Networking White Papers

Results 176 - 200 of 3481Sort Results By: Published Date | Title | Company Name
By: Windstream     Published Date: Feb 09, 2015

The Path to Value in the Cloud, by Oxford Economics and Windstream, brings together the latest insights, tactics and strategies C-suite respondents are using to make the cloud work for them.

Tags : windstream, solutions, smart, personalized, service, enterprise technology, cloud, computing
    
By: Adobe     Published Date: Feb 03, 2015

This White Paper provides information on new trends and key findings of Digital Publication Platforms.

Tags : digital publication platform, content marketing, customer relationship management, customer satisfaction, content delivery, content management
    
By: Dice     Published Date: Jan 27, 2015

Get the new 2015 Dice Tech Salary Survey Report. Salaries and bonuses are on the rise for tech professionals, but compensation satisfaction is slipping. Download the report and find salary data by metro, state, title and tech skill.

Tags : dice, 2015 tech salary survey, networking
    
By: SpectorSoft     Published Date: Jan 23, 2015

This White Paper will present some common sense suggestions for improving the “beginning of the lifecycle” risk mitigation process. In other words, ways to add a bit more intelligence beginning with the screening and hiring process. Then, we’ll look at how to tie the efforts made at the beginning of the lifecycle to the rest of the employee lifecycle, using a combination of process and tools to significantly improve security, and reduce the chances of an insider incident.

Tags : spectorsoft, risk mitigation, insider threat, background checks, screening process, hiring process, networking, security
    
By: Server Technology     Published Date: Jan 16, 2015

DCD Intelligence has compiled this White Paper in order to share some industry insights and lessons on the practical steps that are needed to develop a successful power and capacity planning strategy.

Tags : server technology, power capacity, power and cooling, data center power, best practices, data center costs, roi, network architecture
    
By: SugarCRM     Published Date: Jan 07, 2015

The way companies use and pay for customer relationship management (CRM) software has changed significantly over the past decade. Moving from a predominantly perpetual license-based system, where companies paid a large up-front sum and then smaller annual maintenance fees, CRM software providers are now moving towards monthly or annual subscription fees to access CRM software on the Internet.

Tags : crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing
    
By: Copper River IT     Published Date: Dec 16, 2014

This white paper takes a close look at the importance of moving to an agile, high-performance, next-generation data center network with three key areas that need to be addressed in order to do so: The Data Center Interconnect, Cloud Connectivity, and Building Cloud-Aware Networks.

Tags : copper river, copper river it, data center, sdn, software defined networking, wan, networking, dci
    
By: Cisco     Published Date: Nov 17, 2014

Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.

Tags : spyware, rootkits, hacking, cisco, advanced threat protection, networking, security, enterprise applications
    
By: Cisco     Published Date: Nov 17, 2014

Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile

Tags : malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking
    
By: Cisco     Published Date: Nov 17, 2014

Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.

Tags : endpoint proliferation, ids, ips, externalization, cisco, networking, security, software development
    
By: Cisco     Published Date: Nov 17, 2014

The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.

Tags : cloud-computing, malware, cisco, malware infection, amp, networking, security, it management
    
By: Kaspersky     Published Date: Nov 12, 2014

Download Kaspersky Lab’s latest eBook, Rethinking Security: Fighting Known, Unknown, and Advanced Threats, to learn more about the evolution of cyberthreats that put your business at risk.

Tags : kaspersky, cybersecurity, cyberattack, hackers, it security, data protection, network security, anti virus
    
By: Aerohive     Published Date: Oct 23, 2014

This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.

Tags : enterprise networks, aerohive, network structure, wi-fi and networking, networking, 802.11, mobile computing, mobile data systems
    
By: Aerohive     Published Date: Oct 23, 2014

This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.

Tags : aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, networking, 802.11, mobile computing, mobile data systems
    
By: Aerohive     Published Date: Oct 23, 2014

Unifying cloud and distributed network intelligence creates a completely practical, cost-effective approach to mobility. At Aerohive®, we’ve always done it this way.

Tags : wireless networks, controller-less networks, the new mobility, network infrastructures, infrastructure, internetworking hardware, network architecture, network management
    
By: Aerohive     Published Date: Oct 23, 2014

Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.

Tags : creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac, infrastructure, network architecture, network management, network performance, 802.11
    
By: Aerohive     Published Date: Oct 23, 2014

Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.

Tags : creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac, infrastructure, network architecture, network management, 802.11, mobile computing
    
By: Aerohive     Published Date: Oct 15, 2014

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware, network architecture, network management, network performance
    
By: Aerohive     Published Date: Oct 15, 2014

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, network architecture, network management, network performance, network performance management
    
By: Aerohive     Published Date: Oct 15, 2014

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware, network architecture, network management, network performance
    
By: Aerohive     Published Date: Oct 15, 2014

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware, network architecture, network management, network performance
    
By: Server Technology     Published Date: Oct 15, 2014

This white paper will “follow the money” and show where the power is being used within your data center facility, along with the effects of changes like increasing the overall temperature within your data center.

Tags : server technology, data center power, data center costs, reduce energy, it budget, roi, infrastructure, internetworking hardware
    
By: Aerohive     Published Date: Oct 15, 2014

This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.

Tags : mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems, mobile workers, wireless infrastructure, cloud computing
    
By: Aerohive     Published Date: Oct 15, 2014

This paper evaluates the advantages and disadvantages of both the private and public cloud to help you make a more informed decision.

Tags : which cloud type is best, public or private cloud, comparing the public and private cloud, mobile computing, mobile data systems, mobile workers, cloud computing, virtualization
    
By: Aerohive     Published Date: Oct 15, 2014

This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.

Tags : mobile computing, the increase in mobile workers, byod policy implications for it, mobile data systems, mobile workers, cloud computing, virtualization, infrastructure
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
175 Documents
Bandwidth Management
270 Documents
Cloud Computing
1107 Documents
Colocation and Web Hosting
256 Documents
Content Management
330 Documents
Convergence
266 Documents
Data Center
1156 Documents
Data Center Design and Management
689 Documents
Data Management
1941 Documents
Distributed Computing
198 Documents
Enterprise Applications
1888 Documents
Ethernet Networking
192 Documents
Fibre Channel
152 Documents
Gigabit Networking
162 Documents
Governance
207 Documents
Green Computing
297 Documents
Grid Computing
174 Documents
Infrastructure
961 Documents
Internetworking Hardware
246 Documents
Interoperability
222 Documents
IP Networks
338 Documents
IP Telephony
313 Documents
IT Management
2461 Documents
Knowledge Management
976 Documents
Load Balancing
180 Documents
Local Area Networking
233 Documents
Migration
268 Documents
Monitoring
323 Documents
Network Architecture
524 Documents
Network Management
760 Documents
Network Performance
497 Documents
Network Performance Management
462 Documents
Network Provisioning
225 Documents
Network Security
563 Documents
OLAP
143 Documents
Optical Networking
153 Documents
Power and Cooling
267 Documents
Quality Of Service
199 Documents
Remote Access
306 Documents
Remote Network Management
258 Documents
Server Hardware
273 Documents
Servers
514 Documents
Small Business Networks
290 Documents
TCP/IP Protocol
178 Documents
Test And Measurement
198 Documents
Traffic Management
194 Documents
Tunneling
149 Documents
Utility Computing
163 Documents
VPN
220 Documents
Wide Area Networks
240 Documents
Wireless
481 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.