> White Papers > Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 76 - 100 of 1229Sort Results By: Published Date | Title | Company Name
By: Extreme Networks     Published Date: Aug 30, 2016
Discover the information you need to help you make better decisions before purchasing and deploying 802.11ac Wave 2.
Tags : extreme networks, 802.11ac wave 2, 802.11ac, networking, wireless, wireless wlan, wireless lan network, wifi standards
     Extreme Networks
By: Extreme Networks     Published Date: Aug 30, 2016
Organizations looking to deliver a flexible infrastructure that supports new methods of engagement, including customer-facing applications, are turning to cloud for the management of their wired and wireless networks. Discover how to tailor your arguments along a variety of business-aligned pain points and motivations to help you get the backing of key constituents within your organization.
Tags : extreme networks, wireless, cloud, cloud networks, networking, network, cloud managed networking, cloud based network
     Extreme Networks
By: Extreme Networks     Published Date: Aug 30, 2016
The goal of a Cloud-Managed Network is to make deployment, management and control over network infrastructure devices very easy, offset the need for trained IT staff at remote locations or for geographically dispersed organizations, and it provides both OpEx and CapEx savings. This comprehensive white paper provides you with information needed to successfully guide you through the decision-making process of determining the right network for your business.
Tags : extreme networks, networking, network, cloud, cloud networks, wireless, cloud managed networking, cloud based network
     Extreme Networks
By: Extreme Networks     Published Date: Aug 30, 2016
Discover the 5 key justifications required to build a winning business case for your upgrade to the 802.11ac Wave 2 standard.
Tags : extreme networks, networking, wireless, wireless networking, 802.11ac wave 2, 802.11ac, networking, wireless
     Extreme Networks
By: Kaminario     Published Date: Aug 23, 2016
Read this guide for three critical steps to maximize all-flash performance for your applications.
Tags : kaminario, flash, performance, storage, application performance, networking, enterprise applications
     Kaminario
By: Kaminario     Published Date: Aug 23, 2016
Successful businesses are nimble and built to scale. At times you might need to grow your sales capacity by bringing more people on board. Other times you might simply need them to get more active, boosting performance. Sometimes you need to do both. To support the ebb and flow of your business your storage should be capable of scaling up capacity while increasing performance. Yet you might be surprised to know that only one All-flash vendor can do so, while keeping costs predictable. Read on to learn about 3 scalabity benefits that will transform your storage purchasing experienc
Tags : kaminario, flash, performance, storage, application performance, scalability, networking, security
     Kaminario
By: Kaminario     Published Date: Aug 23, 2016
Your three essential tips for building a smarter, more resilient storage strategy.
Tags : kaminario, flash, performance, storage, application performance, resilient, networking, enterprise applications
     Kaminario
By: EMC Converged Platforms     Published Date: Aug 19, 2016
In this video, ESG analyst Colm Keegan discusses the new VCE VxRail. He explains the rationale for the product, where it fits in the VCE’s portfolio, and addresses the growing demand for HCI systems.
Tags : vce, esg, vxrail. hyper-converged, hci systems, networking, security, it management
     EMC Converged Platforms
By: EMC Converged Platforms     Published Date: Aug 19, 2016
A comprehensive overview of the VxRail hyper-converged appliance from Colin Gallagher, Senior Director of Product Marketing, VxRail, VCE.
Tags : vce, vxrail, product overview, hyper-converged, networking, software development, it management, enterprise applications
     EMC Converged Platforms
By: F5 Networks Inc     Published Date: Aug 16, 2016
With privacy breaches becoming increasingly common, many organizations look to SSL as a way to protect the integrity of their data online. However, the implementation of a comprehensive SSL strategy comes with its own challenges of visibility, performance and scale. Through proper planning and deployment, a strong SSL strategy mitigates the risk of breaches. Once the strategy is in place, the site will be positioned for future security, scalability, and reliability, putting the focus where it really matters--moving business forward.
Tags : ssl, ssl solutions, networking, privacy, security, network security, enterprise applications
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Aug 16, 2016
Download this white paper for an overview of SSL/TLS, its impact on the enterprise and the challenges associated with failing to inspect SSL/TLS traffic.
Tags : ssl, tsl, cyber threats, network security, security, networking, enterprise applications
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Aug 16, 2016
Together, VMware and F5 enable global IT leaders to empower the Anywhere Enterprise to deliver enterprise applications across all devices and clouds built on SDDC principles. Today VMware and F5 offer the most sophisticated, end-to-end solutions for mobility, application delivery and network security to help CTOs and CIOs: - Ensure unprecedented application agility with a software-defined infrastructure and application services platform; - Automate application delivery while ensuring performance, availability, scalability, efficiency and security; - Achieve simplified end-to-end networking through an application-centric approach.
