Networking White Papers

Results 76 - 100 of 2578Sort Results By: Published Date | Title | Company Name
By: Equinix     Published Date: Feb 13, 2014

Read our interconnectivity infopaper to find out how tapping into our more than 900 networks and 450 cloud providers can give you secure, high-bandwidth connections with zero latency and ensure your success in the Internet of Everything era.

Tags : interconnectivity, data center design, blades, servers, cloud computing, cloud application, green computing, storage
    
By: Equinix     Published Date: Feb 11, 2014

Get insights about your cloud options and learn how you can use hybrid cloud to make a difference in your business.

Tags : cloud applications, hybrid cloud, cloud computing, data center, data center optimization, application performance management, best practices
    
By: Lumension     Published Date: Feb 07, 2014

Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.

Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
By: Lumension     Published Date: Feb 07, 2014

Being able to compare the impact of application control and traditional anti-virus solutions could help you improve your server's performance and security.

Tags : lumension, server performance, server security, application control, anti-virus solutions, endpoints, application control solution, malware
    
By: Lumension     Published Date: Feb 07, 2014

Sit in on an expert panel discussion about the concerns of cyber security for businesses.

Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
By: Liaison Technologies     Published Date: Feb 07, 2014

Businesses and their IT departments are increasingly looking into the Cloud to drive innovation and increase business agility. Are you on the cloud?

Tags : liaison, the cloud, cloud computing, hybrid approach, hybrid business, business agility, increase innovation, applications or processes
    
By: Liaison Technologies     Published Date: Feb 07, 2014

Data integration and management can pave the way for quick realization of M&A success and time-to-value for every transaction. Have you looked into M&A?

Tags : liaison, data integration, data management, it resources, business continuity, systems and processes, autonomous acquisitions, information segregation
    
By: Liaison Technologies     Published Date: Feb 07, 2014

Big Data holds the promise of a virtually unlimited ability to gain insight – and foresight – to sharpen strategies and improve tactical execution but only if it can be harnessed and managed. Through this whitepaper, you can learn how.

Tags : liaison, data integration, data management, it resources, business continuity, systems and processes, autonomous acquisitions, information segregation
    
By: LogMeIn     Published Date: Jan 29, 2014

This guide details the factors that impact the purchasing decision of a remote support tool and provides a checklist for use as you work through your remote support solution selection process.

Tags : remote support, solution, complex, communication, sophistication, remote network management, customer interaction service, customer relationship management
    
By: F5 Networks Inc     Published Date: Jan 21, 2014

Applications are the lifeblood of any business. If you spent time or budget to develop or acquire an application, then it’s important—and it should work. However, tectonic shifts in technology are making it increasingly difficult to achieve this simple objective. Today, the majority of applications are accessed via the web and cloud become the preferred application development platform. Against this backdrop of change, the sheer volume of applications is staggering. Given these rapid, drastic changes, organizations are left to grapple with how to deliver applications in a secure, timely, and reliable manner. Read this whitepaper to learn how your business can tackle this feat by implementing a new architectural vision for delivering application services.

Tags : f5 networks, f5 synthesis, applications, constraint, application performance, application development, application development platform, cloud
    
By: F5 Networks Inc     Published Date: Jan 21, 2014

Cloud computing and the "bring your own device" (BYOD) trend will impact the design of future datacenters and their supporting networks. To attain the kind of business agility that companies now demand, network infrastructure needs to provide the flexibility required by cloud application workloads and the changing traffic patterns fostered by BYOD. To make networks more agile, new approaches to network implementation need to be enabled. As these trends continue, application delivery controllers (ADCs) will be critical elements in the new network infrastructure. This Technology Spotlight examines these trends and the role that F5 Networks' integrated scalable platform plays in this strategic market.

Tags : f5 networks, idc, cloud, cloud computing, bring your own device, byod, datacenter, network
    
By: F5 Networks Inc     Published Date: Jan 21, 2014

Information technology is at a crucial turning point. Enterprise IT departments are under constant pressure to meet user and application demands, aware that cloud deployments offer an easier and faster alternative but often pinned down by legacy deployment models. The problem stems from the inability of those legacy models to adapt to meet expectations for rapid provisioning, continuous delivery, and consistent performance across multiple environments. Read this whitepaper to learn more about the evolution of application delivery and the services your enterprise can utilize to successfully manage the increased pressure on network and application infrastructure.

Tags : f5 networks, f5 software, software defined application services, application services, application layer, application delivery, cloud, deployment
    
By: hightail     Published Date: Jan 17, 2014

Learn 6 tips and tricks that can help you better organize and utilize your email in order to increase productivity and improve your workflow.

Tags : knowledge management, enterprise applications, security management, email archiving, cloud computing, content management
    
By: hightail     Published Date: Jan 17, 2014

Learn how the method of data collection and storage has changed and learn the 4 essential stages of managing your content in the digital age.

