Networking White Papers

Results 76 - 100 of 2585Sort Results By: Published Date | Title | Company Name
By: Lumension     Published Date: Feb 07, 2014

Sit in on an expert panel discussion about the concerns of cyber security for businesses.

Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
By: Liaison Technologies     Published Date: Feb 07, 2014

Businesses and their IT departments are increasingly looking into the Cloud to drive innovation and increase business agility. Are you on the cloud?

Tags : liaison, the cloud, cloud computing, hybrid approach, hybrid business, business agility, increase innovation, applications or processes
    
By: Liaison Technologies     Published Date: Feb 07, 2014

Data integration and management can pave the way for quick realization of M&A success and time-to-value for every transaction. Have you looked into M&A?

Tags : liaison, data integration, data management, it resources, business continuity, systems and processes, autonomous acquisitions, information segregation
    
By: Liaison Technologies     Published Date: Feb 07, 2014

Big Data holds the promise of a virtually unlimited ability to gain insight – and foresight – to sharpen strategies and improve tactical execution but only if it can be harnessed and managed. Through this whitepaper, you can learn how.

Tags : liaison, data integration, data management, it resources, business continuity, systems and processes, autonomous acquisitions, information segregation
    
By: LogMeIn     Published Date: Jan 29, 2014

This guide details the factors that impact the purchasing decision of a remote support tool and provides a checklist for use as you work through your remote support solution selection process.

Tags : remote support, solution, complex, communication, sophistication, remote network management, customer interaction service, customer relationship management
    
By: F5 Networks Inc     Published Date: Jan 21, 2014

Applications are the lifeblood of any business. If you spent time or budget to develop or acquire an application, then it’s important—and it should work. However, tectonic shifts in technology are making it increasingly difficult to achieve this simple objective. Today, the majority of applications are accessed via the web and cloud become the preferred application development platform. Against this backdrop of change, the sheer volume of applications is staggering. Given these rapid, drastic changes, organizations are left to grapple with how to deliver applications in a secure, timely, and reliable manner. Read this whitepaper to learn how your business can tackle this feat by implementing a new architectural vision for delivering application services.

Tags : f5 networks, f5 synthesis, applications, constraint, application performance, application development, application development platform, cloud
    
By: F5 Networks Inc     Published Date: Jan 21, 2014

Cloud computing and the "bring your own device" (BYOD) trend will impact the design of future datacenters and their supporting networks. To attain the kind of business agility that companies now demand, network infrastructure needs to provide the flexibility required by cloud application workloads and the changing traffic patterns fostered by BYOD. To make networks more agile, new approaches to network implementation need to be enabled. As these trends continue, application delivery controllers (ADCs) will be critical elements in the new network infrastructure. This Technology Spotlight examines these trends and the role that F5 Networks' integrated scalable platform plays in this strategic market.

Tags : f5 networks, idc, cloud, cloud computing, bring your own device, byod, datacenter, network
    
By: F5 Networks Inc     Published Date: Jan 21, 2014

Information technology is at a crucial turning point. Enterprise IT departments are under constant pressure to meet user and application demands, aware that cloud deployments offer an easier and faster alternative but often pinned down by legacy deployment models. The problem stems from the inability of those legacy models to adapt to meet expectations for rapid provisioning, continuous delivery, and consistent performance across multiple environments. Read this whitepaper to learn more about the evolution of application delivery and the services your enterprise can utilize to successfully manage the increased pressure on network and application infrastructure.

Tags : f5 networks, f5 software, software defined application services, application services, application layer, application delivery, cloud, deployment
    
By: hightail     Published Date: Jan 17, 2014

Learn 6 tips and tricks that can help you better organize and utilize your email in order to increase productivity and improve your workflow.

Tags : knowledge management, enterprise applications, security management, email archiving, cloud computing, content management
    
By: hightail     Published Date: Jan 17, 2014

Learn how the method of data collection and storage has changed and learn the 4 essential stages of managing your content in the digital age.

Tags : enterprise applications, data management, secure content management, cloud computing, content management
    
By: hightail     Published Date: Jan 17, 2014

Learn 3 essential values for securing the cloud and see how you can better prioritize security and improve your organization’s productivity.

Tags : knowledge management, data management, mobile computing, mobile data systems, application integration, application performance management, best practices, business integration
    
By: hightail     Published Date: Jan 17, 2014

Learn 5 ways the cloud will enhance your professional life in 2014 and how understanding the technology will improve how organizations store and share files.

Tags : data management, security management, mobile computing, mobile data systems, application integration, application performance management, best practices, business analytics
    
By: IBM     Published Date: Jan 09, 2014

According to Dr. Barry Devlin of 9sight Consulting, the truth behind all the talk about big data and the possibilities it can offer is not hard to see, provided that organizations are willing to return to the principles of good data management processes.

Tags : ibm, big data, 9sight consulting, data, it management, maximize business, deployment, business opportunities
    
By: F5 Networks Inc     Published Date: Jan 03, 2014

Today, the expanding boundaries of computing make it imperative for IT to ensure responsive systems. As a result, a confluence of technological advances has shifted the dynamics of application performance, putting a greater pressure on IT to improve application performance. Download this whitepaper to learn about new technologies that are in the marketplace that will help your business tackle this new demand.

