Networking White Papers

Results 76 - 100 of 3137Sort Results By: Published Date | Title | Company Name
By: Dyn     Published Date: Jan 14, 2015

Every user’s first interaction with your website begins with a series of DNS queries. Poor DNS performance can lead to slow page loads, dissatisfied customers, and lost business. However, you can improve results, contain costs, and make better use of valuable IT personnel by leveraging a cloud-based DNS service.

Tags : cloud based, dns service, ddos attack, user experience, infrastructure, dns performace, ddos, business intelligence
    
By: Dyn     Published Date: Jan 14, 2015

Take a few minutes to read this whitepaper, evaluate the potential risk and the potential cost a DDoS attack will have on your business and gain key tips on how to mitigate both.

Tags : ddos attack, integration, mitigation, ddos outage, business protection, business security, infrastructure, ddos
    
By: Dyn     Published Date: Jan 14, 2015

Whether your business is establishing brand awareness, driving online sales or executing a digital advertising strategy the fact of the matter is, your website performance matters.

Tags : network latency, website performance, latency, dns network, business intelligence, infrastructure, network management, network performance
    
By: Dyn     Published Date: Jan 14, 2015

A DDoS Attack or distributed denial of service attack can happen to any online entity, at any time. By overwhelming your DNS infrastructure, malicious attackers can impair your website, tarnish your company’s reputation, and impact your bottom line. So what are your company’s risks and how can you mitigate them?

Tags : mitigation, dns ddos, ddos attacks, business security, bottom line, mitigation, improve results, cloud based
    
By: Dyn     Published Date: Jan 14, 2015

Read this whitepaper and learn the 5 ways to keeping your network up and your customers happy.

Tags : infrastructure, disaster planning, data center, ttl, monitoring, redirect traffic, server health, business intelligence
    
By: SugarCRM     Published Date: Jan 07, 2015

The way companies use and pay for customer relationship management (CRM) software has changed significantly over the past decade. Moving from a predominantly perpetual license-based system, where companies paid a large up-front sum and then smaller annual maintenance fees, CRM software providers are now moving towards monthly or annual subscription fees to access CRM software on the Internet.

Tags : crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing
    
By: LogMeIn     Published Date: Jan 06, 2015

This White Paper provides information on how to avoid technology frustrations that sap productivity.

Tags : online meetings, business online meetings, how to improve online meetings, online conferences, network performance, quality of service, remote access, remote network management
    
By: LogMeIn     Published Date: Jan 06, 2015

This paper confirms a changing mix in how Businesses demand web conferencing solutions that are built for modern employees, and a new, more agile and connected workforce.

Tags : death of the web conference, demands on web conferencing solutions, conferencing tools, modern conferencing tools, network performance management, remote network management, wireless communications, customer interaction service
    
By: Network Instruments     Published Date: Dec 29, 2014

Big data projects are becoming reality for nearly every major enterprise. According to a recent survey, 49 percent of respondents say they are implementing, or likely to implement big data projects in the future. Twelve percent already have. With big data comes surprising impacts to your network. The 4 Steps to Surviving Big Data white paper will help you identify problems before they start.

Tags : big data, data projects, network performance, data management, network impact, network performance management, business metrics
    
By: Network Instruments     Published Date: Dec 29, 2014

Ready to effectively monitor in the cloud? It’s time to go beyond vendor provided data and establish performance metrics and baselines that matter. The 3 Key Cloud Monitoring Metrics IT Brief helps you identify cloud monitoring challenges while providing the strategies to succeed.

Tags : cloud monitoring, cloud metrics, business analytics, performance monitoring, data, cloud data, metrics, business metrics
    
By: Oracle     Published Date: Dec 11, 2014

There are so many social options for businesses these days it can be overwhelming. This guide gives you some helpful tips on choosing what communities – from online forums and content hosting sites to brand communities and Q&A sites – are right for your business goals. How do you plan for participation? How do you ensure the highest value is delivered. And do you need a designated community manager? Find out.

Tags : oracle, eloqua, creative kickstarter, q&a, monitoring, networking, it management, knowledge management
    
By: Oracle     Published Date: Dec 11, 2014

"Hopeful messaging is wasted messaging. Clear targeting means more than just Who. It also demands a knowledge of How, When, and What. Read this quick guide on what you can do to ensure your web pages and white papers, social posts, and search optimization are primed and ready for any “road to discovery” your audience takes. Get a clearer picture of who is involved in the buying process. Download the “Modern Marketing Essentials How-To Guide: Targeting”

Tags : oracle, marketing cloud, targetting, persona-driven communication, segmentation, database transformation, networking, software development
    
By: Oracle     Published Date: Dec 11, 2014

It used to take just a slidedeck and some brochures to “enable” the sales team. Not anymore. With modern marketing technology, you now can arm sales with ESP-like insights on their prospects’ online activities in regards to your products and services. This guide reveals the insights and ammunition Modern Marketing offers around determining buyer readiness and the most effective ways to engage each, individually. Read it now.