Tags : enterprise applications, data management, secure content management, cloud computing, content management
    
By: hightail     Published Date: Jan 17, 2014

Learn 3 essential values for securing the cloud and see how you can better prioritize security and improve your organization’s productivity.

Tags : knowledge management, data management, mobile computing, mobile data systems, application integration, application performance management, best practices, business integration
    
By: hightail     Published Date: Jan 17, 2014

Learn 5 ways the cloud will enhance your professional life in 2014 and how understanding the technology will improve how organizations store and share files.

Tags : data management, security management, mobile computing, mobile data systems, application integration, application performance management, best practices, business analytics
    
By: IBM     Published Date: Jan 09, 2014

According to Dr. Barry Devlin of 9sight Consulting, the truth behind all the talk about big data and the possibilities it can offer is not hard to see, provided that organizations are willing to return to the principles of good data management processes.

Tags : ibm, big data, 9sight consulting, data, it management, maximize business, deployment, business opportunities
    
By: AccelOps     Published Date: Jan 08, 2014

Use real-time analytics and correlation for efficient root-cause analysis in your data center. Learn more about how AccelOps can help your company in our latest white paper.

Tags : accelops, application performance, network, data, data center, network monitoring, cloud, infrastructure
    
By: F5 Networks Inc     Published Date: Jan 03, 2014

Today, the expanding boundaries of computing make it imperative for IT to ensure responsive systems. As a result, a confluence of technological advances has shifted the dynamics of application performance, putting a greater pressure on IT to improve application performance. Download this whitepaper to learn about new technologies that are in the marketplace that will help your business tackle this new demand.

Tags : cloud, mobility, productivity, application, application performance, networking speed, cloud computing, productivty
    
By: IBM     Published Date: Jan 02, 2014

This study highlights the phases of the big data journey, the objectives and challenges of midsize organizations taking the journey, and the current state of the technology that they are using to drive results. It also offers a pragmatic course of action for midsize companies to take as they dive into this new era of computing.

Tags : ibm, analytics, global business service, big data, business value, it professionals, volume, velocity
    
By: Verint     Published Date: Nov 19, 2013

Companies have a wealth of customer data—but they often have difficulty consolidating and analyzing it to gain strategic advantage. This paper examines how organizations can apply text analytics to analyze information captured in customer interactions, and use it to enhance customer service while gaining a variety of business advantages.

Tags : verint, text analytics, social media, chat interactions, email, text analytics in action, customer communication, contact centers
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

This white paper examines the DDoS threat spectrum including conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.

Tags : distributed denial of service, ddos, ddos threat spectrum, network attacks, conventional network attacks, http floods, ssl floods, low bandwith threats
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

This whitepaper utilizes end-user interviews to better understand their DDoS defense plans, where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and explains the basic process required to have a chance of defending against a DDoS attack.

Tags : denial of service, distributed denial of service, ddos, ddos attacks, denial of service attacks, security, availability, defensive
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.

Tags : distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks
    
By: Comcast     Published Date: Oct 17, 2013

Ethernet Gains World Domination By Being Better, Faster, and Cheaper Than Other Networks Protocols

Tags : comcast, ethernet primer, enterprise intranet, production lan, networking
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
165 Documents
Bandwidth Management
239 Documents
Cloud Computing
776 Documents
Colocation and Web Hosting
225 Documents
Content Management
296 Documents
Convergence
257 Documents
Data Center
911 Documents
Data Center Design and Management
548 Documents
Data Management
1391 Documents
Distributed Computing
170 Documents
Enterprise Applications
1229 Documents
Ethernet Networking
179 Documents
Fibre Channel
142 Documents
Gigabit Networking
152 Documents
Governance
201 Documents
Green Computing
281 Documents
Grid Computing
167 Documents
Infrastructure
826 Documents
Internetworking Hardware
211 Documents
Interoperability
206 Documents
IP Networks
325 Documents
IP Telephony
308 Documents
IT Management
1274 Documents
Knowledge Management
564 Documents
Load Balancing
169 Documents
Local Area Networking
224 Documents
Migration
225 Documents
Monitoring
300 Documents
Network Architecture
411 Documents
Network Management
642 Documents
Network Performance
371 Documents
Network Performance Management
372 Documents
Network Provisioning
211 Documents
Network Security
485 Documents
OLAP
133 Documents
Optical Networking
142 Documents
Power and Cooling
256 Documents
Quality Of Service
172 Documents
Remote Access
263 Documents
Remote Network Management
233 Documents
Server Hardware
255 Documents
Servers
452 Documents
Small Business Networks
260 Documents
TCP/IP Protocol
169 Documents
Test And Measurement
183 Documents
Traffic Management
183 Documents
Tunneling
141 Documents
Utility Computing
154 Documents
VPN
215 Documents
Wide Area Networks
225 Documents
Wireless
333 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.