Tags : cloud, mobility, productivity, application, application performance, networking speed, cloud computing, productivty
    
By: IBM     Published Date: Jan 02, 2014

This study highlights the phases of the big data journey, the objectives and challenges of midsize organizations taking the journey, and the current state of the technology that they are using to drive results. It also offers a pragmatic course of action for midsize companies to take as they dive into this new era of computing.

Tags : ibm, analytics, global business service, big data, business value, it professionals, volume, velocity
    
By: Verint     Published Date: Nov 19, 2013

Companies have a wealth of customer data—but they often have difficulty consolidating and analyzing it to gain strategic advantage. This paper examines how organizations can apply text analytics to analyze information captured in customer interactions, and use it to enhance customer service while gaining a variety of business advantages.

Tags : verint, text analytics, social media, chat interactions, email, text analytics in action, customer communication, contact centers
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

This white paper examines the DDoS threat spectrum including conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.

Tags : distributed denial of service, ddos, ddos threat spectrum, network attacks, conventional network attacks, http floods, ssl floods, low bandwith threats
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

This whitepaper utilizes end-user interviews to better understand their DDoS defense plans, where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and explains the basic process required to have a chance of defending against a DDoS attack.

Tags : denial of service, distributed denial of service, ddos, ddos attacks, denial of service attacks, security, availability, defensive
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.

Tags : distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks
    
By: Comcast     Published Date: Oct 17, 2013

Ethernet Gains World Domination By Being Better, Faster, and Cheaper Than Other Networks Protocols

Tags : comcast, ethernet primer, enterprise intranet, production lan, networking
    
By: Comcast     Published Date: Oct 17, 2013

Learn how Ethernet has grown from a little-known networking protocol to the industry standard and is the best way for your IT team to cut costs, while increasing productivity.

Tags : comcast, ethernet primer, enterprise intranet, production lan, ethernet, total cost of ownership, networking
    
By: Riverbed     Published Date: Sep 19, 2013

Unified communications (UC) is a powerful technology with a multifaceted value proposition. UC can significantly reduce the cost of communications but more importantly raises productivity by streamlining the collaboration process. Download now to read how UC can increase your company productivity.

Tags : riverbed, unified communications, ip networks, mobile workers, smartphones, collaboration, ip telephony, network architecture
    
By: Riverbed     Published Date: Sep 17, 2013

Learn how Riverbed® OPNET Unified Communications Xpert™ (UC Xpert) software provides end-to-end service management for Unified Communications and remote troubleshooting.

Tags : riverbed, service management, ip communications, ip networks, ip telephony, web conferencing, ip faxing, wireless office
    
By: Riverbed     Published Date: Aug 15, 2013

In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Download now to find the results!

Tags : apm, riverbed, network performance, application performance, infrastrucure, forrester report, business performance, it survey
    
By: F5 Networks Inc     Published Date: Aug 13, 2013

While the promises of reduced costs and greater flexibility are driving companies to the cloud, these benefits can be negated by new management and processes which are often manual and disconnected from existing systems. This white paper explores strategies that enables IT departments to embrace the shift to being a services-based organization without relinquishing the control necessary to ensure the security, performance, and reliable delivery of applications.

Tags : cloud, security, performance, reliable delivery, networking, data management, application performance management, cloud computing
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
165 Documents
Bandwidth Management
239 Documents
Cloud Computing
779 Documents
Colocation and Web Hosting
225 Documents
Content Management
296 Documents
Convergence
257 Documents
Data Center
913 Documents
Data Center Design and Management
548 Documents
Data Management
1406 Documents
Distributed Computing
171 Documents
Enterprise Applications
1239 Documents
Ethernet Networking
179 Documents
Fibre Channel
142 Documents
Gigabit Networking
152 Documents
Governance
201 Documents
Green Computing
280 Documents
Grid Computing
167 Documents
Infrastructure
828 Documents
Internetworking Hardware
211 Documents
Interoperability
206 Documents
IP Networks
325 Documents
IP Telephony
308 Documents
IT Management
1294 Documents
Knowledge Management
574 Documents
Load Balancing
169 Documents
Local Area Networking
224 Documents
Migration
225 Documents
Monitoring
300 Documents
Network Architecture
412 Documents
Network Management
643 Documents
Network Performance
372 Documents
Network Performance Management
372 Documents
Network Provisioning
211 Documents
Network Security
485 Documents
OLAP
133 Documents
Optical Networking
142 Documents
Power and Cooling
256 Documents
Quality Of Service
172 Documents
Remote Access
263 Documents
Remote Network Management
233 Documents
Server Hardware
256 Documents
Servers
452 Documents
Small Business Networks
260 Documents
TCP/IP Protocol
169 Documents
Test And Measurement
184 Documents
Traffic Management
182 Documents
Tunneling
141 Documents
Utility Computing
154 Documents
VPN
215 Documents
Wide Area Networks
225 Documents
Wireless
337 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.