Networking White Papers

Results 176 - 200 of 3352Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Apr 10, 2015

Location-based services (LBS) show promise as a budding customer-centric mobility solution in some early adopting verticals such as retail, hospitality, and large public venues. Such services enable businesses to better understand their customer base through analytics as well as offer targeted, context-based communications including promotions and remote assistance. This IDC white paper explores the burgeoning LBS market, highlighting custom research conducted by IDC in March and April 2014; surveys were fielded to both IT and line-of-business (LOB) decision makers in select verticals and market segments. In this white paper, IDC analyzes the data and explores the attitudes surrounding LBS adoption in the context of broader technology trends.

Tags : cisco, idc, lbs, wireless, wifi, mobility, it solutions, bandwidth management
    
By: Cisco     Published Date: Apr 10, 2015

Cisco engaged Miercom to conduct a competitive analysis of its Catalyst 2960-X switch versus two comparable Hewlett-Packard switches from the 2920 and 5120 product families. Miercom executed comprehensive hands-on testing and evaluated the performance of some widely deployed features that are critical for reliable functioning of enterprise networks. The test methodology focused on specific areas in which Cisco believed there were key competitive differentiators between the products. Test results validated include throughput, latency, energy efficiency, stacking, LACP load balancing and Quality of Services (QoS) performance. Miercom found that the Cisco Catalyst 2960-X demonstrated superior performances against the competitive switches in the tests featured in this report.

Tags : cisco, miercom, competitive analysis, catalyst switch, wifi, wireless, bandwidth management, network architecture
    
By: Cisco     Published Date: Apr 10, 2015

Walk past your data center, and you might hear a soft, plaintive call: “Feed me, feed me…” It is not your engineers demanding more pizza. It is your servers and applications. And the call is growing louder New Cisco® 40-Gbps bidirectional (BiDi) optical technology lets you bring 40-Gbps speeds to the access layer using the same 10-Gbps cable plant you are using today. It is a huge cost savings, whether you are upgrading your current data center or building a new one. And it means you can start taking advantage of 40-Gbps performance for your business right now without needing special budget approval and without having to wait a year to get the capacity you need.

Tags : cisco, transceiver modules, wireless, cost effective, high performance switch, optical technology, bandwidth management, network architecture
    
By: Cisco     Published Date: Apr 10, 2015

The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution. This revolution launched an entirely new economic model that sparked new ways of doing business, changed the way we work, and allowed us to blend our personal and professional lives. At first, these new ways of working were the exception. But the transformation to an Internet-based work style is now complete, and this style has become very much the norm.

Tags : cisco, akaamai, customer experience, digital customer experience, enterprise, wan, integrated solutions, optimization
    
By: Cisco     Published Date: Apr 10, 2015

The Cisco Intelligent WAN (IWAN) solution provides design and implementation guidance for organizations looking to deploy wide area network (WAN) transport with a transport-independent design (TID), intelligent path control, application optimization, and secure encrypted communications between branch locations while reducing the operating cost of the WAN. IWAN takes full advantage of cost-effective transport services in order to increase bandwidth capacity without compromising performance, reliability, or security of collaboration or cloud-based applications.

Tags : cisco, wan, iwan, network transport, path control, cloud computing, infrastructure, network architecture
    
By: Cisco     Published Date: Apr 10, 2015

This document describes how the Cisco® 40-Gbps QSFP BiDi transceiver reduces overall costs and installation time for customers migrating data center aggregation links to 40-Gbps connections.

Tags : cisco. transceiver, cost reduction, data center aggregation, migration, switches, infrastructure, network architecture, network management
    
By: Cisco     Published Date: Apr 10, 2015

The new Cisco Nexus® 9000 Series Switches provide features optimized specifically for the data center: high 10 and 40-Gbps port densities, reliability, performance, scalability, programmability, and ease of management. With exceptional performance and a comprehensive feature set, the Cisco Nexus 9000 Series offers versatile platforms that can be deployed in multiple scenarios, such as layered access-aggregation-core designs, leaf-and-spine architecture, and compact aggregation solutions.

Tags : cisco, data center, switches, optimization, scalability, storage, applications, enterprise support
    
By: Cisco     Published Date: Apr 10, 2015

As demands for “right here, right now” information sharing continue to rise, today's organizations are taking a hard look at their branch and remote locations, where performance and service enablement have always been a primary indicator of companywide productivity. In this episode, the TechWiseTV team takes a dive deep into the innovations and opportunities made possible by Cisco's new 4000 family of Integrated Services Routers. Learn how the architecture and new features that make up this exciting addition to Cisco's router portfolio are bringing more exciting new levels of integration, performance, and productivity to the branch office than ever before.

Tags : cisco, techwise, routers, wan, productivity, performance, network architecture, network performance
    
By: Cisco     Published Date: Apr 10, 2015

This document is a Cisco Validated Design (CVD) for Cisco Connected Mobile Experience (CMX) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for detecting, connecting, and engaging mobile users within your venue and leveraging your Wi-Fi network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a CMX solution, this CVD will evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a CMX solution.

Tags : cisco, design, network architecture, mobile devices, best practices, wifi, wlan, wan
    
By: Cisco     Published Date: Apr 10, 2015

Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.

Tags : cisco, byod, wifi, wireless, wlan, productivity, design guide, system design
    
By: Cisco     Published Date: Apr 10, 2015

More than ever, the data center is a gateway to opportunity, responsible for bringing together the data, applications, and IT resources needed to support growth and innovation. At Cisco we have the opportunity to observe how data center infrastructure is evolving in response to market and technology trends. In no particular order, here are five important strategies we see companies using to overcome the limitations of traditional IT infrastructure and transform their data centers to support innovation and growth.