Tags : oracle, eloqua, sales enablement, high-quality leads, productive marketing, networking, it management, knowledge management
    
By: Kaspersky     Published Date: Dec 09, 2014

Most established organizations have large IT departments with staff exclusively devoted to IT security. Education is a key component of this defensive strategy in today’s cybercriminal ecosystem. If you don’t know it’s there, you can’t defend against it.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, email security, identity management, network security, anti spyware
    
By: FORTRUST     Published Date: Nov 20, 2014

This paper details the steps FORTRUST has taken as an organization to reduce our impact on the environment, while growing and improving the company as a whole—a process that continues to this day.

Tags : fortrust, data center, green computing, power consumption, power and cooling, data center efficiency, network architecture, server hardware
    
By: Cisco     Published Date: Nov 17, 2014

Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.

Tags : spyware, rootkits, hacking, cisco, advanced threat protection, networking, security, enterprise applications
    
By: Cisco     Published Date: Nov 17, 2014

Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile

Tags : malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking
    
By: Cisco     Published Date: Nov 17, 2014

Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.

Tags : endpoint proliferation, ids, ips, externalization, cisco, networking, security, software development
    
By: Cisco     Published Date: Nov 17, 2014

The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.

Tags : cloud-computing, malware, cisco, malware infection, amp, networking, security, it management
    
By: IBM     Published Date: Nov 14, 2014

IBM Platform HPC Total Cost of Ownership (TCO) tool offers a 3-year total cost of ownership view of your distributed computing environment and savings that you could potentially experience by using IBM Platform HPC in place of competing cluster management software.

Tags : ibm, hpc, distributed computing, tco, clusters, high performance computing, backup and recovery, clustering
    
By: IBM     Published Date: Nov 14, 2014

View this demo to learn how IBM Platform Computing Cloud Service running on the SoftLayer Cloud helps you: quickly get your applications deployed on ready-to-run clusters in the cloud; manage workloads seamlessly between on-premise and cloud-based resources; get help from the experts with 24x7 Support.

Tags : ibm, cloud, cloud computing, hpc, softlayer, cloud clusters, network performance management, clustering
    
By: Aerohive     Published Date: Oct 23, 2014

This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.

Tags : aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, networking, 802.11, mobile computing, mobile data systems
    
By: Aerohive     Published Date: Oct 23, 2014

Unifying cloud and distributed network intelligence creates a completely practical, cost-effective approach to mobility. At Aerohive®, we’ve always done it this way.

Tags : wireless networks, controller-less networks, the new mobility, network infrastructures, infrastructure, internetworking hardware, network architecture, network management
    
By: Aerohive     Published Date: Oct 23, 2014

Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.

Tags : creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac, infrastructure, network architecture, network management, network performance, 802.11
    
By: Aerohive     Published Date: Oct 23, 2014

Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.

Tags : creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac, infrastructure, network architecture, network management, network performance, network performance management
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
175 Documents
Bandwidth Management
255 Documents
Cloud Computing
1004 Documents
Colocation and Web Hosting
249 Documents
Content Management
318 Documents
Convergence
264 Documents
Data Center
1132 Documents
Data Center Design and Management
631 Documents
Data Management
1836 Documents
Distributed Computing
192 Documents
Enterprise Applications
1799 Documents
Ethernet Networking
189 Documents
Fibre Channel
154 Documents
Gigabit Networking
162 Documents
Governance
206 Documents
Green Computing
290 Documents
Grid Computing
174 Documents
Infrastructure
894 Documents
Internetworking Hardware
233 Documents
Interoperability
216 Documents
IP Networks
337 Documents
IP Telephony
313 Documents
IT Management
2192 Documents
Knowledge Management
876 Documents
Load Balancing
177 Documents
Local Area Networking
232 Documents
Migration
245 Documents
Monitoring
313 Documents
Network Architecture
464 Documents
Network Management
683 Documents
Network Performance
432 Documents
Network Performance Management
421 Documents
Network Provisioning
220 Documents
Network Security
531 Documents
OLAP
142 Documents
Optical Networking
151 Documents
Power and Cooling
260 Documents
Quality Of Service
182 Documents
Remote Access
304 Documents
Remote Network Management
254 Documents
Server Hardware
271 Documents
Servers
506 Documents
Small Business Networks
285 Documents
TCP/IP Protocol
180 Documents
Test And Measurement
196 Documents
Traffic Management
194 Documents
Tunneling
150 Documents
Utility Computing
163 Documents
VPN
217 Documents
Wide Area Networks
238 Documents
Wireless
426 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.