterprise solutions, google cloud applications, business cloud apps, google apps for business training, google app migration
    
Cloud Sherpas
Free Offer Published By: CDW     Published Date: Aug 07, 2015
How you benefit from VMware vSphere with Operations Management
Tags : 
data center, storage, cloud, risk management, data center design and management
    
CDW
White Paper Published By: CDW     Published Date: Aug 07, 2015
Like many, you may find that you lack the time and resources to adequately extend Disaster Recovery (DR) to safeguard all aspects of your organization. As a result, gaps in DR coverage put your business at risk.
Tags : 
cloud, storage, data center, disaster recovery, data center design and management
    
CDW
White Paper Published By: Platfora     Published Date: Aug 03, 2015
A survey of more than 395 C-level executives, sponsored by Platfora, shows that senior leaders are optimistic about the capabilities of big data, but many still struggle with big data applications.
Tags : 
platfora, big data, hadoop, data center, big data analytics
    
Platfora
White Paper Published By: Cisco     Published Date: Jul 30, 2015
Read this Miercom Report on Cisco Catalyst 3650 as part of the Business Decision Series
Tags : 
cisco, catalyst 3650, test results, miercom report, networking
    
Cisco
White Paper Published By: Cisco     Published Date: Jul 30, 2015
Read this white paper to learn of the comparison analysis between cisco catalyst 4500E and the Brocade FastIron SX 1600
Tags : 
cisco, brocade fastiron, catalyst 4500e, network, networking
    
Cisco
White Paper Published By: Cisco     Published Date: Jul 30, 2015
Guidelines and products that tie together.
Tags : 
industrial enterprise, manufacturing, connected factory, convergence, automation
    
Cisco
White Paper Published By: Basho     Published Date: Jul 29, 2015
Download this white paper to learn why Riak KV Enterprise is especially suited to fulfill your Enterprise NoSQL requirements including operational simplicity.
Tags : 
nosql, riak kv enterprise, enterprise nosql, operational simplicity, applications
    
Basho
White Paper Published By: F5 Networks Inc     Published Date: Jul 27, 2015
Today, enterprises are extending their businesses by using more web-based and cloud-hosted applications, so a robust and agile web application firewall (WAF) isn't a luxury--it is a requirement. This whitepaper breaksdown some of the key factors you should consider when selecting a WAF to protect your business.
Tags : 
web application firewall, waf, cloud-hosted applications, it solutions, it security
    
F5 Networks Inc
White Paper Published By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.
Tags : 
shadow it, hybrid cloud management, visibility, network security, cloud traffic
    
XO Communications
Case Study Published By: XO Communications     Published Date: Jul 22, 2015
Gannett views its private cloud and WAN capability as a strategic core competency and was looking for a strategic partner to support its growth and cloud initiatives. XO embraced this partnership and earned the trust of the media giant by providing superior technical expertise, smooth implementations, and responsive customer support.
Tags : 
gannett, private cloud, xo mpls ip-vpn wan, scalability, strategy
    
XO Communications
Case Study Published By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.
Tags : 
xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, networking
    
XO Communications
Webinar Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : 
security threats, trend micro, security solutions, mobile devices, network
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : 
networking, security, it management
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro
Tags : 
trend micro, targeted attacks, security solutions, technology, networking
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro
Tags : 
mobile security, apps, cyber criminals, cyber security, trend micro
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro
Tags : 
security solution, cyber attack, mobile devices, business security, user protection
    
CDW-Trend Micro
White Paper Published By: IBM MaaS360     Published Date: Jul 09, 2015
Volume III: Now that you know the app management basics, it’s time to learn not all apps are developed equally. Nor should they be; learn the layered security options for apps based on the privacy of data passing.
Tags : 
app management, app security, privacy, data passing, mobile app
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jul 09, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
mobile application lifecycle, application lifecycle management, security, malm, app protection
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jul 09, 2015
Mobile productivity necessitates instant and easy access to retrieve, edit, share and send corporate data from anywhere. In this paper we’ll explore the rapid workplace productivity transformation of securing enterprise content so employees can use smartphones and tablets to run all business from the palms of their hands.
Tags : 
mobile content management, mobile productivity, corporate data, access, workplace productivity
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jul 09, 2015
To maximize mobility, a nuanced strategy is the order of the day. For mobility’s transformative potential to be realized, IT needs to become a business partner that understands business drivers and then devises the technology roadmap to support everyone’s goals. Read this paper to learn more about mobility management.
Tags : 
enterprise mobility management, technology roadmap, mobile devices, networking, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jul 09, 2015
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.
Tags : 
byod, mobile devices, smartphone, tablet, networking
    
IBM MaaS360
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End


Sub-Categories: Data Center Design and Management

Search      

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com