connection

Results 226 - 250 of 433Sort Results By: Published Date | Title | Company Name
By: Viavi Solutions     Published Date: Sep 30, 2015
In part one of the two-part white paper series, learn to quickly locate and resolve problems across the OSI layers using the Troubleshooting Cheat Sheet.
Tags : troubleshooting, cheat sheet, viavi, osi model, open systems interconnection, transport layer, osi layers
     Viavi Solutions
By: Viavi Solutions     Published Date: Sep 30, 2015
In part one of the two-part white paper series, learn to quickly locate and resolve problems across the OSI layers using the Troubleshooting Cheat Sheet.
Tags : troubleshooting, cheat sheet, viavi, osi model, open systems interconnection, transport layer, osi layers
     Viavi Solutions
By: Viavi Solutions     Published Date: Sep 30, 2015
In part two of the two-part white paper series, learn to quickly locate and resolve problems across the OSI layers using the Troubleshooting Cheat Sheet.
Tags : troubleshooting, cheat sheet, viavi, osi model, open systems interconnection, transport layer, osi layers
     Viavi Solutions
By: Cisco     Published Date: Sep 16, 2015
This document describes how the Cisco® 40-Gbps QSFP BiDi transceiver reduces overall costs and installation time for customers migrating data center aggregation links to 40-Gbps connections.
Tags : applications, systems integration, cloud, development
     Cisco
By: Cisco     Published Date: Sep 16, 2015
We’re experiencing a disruptive period of data transformation—and managing today’s database infrastructures during this disruptive period is not only critically important, but also more challenging than ever. An historic growth in data and cutting-edge technology trends, like the Internet of Everything, is causing an explosion in connections and data creation that is reshaping everything we do.
Tags : enterprise, policy-based, infrastructure, cloud, visibility, scalability
     Cisco
By: ArborNetworks     Published Date: Sep 16, 2015
Don't ignore DDoS; instead, take preventive action. With that in mind, IDC believes that hybrid defense scenarios (on-premises equipment married with cloud services) will continue to grow as organizations seek to parry advanced application and large-scale volumetric attacks and as solution providers and product vendors work to deliver joint solutions.
Tags : networking, security, it management
     ArborNetworks
By: Cisco     Published Date: Sep 15, 2015
Technology transitions—such as cloud, mobility, big data, and the Internet of Things—bring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System™ (Cisco UCS®) integrated infrastructure makes it possible to deliver Fast IT—a new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : ucs, unified computing system, infrastructure, enterprise, it barriers, it management, enterprise applications
     Cisco
By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
WebRTC, web real-time communications, is one of the hottest topics in the video communications industry, and for good reason. In a nutshell, WebRTC enables a user to connect over video without having to download a software client or plugin, and no username or password is required. Basically, all you need is a webcam, an Internet connection and the right browser (for example, the latest versions of Mozilla® or Chrome™), and you can connect over video with colleagues, partners, vendors and customers.
Tags : web browser, video conferencing, communication, web apps
     LifeSize, a division of Logitech
By: Venafi     Published Date: Aug 10, 2015
The need for authentication and assurance is great and options are few; therefore, we have come to rely on encrypted SSL/TLS certificates for almost every new application, appliance, device and cloud service.
Tags : security controls, security, security applications, ssl/tls certificates, secure connection, security network
     Venafi
By: Dell EMC     Published Date: Aug 04, 2015
See why Connections Educations, an online education leader, selected EMC XtremIO to manage its unpredictably fast growth.
Tags : growth, management, virtual, experience, data
     Dell EMC
By: Dell EMC     Published Date: Aug 03, 2015
Manage its unpredictably fast growth.
Tags : growth, management, virtual, experience, data
     Dell EMC
By: Vectra Networks     Published Date: Aug 03, 2015
Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.
Tags : threat, data, security, it management, malware, banking, cyber theft, remote access tool, remote access trojan, carberp, carbanak
     Vectra Networks
By: IBM     Published Date: Jul 31, 2015
Commoditization is a serious threat to the telecommunications industry. Most CSPs offer similar services at rates designed to win what has become a price war. As a result, many face decreasing margins and difficulty sustaining differentiation based on prices or products alone. On top of commoditization, CSPs also face competition from OTT providers and an increasingly knowledgeable and demanding customer base. With access to growing amounts of data from an ever-increasing number of sources and devices, today’s empowered, savvy consumers know what they want and expect to get it.
