Networking White Papers

Results 351 - 375 of 3352Sort Results By: Published Date | Title | Company Name
By: Dell     Published Date: Jan 21, 2015

Public cloud adoption has been more of a grassroots affair, with individual developers or small teams identifying a requirement and using a credit card to rent the resources they think they need.

Tags : dell, hybrid cloud, cloud computing, cloud strategy, private cloud infrastructure, infrastructure, storage virtualization, disaster recovery
    
By: Cisco     Published Date: Jan 21, 2015

Everyone should be able to communicate from any device - especially in an emergency situation. The Cisco IP Interoperability and Collaboration Solution (IPICS) brings this capability to ANY organization without anyone having to purchase new or unique devices. In this clip we build a fully functional network on set to see exactly how this works, even using an iPad to communicate to a hand held radio.

Tags : cisco, ipics, interoperability, collaboration, solution, device, emergency, intelligence
    
By: Cisco     Published Date: Jan 21, 2015

Jimmy Ray takes to the whiteboard to explain how MediaNet has transformed deployment and operation of video surveillance and made it more accessible.

Tags : cisco, medianet, media, net, video, intelligence, surveillance, deployment
    
By: Cisco     Published Date: Jan 21, 2015

The latest version of the Medianet-enabled Video Surveillance Manager (VSM) now runs on the Cisco Unified Computing System. Scale and reliability are redefined as Intelligent Networked Surveillance has come of age. VSM 7 and MediaNet have completely changed how this is deployed and operated.

Tags : cisco, vsm, surveillance, manager, unified, computing, system, scale
    
By: Avaya     Published Date: Jan 20, 2015

This paper explores the comprehensive collaboration solution for midsize companies as provided by Avaya.

Tags : collaboration for midsize companies, collaboration solutions, remote working, avaya, enagaging your workforce, improving the customer experience, collaboration technology, virtual landscape
    
By: Cisco     Published Date: Jan 20, 2015

The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.

Tags : datacenter, optimization, computing, enterprise, scalability, network, orchestration, innovation
    
By: Avaya     Published Date: Jan 20, 2015

Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!

Tags : midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya, infrastructure, network security, remote access, remote network management
    
By: Masergy     Published Date: Jan 20, 2015

This presentation will illustrate how IT leaders are leveraging Unified Communications (UC) to deliver real-world business impact and present a roadmap for moving from application- and device-specific infrastructures to a more flexible Unified Communications (UC) solution.

Tags : masergy, unified communications, ucaas, business communications, ip networks, ip telephony, network architecture, small business networks
    
By: Avaya     Published Date: Jan 20, 2015

The Hitchhiker's Guide to the Software-Defined Data Center is a Z K Research paper aiming to provide you with the necessary information to make an informed choice on choosing the right SDDC solution provider for your business.

Tags : software defined data center, sddc, a guide to sddc, sddc solution providers, the network requirements of an sddc, avaya sddc solutions, data management, business management
    
By: Cisco     Published Date: Jan 16, 2015

Today’s branch office requires the same level of rich application services as the company headquarters to ensure business innovation and employee productivity. Why are these services needed? What impact do they have on the network, IT staff, and service provider? What is the best way to boost the branch-office network to optimum levels - both technically and tactfully - if the devices provided do not meet the new requirements? Read on to learn more.

Tags : application services, innovation, employee productivity, technically, devices, network, networking, enterprise applications
    
By: Rackspace     Published Date: Jan 16, 2015

This white paper aims to help businesses understand the total value of ownership (TVO) delivered by the managed cloud by documenting and evaluating the potential impact of several key qualitative factors.

Tags : rackspace, tco, managed cloud, cloud spend, roi, infrastructure, network architecture, it spending
    
By: Entrust     Published Date: Jan 16, 2015

Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach. A brief look at the history of malware attacks reveals a degree of variance within the virtual threat landscape that makes pinpointing and stopping such attacks extremely difficult. As the historic virus examples illustrate, the malware problem has been and will continue to be a constant threat. Since an offensive line against cybercrime is not possible, enterprises need to prepare the best defense they can.

Tags : entrust, malware, history, threat, concern, virus, sql, stuxnet
    
By: Entrust     Published Date: Jan 16, 2015

Google is phasing out SHA-1, a secure hash algorithm for SSL certificates that has proven susceptible to collision attacks. But upgrading is complex. Entrust navigates you through the rapid sun-setting of SHA-1 certificates for a seamless, secure experience for your end users.

Tags : entrust, sha-2, chrome, security, certificate, b2b, application, browser
    
By: Entrust     Published Date: Jan 16, 2015

With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.

Tags : entrust, server, risk, assessment, authentication, standards, layered, authentication
    
By: Comcast Business     Published Date: Jan 15, 2015

It’s the challenge businesses of every size wrestle with: How to improve employee productivity while driving down costs. Technology can help achieve that goal – when the right tools are used.

