Networking White Papers

Results 301 - 325 of 2970Sort Results By: Published Date | Title | Company Name
By: Intel     Published Date: Aug 19, 2014

Around the world and across all industries, high-performance computing is being used to solve today’s most important and demanding problems. More than ever, storage solutions that deliver high sustained throughput are vital for powering HPC and Big Data workloads.

Tags : intel, data center, big data, hadoop, cloud, lustre, hpc, infrastructure
    
By: CA Technologies     Published Date: Aug 19, 2014

As demands on the data center increase, IT and facilities departments need to be able to increase and sustain high availability, maximize efficiency and minimize costs. Data Center Infrastructure Management (DCIM) provides an integrated platform for monitoring and measuring consumption, capacity and performance of both IT and facilities resources in the data center.

Tags : ca technologies, dcim, data center, data center operations, infrastructure, blade servers, storage management, server virtualization
    
By: Global Knowledge     Published Date: Aug 19, 2014

The process of subnetting is both a mathematical process and a network design process. Mathematics drives how subnets are calculated, identified, and assigned. The network design and requirements of the organization drive how many subnets are needed and how many hosts an individual subnet needs to support.

Tags : subnetting, broadcast domains, network design process, ip networks, ip telephony, wireless infrastructure
    
By: Global Knowledge     Published Date: Aug 19, 2014

This white paper explains how you can obtain the skills for troubleshooting Cisco networks, which requires mastery of several basic steps and much practice before applying the skills effectively in a production environment. This document does not contain any troubleshooting cases or examples because that is not how troubleshooting skills are learned.

Tags : troubleshooting techniques, network baseline, network diagrams, network maintenance, network management, network performance, network performance management
    
By: CA Technologies     Published Date: Aug 19, 2014

IT organizations are increasingly being called upon to cost-effectively deliver reliable support for the entire catalog of business services, or risk outsourcing to a managed service provider.

Tags : ca technologies, capacity management, business automation, business intelligence, business scoring, network performance, business analytics, business process automation
    
By: CA Technologies     Published Date: Aug 19, 2014

There are few concerns more critical to the success of an enterprise than the performance of its applications. Business applications are the engines that keep the business moving, representing both the touch points for customers as well as the means of interaction among employees. If the performance of critical applications is restricted in any way, the business can suffer irreparable damages.

Tags : ca technologies, application performance management, capacity management, business applications, business integration, network performance management, application integration, business analytics
    
By: bitglass     Published Date: Aug 19, 2014

In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.

Tags : bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach
    
By: CA Technologies     Published Date: Aug 19, 2014

The data center is getting bigger and more complex and so too is the asset inventory. Every new asset has an impact on the day–to–day operations of the data center – from power consumption and problem resolution to capacity planning and change management.

Tags : ca technologies, dcim, asset management, power, power and cooling, data center energy, servers, backup and recovery
    
By: Riverbed     Published Date: Aug 19, 2014

Riverbed Optimization System (RiOS™) is the software that powers Riverbed’s unique award-winning line of Steelhead™ application acceleration appliances and Steelhead Mobile client software.

Tags : optimization, wan bandwidth, high-latency, traffic, wan, wide area networks
    
By: Server Technology     Published Date: Aug 19, 2014

In this paper we will explore the advantages of a new, less common approach to PDU design by means of alternating each phase on a per-receptacle basis instead of a per branch basis.

Tags : server technology, blades, racks, data center, data center power, power and cooling, green computing, cloud computing
    
By: CA Technologies     Published Date: Aug 19, 2014

To help organizations plan their DCIM roadmap, this paper explores five essential DCIM use cases and outcomes. From better asset utilization and faster provisioning to maintaining availability, greater efficiency and smarter capacity planning, we look at how DCIM can close the operational and optimization gap for both IT and facilities.

Tags : ca technologies, it operations, dcim, data center management, data center capacity, performance management, blade servers, storage management
    
By: BMC Software     Published Date: Aug 18, 2014

IT as a Service (ITaaS) will transform future IT operations and service delivery. In the interim, Hybrid IT offers a rational, gradual approach in which some services move to SaaS while others remain on-premise. This white paper provides a strategy to move part or all of your ITSM suite to the cloud as a stepping stone to ITaaS.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: Aug 18, 2014

Increasingly, enterprise organizations are moving to the cloud for IT Service Management (ITSM)—but is cloud delivery right for your business? Learn about the changing face of ITSM and gain the perspective needed to make the right ITSM decision for your organization. Get the free white paper from Enterprise Management Associates.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: Aug 18, 2014

IT is embracing this new world of consumerized technology with a focus on its own employees as internal customers. Explore how customer-first policies can make use of social, mobile and cloud technologies to give workers the freedom and flexibility they desire to drive company productivity.

Tags : customer, cloud technology, internal, productivity, networking, it management, customer relationship management, customer satisfaction
    
By: Cisco     Published Date: Aug 18, 2014

Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.

Tags : email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
By: Cisco     Published Date: Aug 18, 2014

Dive into the key factors that enable Cisco Unified Computing System, powered by the Intel Xeon® processor, to change the way IT organizations work. Download the brief to learn how Cisco UCS can help IT become an integrated, strategic part of your organization.