Tags : ibm, telco, csps, big data, commoditization, customer retention
     IBM
By: IBM     Published Date: Jul 31, 2015
In its "Restoring Connections" paper based on research of telecommunications firms, IBM ‘s top ranked Institute for Business Value identified actions CSPs can take to reset customer experience and build brand loyalty through innovative, compelling, personalized services based on deep customer insight. Join us as we discuss how to leverage network and subscriber data to create unique customer profiles, personalize engagement, and improve marketing offers.
Tags : ibm, telco, customer analytics, csps, consumer behavior, brand loyalty, personalized engagement, big data
     IBM
By: Citrix Systems     Published Date: Jul 28, 2015
Organizations are looking to SDN to improve network agility by incorporating network automation in cloud computing platforms. So far the focus of SDN has been on L2-L3 switching and routing services. However applications don’t just need network connections. They also need L4-L7 network services.
Tags : 
     Citrix Systems
By: Riverbed     Published Date: Jul 22, 2015
As enterprise computing has evolved, businesses have been shifting to a “hybrid enterprise” where core applications and data can be located in private data centers and public clouds. The growth of hybrid cloud deployments accelerated the transition to hybrid wide-area networks (WANs). Private networks, such as MPLS, are being joined by Internet connections that offer a choice in delivery channels—costly, but predictable, networks for mission-critical loads and cheaper public networks for bulk loads such as data backups.
Tags : hybrid enterprise, private data centers, public clouds, wans, data backups, it management
     Riverbed
By: SAS     Published Date: Jul 14, 2015
With sophisticated analytics, government leaders can pinpoint the underlying value in all their data. They can bring it together in a unified fashion and see connections across agencies to better serve citizens.
Tags : anayltics, data analysis, management, knowledge pooling, data infrastructure
     SAS
By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management, data management
     Mimecast
By: Cisco     Published Date: Jun 24, 2015
This paper reveals how new Fast IT model enables IT departments to shift focus from spending too much time keeping the lights on to capturing the value of today’s connections and preparing for the future.
Tags : fast it, it departments, it professionals, roadmap
     Cisco
By: Teradata     Published Date: Jun 22, 2015
This paper looks at the critical connection between data analytics and the future of tax compliance. It shows how the ability to pinpoint the “right” cases can bring more efficiency—and more revenue—to tax agencies. It also confirms that tax agencies already have vital data at their fingertips; the challenge is to find new and better ways to put it to use. Finally, it describes how a cohesive compliance strategy demands an agile, balanced solution of people, processes, technology, and data.
Tags : 
     Teradata
By: IBM     Published Date: Jun 09, 2015
Making sound security decisions in today’s environment is of paramount importance. This infographic highlights the connection between economic vitality and security and how both can be achieved.
Tags : ibm, government, cyber, security, intelligence, information, vulnerability, fraud, threat, predictive
     IBM
By: Riverbed     Published Date: May 29, 2015
This paper explores the challenges and IT requirements for delivering better services to the front lines of the organization.
Tags : 
     Riverbed
By: IBM     Published Date: May 29, 2015
Learn how telecommunications providers can reboot the customer experience!
Tags : restoration, telecommunications, service providers, connection, communication, customer experience
     IBM
By: Dell EMC     Published Date: May 15, 2015
This SQL Database focused case study is based on Connections Education, an online US-based education leader. Learn how this online education leader chooses EMC XtremIO to manage unpredictably fast growth.
Tags : emc, storage all-flash, array, architectures, workload, data center, scale, storage, hybrid, xtremio, scalable, development, roi, data management
     Dell EMC
By: Cisco     Published Date: May 14, 2015
This document describes how the Cisco® 40-Gbps QSFP BiDi transceiver reduces overall costs and installation time for customers migrating data center aggregation links to 40-Gbps connections.
Tags : data center, software, networking, cisco, migration
     Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com