Tags : comcast, technology, business, blueprint, plan, start-up, start, future
    
By: Comcast Business     Published Date: Jan 15, 2015

For most small and mid-sized businesses the future is all about growth, and a cloud-based approach to information technology is inherently supportive of growth strategies.

Tags : comcast, technology, business, blueprint, plan, start-up, start, future
    
By: Rackspace     Published Date: Jan 15, 2015

Whether you’re looking to move over an entire IT function like e-mail, or simply to provision more storage or processing, a successful outsourcing project requires a cohesive strategy with clearly defined business problems, goals, stakeholders and processes. This white paper outlines 12 critical success factors to consider when developing such a strategy.

Tags : rackspace, outsourcing, outsource project, storage, managed hosting, cloud computing, infrastructure, backup and recovery
    
By: Rackspace     Published Date: Jan 15, 2015

This white paper aims to help businesses address these fundamental questions, based on a Total Cost of Ownership (TCO) modeling methodology built from Rackspace’s extensive experience working with IT organizations of all sizes, in order to make an informed ROI assessment.

Tags : rackspace, outsource, tco, it spending, infrastructure outsource, infrastructure, small business networks, backup and recovery
    
By: Comcast Business     Published Date: Jan 15, 2015

Technology evolves at breakneck speed, and it plays an increasingly important role in the success of all types of businesses, regardless of size.

Tags : comcast, technology, business, blueprint, plan, start-up, start, future
    
By: Comcast Business     Published Date: Jan 15, 2015

Consider some of the advanced capabilities built into Comcast’s Business VoiceEdge™ hosted voice solution – and how they impact, and better enable, mobility.

Tags : the cloud, voice solutions, productivity, customer service, cloud based, mobile, mobile employees, mobile data systems
    
By: CDW     Published Date: Jan 14, 2015

Learn how to Optimize Your Network for Wireless Networking and see the three immediate advantages that your organization will gain.

Tags : enterprise, networking, architecture, customer, technology, wireless, telephony systems, collaboration
    
By: CDW     Published Date: Jan 14, 2015

Learn why teams and fans love the benefits a stadium network upgrade can bring and see what your organization should do to capitalize on these business advantages.

Tags : network, upgrade, business advantages, benefits, networking, data management
    
By: CDW     Published Date: Jan 14, 2015

Learn how to create an enterprise network architecture that delivers 100% tailored solutions that help your customers optimize their networks while bringing their organizations up to speed.

Tags : enterprise, networking, architecture, customer, technology, wireless, telephony systems, collaboration
    
By: CDW     Published Date: Jan 14, 2015

Learn how optimizing your campus network solutions will transform the student body by allowing students to seamlessly surf the web, but also communicate with each other in a more fluid manner.

Tags : enterprise, networking, architecture, customer, technology, wireless, telephony systems, collaboration
    
By: CDW     Published Date: Jan 14, 2015

Learn how to achieve a best-in-class wireless infrastructure and see how this will give your organization an opportunity to improve their Wi-Fi network performance and capacity to better serve us all.

Tags : wireless, infrastructure, network, performance, productivity, digital age, it components, wifi
    
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End

Related IT Whitepaper Topics

Active Directory
175 Documents
Bandwidth Management
266 Documents
Cloud Computing
1050 Documents
Colocation and Web Hosting
252 Documents
Content Management
321 Documents
Convergence
266 Documents
Data Center
1145 Documents
Data Center Design and Management
653 Documents
Data Management
1914 Documents
Distributed Computing
195 Documents
Enterprise Applications
1868 Documents
Ethernet Networking
190 Documents
Fibre Channel
154 Documents
Gigabit Networking
162 Documents
Governance
206 Documents
Green Computing
296 Documents
Grid Computing
174 Documents
Infrastructure
927 Documents
Internetworking Hardware
240 Documents
Interoperability
219 Documents
IP Networks
336 Documents
IP Telephony
313 Documents
IT Management
2383 Documents
Knowledge Management
947 Documents
Load Balancing
177 Documents
Local Area Networking
233 Documents
Migration
256 Documents
Monitoring
322 Documents
Network Architecture
486 Documents
Network Management
706 Documents
Network Performance
463 Documents
Network Performance Management
438 Documents
Network Provisioning
220 Documents
Network Security
549 Documents
OLAP
142 Documents
Optical Networking
152 Documents
Power and Cooling
266 Documents
Quality Of Service
194 Documents
Remote Access
307 Documents
Remote Network Management
259 Documents
Server Hardware
270 Documents
Servers
508 Documents
Small Business Networks
289 Documents
TCP/IP Protocol
178 Documents
Test And Measurement
199 Documents
Traffic Management
194 Documents
Tunneling
150 Documents
Utility Computing
163 Documents
VPN
220 Documents
Wide Area Networks
240 Documents
Wireless
468 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.