connection

Results 376 - 400 of 433Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Apr 23, 2008
Imagine using your personal desktop on any computer. You can, with the IBM Virtual Client Solution. This demo explains the backend process of server-hosted services, shows how a user’s desktop is delivered through a remote connection, and demonstrates how an administrator can shift servers for IT simplification without interrupting users.  Watch the demo now.
Tags : ibm, ibm opt it, opt it, remote desktop, vnc, virtual client, virtual machine, virtual desktop, remote access
     IBM
By: IBM     Published Date: May 30, 2008
The productivity and bottom line of most businesses have benefited greatly from the increasing pace and pervasiveness of technological support. In the process, the community that characterizes and supports businesses of all sizes has been given short shrift. In this Clipper Group paper, read about IBM Lotus connections, the tool that will help your team to collaborate as efficiently as possible.
Tags : ibm, ep campaign, ibm ep, productivity, lotus, lotus connections, desktop management, collaboration
     IBM
By: iDirect     Published Date: Aug 21, 2009
With developments in IP networking in general and the Internet in particular, the ability to transmit voice calls which have been traditionally handled by the public switched telephone network (PSTN) over a lower cost IP infrastructure has become a reality. More and more users are researching VoIP capability when purchasing a connection to the Internet or simply expanding their private intranet.
Tags : voice over ip, ip telephony, voip, ip networking, ip networks, pstn, telephone, phone, telecom, telecommunications, ip infrastructure, infrastucture, idirect
     iDirect
By: Internet Security Systems     Published Date: Aug 21, 2009
Mobile and remote workers of all types need high-quality connections to the Internet and to their corporate networks. They need connections from branch offices, homes, airports, hotels and other locations around the world. This truly becomes a security challenge as network managers scramble to meet these needs.
Tags : mobile workforce, remote access, network security, wireless security, off-site, remote workers, internet security, internet security systems
     Internet Security Systems
By: Meru Networks     Published Date: Aug 21, 2009
As wireless LAN deployments and usage has increased, coupled with the near ubiquity of embedded Wi-Fi in laptops and smart phones, many enterprises are experiencing complaints from their users of slow or even dropped connections.
Tags : wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells, macrocell, macrocells, wlan reliability, virtual cell, meru, meru networks
     Meru Networks
By: Reactivity     Published Date: Aug 21, 2009
This white paper discusses the three critical Web services deployment issues-security, provisioning connections, and operations. As each is owned by different factions within an enterprise, each can become a 'show stopper' to Web services deployment initially, and every time a change must be made.
Tags : web service security, secure web services, web service, internet security, web applications, file sharing, network security, reactivity, software development
     Reactivity
By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security, compliance, sybase
     Sybase
By: Quocirca     Published Date: Jun 13, 2008
Over the past decade, the internet has evolved from a technical environment into a commercial marketplace. The impact on consumers and large enterprises has been significant, but what about the small and medium sized business? With few of the skills and resources of their larger counterparts, these organizations need to get the best value from the internet and the network based services it enables, without risking day-to-day operations.
Tags : quocirca, smb, smbs, small business, medium business, mid-sized business, connectivity
     Quocirca
By: Quocirca     Published Date: Oct 01, 2008
The internet has grown rapidly from a random collection of mainly academic networks and military control and routing protocols into a global, integrated and sophisticated commercial utility. No longer simply an 'Information Superhighway', it has extended to embrace voice telephony, video and mobile communications as part of a converged network. Connection options and services have expanded, with opportunities for internet service providers (ISPs) to add value beyond simply forwarding bit and bytes.
Tags : quocirca, isp, isps, internet service provider, convergence, ip telephony, voip, networking
     Quocirca
By: Quocirca     Published Date: Apr 08, 2009
The automation of traditional paper based processes with technology can lead to unnecessary complexity. This leads to increased costs and other challenges which can be avoided if solutions are simple and fit closely to the business task in hand.
Tags : quocirca, paper systems, it systems, it infrastructure, mobile technologies, functionality, capacity, cost control, cost cutting, ongoing costs, tco, total cost of ownership, anoto, automating business processes, paperless office, paper-based processes, network connection reliability, wi-fi, bluetooth, hardware choices
     Quocirca
By: AT&T     Published Date: Jun 25, 2008
When evaluating the pros and cons of DSL and cable modem Internet access, enterprises should factor speed, cost, installation, consistency and security into the decision-making process. While the right access choice is a function of location, availability and service offerings, DSL is often the better option for remote workers, satellite offices and traveling employees.
Tags : dsl, cable, internet, internet connection, connection, connectivity, data line, at&t, att, connection speed, isp, networking
     AT&T
By: Asentria Corporation     Published Date: Sep 04, 2007
In the high-stakes battle of Internet providers, WiMAX represents the latest up-and-comer to challenge DSL and cable technologies. This new wireless technology is gaining attention for its ability to provide high-speed, high-throughput broadband connections over distances of up to 30 miles instead of a few hundred feet. Exhibiting a surprising amount of utility, WiMAX can be used for a number of different applications.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
     Asentria Corporation
By: Visualware     Published Date: Sep 21, 2007
It is important to measure the actual data flow of a connection to get a meaningful picture of connection throughput. See how MySpeed measures and reports data transfers, and helps identify performance impacted by network congestion and traffic control.