Tags : anywhere enterprise, vmware, enterprise it, application agility, software-defined infrastructure, it infrastructure, networking, it management
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jul 22, 2016
The new matrix of technology deployment for IT is a real challenge—handling both customer-facing issues and internal, departmental challenges.
Tags : f5 networks, cisco, devops, software-defined networks, sdn, technology integration, networking, software development
     F5 Networks Inc
By: IBM     Published Date: Jul 14, 2016
Focusing on SaaS, this IDC report details considerations to help optimize your cloud security model to align with business requirements.
Tags : ibm, idc, ciso, cloud security, saas, networking, enterprise applications, data management
     IBM
By: IBM     Published Date: Jul 14, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : ibm, security, cloud applications, cloud, cloud-based threats, networking, enterprise applications
     IBM
By: IBM     Published Date: Jul 08, 2016
In our 21-criteria evaluation of the dynamic case management (DCM) market, we identified the 14 most significant software vendors — Appian, bpm’online, Column Technologies, DST Systems, Eccentex, IBM, Isis Papyrus, Lexmark Enterprise Software, MicroPact, Newgen Software, OnBase by Hyland, OpenText, Pegasystems, and TIBCO Software — and researched, analyzed, and scored them. The evaluation focused on providers’ adaptive, analytics, and mobile features, all critical to helping enterprises tackle increasing volumes of varied and unstructured work. This report helps enterprise architecture (EA) professionals select the best providers to meet their unique needs.
Tags : ibm, forrester, forrester wave, dynamic case management, dcm, networking, software development, enterprise applications
     IBM
By: IBM     Published Date: Jul 07, 2016
Now in V8.7 of IBM Operational Decision Manager, IBM ODM Advanced applies insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. With IBM Operational Decision Manager Advanced, you gain scope, scale, speed, and simplicity. You can now capture events, build context, and apply it to operational decisions in real-time. This helps detect situations as they occur – presenting risks or opportunities – to enable action.
Tags : ibm, odm, middleware, ibm operational decision manager, application services, networking, enterprise applications
     IBM
By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
     Commvault
By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint
     Commvault
By: Commvault     Published Date: Jul 06, 2016
Today, nearly every datacenter has become heavily virtualized. In fact, according to Gartner as many as 75% of X86 server workloads are already virtualized in the enterprise datacenter. Yet even with the growth rate of virtual machines outpacing the rate of physical servers, industry wide, most virtual environments continue to be protected by backup systems designed for physical servers, not the virtual infrastructure they are used on. Even still, data protection products that are virtualization-focused may deliver additional support for virtual processes, but there are pitfalls in selecting the right approach. This paper will discuss five common costs that can remain hidden until after a virtualization backup system has been fully deployed.
Tags : storage, backup, recovery, best practices, networking, it management, enterprise applications, data management
     Commvault
By: Commvault     Published Date: Jul 06, 2016
Unsanctioned file sharing creates serious security and regulatory compliance issues. Read this infographic to learn how to sync, share and control data securely!
Tags : commvault, data security, protecting corporate data, commvault file sharing, virtual host costs, virtualization, networking, security
     Commvault
By: Commvault     Published Date: Jul 06, 2016
Data conversations continue to change as all businesses are trying to figure out today's reality of the move to the cloud, anywhere/anytime computing, and the explosive growth of data. These trends have drastically reshaped the IT industry and data management forever. With continued market innovations in storage, cloud, and hyper-converged infrastructures, there are six key modern IT needs that are increasingly the focus of CIO and technology leaders.
Tags : commvault, modern data protection, data security, storage, cloud, hyper converged infrastructures, access and collaboration, new recovery mandates
     Commvault
By: Commvault     Published Date: Jul 06, 2016
Enterprises today increasingly turn to array-based snapshots and replication to augment or replace legacy data protection solutions that have been overwhelmed by data growth. The challenge is that native array snapshot tools – and alternative 3rd party solutions – have varying degrees of functionality, automation, scripting requirements, hardware support and application awareness. These approaches can add risk as well as administrative complexity and make it more difficult to realize the full potential of snapshots – whether in single disk vendor estates or in heterogeneous storage environments. This checklist will enable you to build a shortlist of the 'must have' features needed for snapshots to deliver exactly what you require in your application environment or Private Cloud.
Tags : commvault, snapshot management, replication, array based snapshots, data protection solutions, gui driven, intellisnap, no scripting
     Commvault
By: IBM     Published Date: Jul 06, 2016
Why good mobile apps are not good enough: Measure and move your mobile app to greatness
Tags : ibm, mobile, applications, apps, mobile apps, customer engagement, networking
     IBM
By: IBM     Published Date: Jul 06, 2016
Download to learn: - What continuous engineering is - How to continuously improve complex product designs - How to anticipate and respond to markets and clients - How to get the most out of your engineering resources
Tags : ibm, watson, iot, internet of things, product development, devops, engineering, networking
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com