Tags : cisco, data center, effectiveness, applications, resource efficiency, strategy, it infrastructure, network architecture
    
By: Cisco     Published Date: Apr 10, 2015

While providing your customers and guests with Wi-Fi, you can give them pertinent information, individual attention, and special offers. And you can learn how, where, and when they move through your venue. Customers or guests passing through your store, hotel, or other venue increasingly expect free Wi-Fi. They also expect personal service. You can give them both, which can help boost your sales. And in doing so, you can gain information that will help make your venue more attractive and profitable.

Tags : cisco, wifi, wireless. wan, wlan, network design, it solutions, network performance, quality of service
    
By: Cisco     Published Date: Apr 10, 2015

Cisco’s Catalyst WS-C2960X-48TD-L and WS-C2960XR-48TD-I Gigabit Ethernet switches were evaluated by Miercom under the Certified Green program for power consumption and energy Using a 1518-byte frame size with 100% Layer 2 traffic load, testing showed both switches to be 55% more efficient in power consumption, measured in Watts/ Gbps, than the Industry Average efficiency. Overall environmental impact and business-enabling green benefits of the Layer 2 and Layer 3 switches were also analyzed.

Tags : cisco, catalyst, networks, byod, mobile computing, wifi, mobile data systems, mobile workers
    
By: IBM     Published Date: Apr 09, 2015

This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts explore the complexities of mobile test environments, the value of the mobile device cloud, the unique role crowd sourcing can play, and how teams can leverage automation to help deliver quality apps.

Tags : mobile apps, mobile app testing, mobile device cloud, crowd sourcing, ibm, networking, software development, enterprise applications
    
By: IBM     Published Date: Apr 09, 2015

This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.

Tags : access management solution, ibm, security risk, security compliance, networking, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.

Tags : user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks, networking
    
By: IBM     Published Date: Apr 09, 2015

IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

Tags : ibm, user access, enhanced security, security risk, networking, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.

Tags : ibm, risk management, security risk, security officer, data security, networking, security, it management
    
By: IBM     Published Date: Apr 09, 2015

Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.

Tags : cloud, cloud security, ibm, ibm dynamic cloud security portfolio, access management, data protection, application protection, visibility
    
By: IBM     Published Date: Apr 09, 2015

You may be considering a cloud computing solution or in the midst of specifying one or even implementing a solution. Read this paper to see what IBM discovered about how companies like yours are adopting, implementing and using cloud computing solutions. Learn about the current rate of adoption, as well as drivers, barriers, and considerations that are influencing the adoption of cloud computing.

Tags : ibm, cloud, efficiencies, innovation, midsize businesses, network access, business value, innovation
    
By: IBM     Published Date: Apr 09, 2015

Although cloud is recognized as a technological change, its potential for driving business innovation remains untapped. Cloud computing can have an impact on operations, customer relationships and industry value chains. Read this executive report to discover how the cloud can open the door to more efficient, responsive and innovative ways of doing business.

Tags : ibm, cloud, efficiencies, innovation, midsize businesses, network access, business value, innovation
    
By: IBM     Published Date: Apr 07, 2015

This report explores how cloud-based solution providers, such as managed service providers (MSPs) and independent software vendors (ISVs) are using an embedded approach to analytics in an effort to empower their customers and build a competitive advantage.

Tags : ibm, cloud computing, analytics, business intelligence, distributed computing, mobile computing, application integration, ebusiness
    
By: IBM     Published Date: Apr 07, 2015

Learn how to understand, manage and debug problems due to size, complexity and scale in operation of virtualized networks for modern data centers, including developer- and user-controlled software in clouds.

Tags : ibm, scale, data center, software, cloud, debug, complex, virtualized networks
    
By: IBM     Published Date: Apr 07, 2015

Future proof your investment with IBM WebSphere - Your gateway to cloud, mobile and Internet of Things.

Tags : ibm, websphere, cloud, mobile, analytics, iot, tibco, migrate
    
By: Cyveillance     Published Date: Apr 06, 2015

In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.

Tags : information security threat, information security, protection, security breach, internet security, networking, security
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
175 Documents
Bandwidth Management
266 Documents
Cloud Computing
1050 Documents
Colocation and Web Hosting
252 Documents
Content Management
321 Documents
Convergence
266 Documents
Data Center
1145 Documents
Data Center Design and Management
653 Documents
Data Management
1914 Documents
Distributed Computing
195 Documents
Enterprise Applications
1868 Documents
Ethernet Networking
190 Documents
Fibre Channel
154 Documents
Gigabit Networking
162 Documents
Governance
206 Documents
Green Computing
296 Documents
Grid Computing
174 Documents
Infrastructure
927 Documents
Internetworking Hardware
240 Documents
Interoperability
219 Documents
IP Networks
336 Documents
IP Telephony
313 Documents
IT Management
2383 Documents
Knowledge Management
947 Documents
Load Balancing
177 Documents
Local Area Networking
233 Documents
Migration
256 Documents
Monitoring
322 Documents
Network Architecture
486 Documents
Network Management
706 Documents
Network Performance
463 Documents
Network Performance Management
438 Documents
Network Provisioning
220 Documents
Network Security
549 Documents
OLAP
142 Documents
Optical Networking
152 Documents
Power and Cooling
266 Documents
Quality Of Service
194 Documents
Remote Access
307 Documents
Remote Network Management
259 Documents
Server Hardware
270 Documents
Servers
508 Documents
Small Business Networks
289 Documents
TCP/IP Protocol
178 Documents
Test And Measurement
199 Documents
Traffic Management
194 Documents
Tunneling
150 Documents
Utility Computing
163 Documents
VPN
220 Documents
Wide Area Networks
240 Documents
Wireless
468 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.