Tags : network traffic, traffic, traffic management, network management, network performance, congestion, network congestion, visual ware, visualware, voip, voice over ip, ip telephony, broadband phone, vonage, networking
     Visualware
By: Visualware     Published Date: Sep 21, 2007
Connection Speed versus Connection Quality is a crucial issue for measuring bandwidth performance. A fast connection speed by itself can render more application deliver problems (such as VoIP), than a slower connection with consistent throughput.
Tags : network traffic, traffic, traffic management, network management, network performance, congestion, network congestion, visual ware, connection, voip, voice over ip, ip telephony, broadband phone, vonage, connection quality, network quality, visualware, networking
     Visualware
By: WiMAX 20/20     Published Date: Sep 27, 2007
This white paper presents how a radically consolidated, scalable core network architecture based on multi-core processor technology can significantly reduce the cost of the core network and thereby reducing the cost to serve the first WIMAX subscribers.
Tags : cost, cost efficient, cost efficiency, wimax, wireless connection, broadband, broadband wireless, dsl, cable, scalability, roi, wimax 20/20, wimax 2020
     WiMAX 20/20
By: Computhink     Published Date: Jan 31, 2008
Download this informative webcast by Doug Brennecke, VP Sales at Computhink, featuring Tom von Gunden, chief editor of enterprise content management news and solutions site ECM Connection.
Tags : document management, compliance, content management, computhink, video
     Computhink
By: CopiaTECH     Published Date: Mar 18, 2008
Wireless networking is no more a new name to computer users these days than iPod is to music lovers. This technology is one of the most popular, inexpensive and simple modes of connecting computers to the internet or a network. Both home users, work users and laptop/mobile users, who want to stay connected, even while on the move, are adopting this technology. Download this paper to read about all the threats that come with wireless connections and ways to guard against them.
Tags : copiatech, wireless, wireless security
     CopiaTECH
By: Identity Engines     Published Date: Mar 24, 2008
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
Tags : idengines, id engines, identity engines, access control, authentication
     Identity Engines
By: Sparta Social Networks     Published Date: Oct 10, 2008
This case-study talks about how the Packet8 broadband voice over Internet protocol (VoIP) and video communications service which lets broadband Internet users add digital voice and video communications services to their high-speed Internet connection. Videophone users now account for almost 5 percent of Packet8’s 74,000 lines, and are one of several drivers in the company's quarterly growth, up 54 percent in the most period to $6 million in revenue. Download to learn more.
Tags : sparta, social network, packet8, internet protocol (voip)
     Sparta Social Networks
By: HiDef Corporate     Published Date: Dec 22, 2009
Download the IDC Analyst Connection to learn how the cost of audio conferencing affects a company's bottom line.
Tags : citrix, audio conferencing, wainhouse, hidef, sme, pstn, time management, conference calls, remote access, resource management
     HiDef Corporate
By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Faced with degrading network performance and the need to drive global expansion, Measurement Specialties partnered with Virtela to design, implement and manage a high-performance, multi-carrier MPLS network across all twelve of their global sites.
Tags : virtela, network performance, multi-carrier mpls network, original equipment manufacturers, point-to-point connections, network and security solutions
     Virtela Communications, Inc.
By: MoreVisibility     Published Date: May 07, 2012
LinkedIn connections and groups foster a lot of interaction among professionals, who can discuss their respective industries and job functions. Learn more about the three main opportunities for you to become a master link builder on LinkedIn.
Tags : morevisibility, marketing, social media, emerging marketing, internet marketing, web analytics
     MoreVisibility
By: PC Mall     Published Date: Jul 08, 2010
Download this Cisco white paper to learn how to deliver a new workspace experience, connecting anyone, anywhere to any resource: securely, reliably and smoothly.
Tags : pcmall, internet security, networking, wireless networking, network security, network hardware, network protection, network connection, network reliability, seamless network, routers, switches
     PC Mall
By: PC Mall     Published Date: Jul 09, 2010
Learn how to actively manage and reduce power consumption by using your network intelligently to realize significant cost savings.
Tags : pc mall, internet security, networking, wireless networking, network security, network hardware, network protection, network connection, network reliability, seamless network, routers, switches, reduce power, reduce energy, green it, energy efficiency, cost reduction
     PC Mall
By: BlueVolt     Published Date: May 04, 2012
It's a Dog-Eat-Company world so maximizing your partner connections is important to your organization's success. Read the Maximizing your Partner Connections: The Role of your Online Presence in Reaching Your Market white paper from BlueVolt to learn how to optimize your extended enterprise.
Tags : bluevolt, extended enterprise, lms, learning management system, channel, training
     BlueVolt
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com