> White Papers > Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 151 - 175 of 1256Sort Results By: Published Date | Title | Company Name
By: SunGard     Published Date: Aug 13, 2012
Whether your business is involved with it yet or not, cloud computing will play a significant role in the future of IT: it has already been enthusiastically embraced by small and medium sized businesses and its potential is also being accepted and exploited by larger enterprises.
Tags : services, cloud, infrastructure, cloud computing, significant, enthusiastically, benefits, environments, networking, storage, data center
     SunGard
By: Aventail     Published Date: Aug 21, 2009
Today's office is now anywhere that a user can get an Internet connection, a PC on a business partner's network, a handheld at a WiFi hotspot, an airport kiosk, or a computer on a home WiFi network. But secure access is not the only driving business factor remote access must be easy to use and administer as well.
Tags : secure remote access, remote access, wireless security, secure wifi, wifi security, wi-fi security, wifi, wi-fi, ssl, vpn, secure access, aventail, networking
     Aventail
By: IBM     Published Date: Apr 09, 2015
IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Tags : ibm, user access, enhanced security, security risk, networking, security, it management, data management
     IBM
By: Noction     Published Date: Jan 09, 2014
Service Providers have unique networking challenges as compared to other environments. Factor, differentiating Service Provider`s network from others, is the requirement for 100% uptime. The network stability is crucial to their customers’ business and is, therefore, intolerant to disruptions or outages, which may damage the company`s reputation and market position, or even affect it irreversibly. Downtime risks can no longer be mitigated by simply over-engineering the network, but rather deploying network optimization solutions, based on the intelligent monitoring and automated response, versus manual network troubleshooting and brute force time spending.
Tags : network performance, congestion, outages, downtime, hosting, bgp, router, ip network, networking, network, performance, optimization, network infrastructure, service provider, cdn, risks, data center
     Noction
By: Noction     Published Date: Feb 17, 2015
In this white paper you will learn how BGP performance automation ca help you boost network availability, minimize latency and packet loss as well as reduce operational costs by intelligently rerouting traffic across the Internet.
Tags : network performance, congestion, outages, downtime, hosting, bgp, router, ip network, network latency, network congestion, network downtime, ip performance, networking
     Noction
By: IBM     Published Date: Oct 11, 2016
Gain speed and grow faster with the cloud How to utilize the cloud for your B2B (Business-to-Business) needs and remain focused on the core of your business. Simplify your approach and drive collaboration with your customers and suppliers.
Tags : ibm, commerce, b2b, b2b integration, cloud, cloud integration, networking, enterprise applications
     IBM
By: Oracle     Published Date: Dec 17, 2015
View this on demand webcast to learn how the head of eCommerce and CIO of Carolina Biological partnered together to successfully make the switch to digital eBusiness, increase customer loyalty, and reduce costs and time to market.
Tags : oracle, webinar, digital ebusiness, customer loyalty, b2b ecommerce, internet retailer, networking, data management
     Oracle
By: IBM     Published Date: Jan 12, 2009
Retail banks are in a state of transformation all over the world. They must integrate new remote payment systems, digitize process integration and update credit management. Watch this webcast to see how IBM WebSphere Portal is helping these companies deliver targeted information to support decision-making, and to aid in their transformation.
Tags : ibm, websphere portal banking initiative, websphere portal, portal solutions for retail banks, updating credit management, internet banking delivery, networking, it management, enterprise applications
     IBM
By: Network Automation     Published Date: Dec 02, 2008
Baptist Health is South Florida’s largest not-for-profit health care organization, encompassing six major medical facilities and a number of outpatient centers.
Tags : network automation, epremis, effective claims processing, networking, it management
     Network Automation
By: Network Automation     Published Date: Dec 02, 2008
Baylor Medical Center at Frisco (BMCF), outside of Dallas, Texas, is one of approximately 100 hospital facilities run by United Surgical Partners International (USPI). In this large system, BMCF is known as the most profitable medical facility in the entire USPI system.
Tags : network automation, material management, automate, networking, it management
     Network Automation
By: Oracle     Published Date: Sep 30, 2014
To succeed in today’s highly competitive business environment, your company needs to be customer obsessed. Your customers’ digital interactions are the narrative of your brand, and engaging with them proactively through their channels of choice is key to delivering exceptional experiences and creating loyal brand advocates. Download this paper to learn how to deliver connected buying journeys to your customers.