Tags : servers, data, innovative, data center, architecture, performance, processors, blade
    
By: Cisco     Published Date: Aug 18, 2014

Cisco continues to improve the industry's most innovative and leading data center architecture, and now makes it easy to save when you trade up to the record-setting performance of Cisco UCS M3 Blade Servers with the latest Intel® Xeon® processors. UCS Advantage* is a limited time program that allows customers with qualified Cisco UCS M1/M2 and HP servers and blade chassis to refresh legacy equipment and get credit toward new Cisco UCS M3 Blade Servers and infrastructure.

Tags : servers, data, innovative, data center, architecture, performance, processors, blade
    
By: Cisco     Published Date: Aug 18, 2014

IT can be one of the biggest concerns for businesses today. Security, compliance, enablement, cost control and scalability must all be considered. Additionally, with insurgent trends such as mobility changing the face of business, choosing a partner who is able to consultatively deliver multiple services and solutions is increasingly important. We have now strengthened the scope of our Unified Computing System by expanding our data centre management capabilities. Fill in your details to the right to download your free white paper and learn how we have become the key supplier of converged technology and services in this space.

Tags : ucs, scope, cisco, security, compliance, servers, data, innovative
    
By: Cisco     Published Date: Aug 18, 2014

The Cisco Unified Computing System (Cisco UCS), powered by the Intel® Xeon® processor, is easier to deploy and more cost-effective than the competition. Results show that with Cisco UCS, you can: Deploy and manage with less hardware Eliminate the need for additional software licensing Reduce your capital expenditure by as much as 22.1%

Tags : comparison, flex system, cost-effective, servers, data, innovative, data center, architecture
    
By: Cisco     Published Date: Aug 18, 2014

Start planning your deployment of the Cisco Unified Computing System (Cisco UCS), powered by the Intel® Xeon® processor, with this useful, step-by-step design guide. The Cisco UCS Technology Design Guide simplifies the steps to a successful deployment. Four modules guide you through a Cisco engineer-tested framework that addresses typical data center and server issues.

Tags : design guide, deployment, computing, servers, data, innovative, data center, architecture
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, network security, application security, web service security
    
By: McAfee     Published Date: Aug 15, 2014

À medida que a tecnologia de firewall de próxima geração (NGFW, next-generation firewall) se populariza, é necessário analisar as funções e os recursos avançados que separam os “líderes” dos “atrasados”. Nos termos mais básicos, o consenso sobre a definição do NGFW incluiria as seguintes capacidades: recursos de firewall padrão como conversão de endereços de rede e inspeção com monitoramento de estado, prevenção de intrusões integrada, reconhecimento de aplicativos e algum nível de inteligência e integração com bancos de dados de vulnerabilidades e reputações.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas de evasão avançadas (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais. Elas podem transportar ataques ou explorações, passando pelos dispositivos de segurança de rede e firewalls, firewalls de próxima geração, sistemas de detecção e prevenção de intrusões e até mesmo roteadores que executam inspeção aprofundada de pacotes. Neste livro, você aprenderá tudo sobre as AETs, além de obter informações e dicas para ajudar a proteger sua empresa. Se você trabalha no governo, na área militar, no setor financeiro, industrial, comércio eletrônico ou outros setores com infraestrutura crítica, leia este livro para conhecer o inimigo e saber como se proteger melhor contra as evasões avançadas.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, aet, ngfw
    
By: McAfee     Published Date: Aug 15, 2014

As redes são projetadas para facilitar o fluxo de comunicação e não para dificultá-lo. Infelizmente, os pacotes de dados podem ser manipulados para parecerem normais, embora contenham uma exploração.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, aet, ngfw
    
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End

Related IT Whitepaper Topics

Active Directory
168 Documents
Bandwidth Management
248 Documents
Cloud Computing
954 Documents
Colocation and Web Hosting
240 Documents
Content Management
308 Documents
Convergence
260 Documents
Data Center
1052 Documents
Data Center Design and Management
600 Documents
Data Management
1651 Documents
Distributed Computing
180 Documents
Enterprise Applications
1581 Documents
Ethernet Networking
184 Documents
Fibre Channel
147 Documents
Gigabit Networking
157 Documents
Governance
203 Documents
Green Computing
287 Documents
Grid Computing
171 Documents
Infrastructure
859 Documents
Internetworking Hardware
221 Documents
Interoperability
210 Documents
IP Networks
332 Documents
IP Telephony
308 Documents
IT Management
1881 Documents
Knowledge Management
734 Documents
Load Balancing
175 Documents
Local Area Networking
228 Documents
Migration
231 Documents
Monitoring
305 Documents
Network Architecture
447 Documents
Network Management
662 Documents
Network Performance
409 Documents
Network Performance Management
398 Documents
Network Provisioning
217 Documents
Network Security
506 Documents
OLAP
138 Documents
Optical Networking
147 Documents
Power and Cooling
250 Documents
Quality Of Service
177 Documents
Remote Access
288 Documents
Remote Network Management
241 Documents
Server Hardware
267 Documents
Servers
495 Documents
Small Business Networks
277 Documents
TCP/IP Protocol
177 Documents
Test And Measurement
190 Documents
Traffic Management
190 Documents
Tunneling
146 Documents
Utility Computing
160 Documents
VPN
214 Documents
Wide Area Networks
234 Documents
Wireless
390 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.