Tags : customer, obsessed, marketing, leader, digital, interactions, social, connected, networking
     Oracle
By: IBM     Published Date: Sep 30, 2013
A transformation is taking place in how people interact and how relationships form and develop and this is changing the way we socialise, the way we work and the way we engage with our customers. The new normal is that customers are leading the conversations that define your brand, competitors are crowd-sourcing ideas to bring new offerings to market and employees are using social media in all facets of their lives, including work. This shift in technology and human behaviour presents an opportunity for organisations to improve everything from reinventing customer relationships to how work gets done. A Social Business embraces networks of people to create business value and activates networks of people that apply relevant content and expertise to improve and accelerate core and ad hoc processes, delivering unprecedented return for the time invested.
Tags : ibm, ibm global business services, social media, social business, networking, enterprise applications
     IBM
By: Symantec     Published Date: Jan 10, 2013
Transport Layer Security, widely known as Secure Socket Layer or SSL is the most popular application of public key cryptography in the world. Sometimes, TLS can give illusion of security when it is not. This paper explains TLS and its best uses.
Tags : tls, ssl, transport layer security, secure socket layer, best practices, applications, symantec, networking, security, data management
     Symantec
By: SunGard     Published Date: Aug 13, 2012
Recovery-as-a-Service (RaaS) has been available for some time, and has leveraged a number of infrastructure options and recovery platforms. Many of these options have provided a recovery solution that is flexible, scalable, and secure. And in some cases, service providers offer fully managed solutions with the expertise to support heterogeneous IT environments.
Tags : cloud, recovery-as-a-service, raas, infrastructure, platforms, heterogeneous, networking, storage, data management, data center
     SunGard
By: Sightline Systems     Published Date: Apr 29, 2015
The purpose of this article is to provide the performance analyst with a systematic approach to performance evaluation and point out some common mistakes that can be avoided.
Tags : performance evaluation, performance analyst, performance metrics, evaluation technique, networking, security, it management
     Sightline Systems
By: IBM MaaS360     Published Date: Jul 09, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : mobile application lifecycle, application lifecycle management, security, malm, app protection, networking, software development, it management
     IBM MaaS360
By: IBM MaaS360     Published Date: Oct 08, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : maas360, ibm, fiberlink, mobile application, lifecycle management, malm, mam, mdm, enterprise, emm, networking, security, enterprise applications
     IBM MaaS360
By: Aerohive     Published Date: Oct 27, 2015
Das Webinar richtet sich an IT-Spezialisten, die mehr über die Möglichkeiten im Bereich WLAN erfahren möchten bzw. an Organisationen, die planen, WLAN einzusetzen oder ihre bestehende WLAN-Infrastruktur zu erneuern.
Tags : wlan, wi-fi, wireless networks, wireless architectures, networking
     Aerohive
By: Epicor     Published Date: Oct 17, 2016
Why investing in better business intelligence tools is critical to your success
Tags : data, success, metrics, business intelligence, success, networking, it management, data management, it career advancement
     Epicor
By: Logicalis     Published Date: Mar 12, 2014
Steps you can take for a successful network rationalization exercise, and how to make a business case for the project.
Tags : logicalis, modular computing, data optimization, cloud computing, network rationalization, networking, it management, data management, data center
     Logicalis
By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : data security, ibm, converged network security, security risk, networking, security, it management, data management
     IBM
By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : data security, ibm, risk management, network security, security threat, networking, security, it management, data management
     IBM
By: SAS     Published Date: Nov 04, 2015
Big data evolution: forging new corporate capabilities for the long term is an Economist Intelligence Unit report, sponsored by SAS. It explores how far along companies are on their data journey and how they can best exploit the massive amounts of data they are collecting.
Tags : sas, big data, big data evolution, economist intelligence unit, eiu, data journey, networking, it management, data management
     SAS
By: IBM     Published Date: Oct 21, 2015
IBM SPSS Solutions offer a straightforward, visual solution that is easy to use on the front end and highly scalable on the back end.
Tags : ibm, data, analytics, data scientist, statistician, networking, data management
     IBM
By: F5 Networks Inc     Published Date: Jul 08, 2009
BIG-IP devices have long been a tool for applying "rolling upgrades" to the applications and systems that sit behind the BIG-IP device. With Live Install, this "stage->reboot->go live" sequence can now be applied to the BIG-IP device directly, creating a rolling upgrade scenario like those of the application systems behind it. Live Install also enables snapshot versioning for future versions of the BIG-IP system, a critical feature for both production and testing environments.
Tags : big-ip, tool, application, system, device, installation, upgrade, production, testing, reboot, go live, stage, administrator, knowledge, solution, networking, it management
     F5 Networks Inc
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com