Networking White Papers

Results 76 - 100 of 2724Sort Results By: Published Date | Title | Company Name
By: Global Knowledge     Published Date: Apr 08, 2014

Microsoft SQL Server 2014 has some great new features that will allow you to develop higher performing, more scalable next-generation applications using the hybrid cloud. Microsoft is building on the established foundation of SQL Server 2008 and 2012. Using similar architecture and management tools, customers will be able to smoothly upgrade their systems and skills based on the need for the new features and according to their own schedule.

Tags : microsoft exchange, project management, service management, cloud computing
    
By: Global Knowledge     Published Date: Apr 08, 2014

AWS has introduced Auto Scaling so that you can take advantage of cloud computing without having to incur the costs of adding more personnel or building your own software. You can use Auto Scaling to scale for high availability, to meet increasing system demand, or to control costs by eliminating unneeded capacity. You can also use Auto Scaling to quickly deploy software for massive systems, using testable, scriptable processes to minimize risk and cost of deployment.

Tags : global knowledge, amazon auto scaling, cloud computing, security, best practices, productivity, project management
    
By: Riverbed     Published Date: Apr 03, 2014

Learn how Riverbed® Cascade® gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.

Tags : riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization
    
By: Riverbed     Published Date: Apr 03, 2014

The purpose of this book is to introduce you to common network performance management (NPM) issues and give you a new way of looking at solving them.

Tags : riverbed, npm, network performance management, performance management, network management, networking, performance tools, security
    
By: Riverbed     Published Date: Apr 03, 2014

This book introduces you to application performance management (APM) solutions and how these tools can help you monitor and troubleshoot your mission-critical applications — from the perspective of your users, as well as your systems.

Tags : riverbed, application performance management, apm, service management, compliance, performance management, application integration, performance testing
    
By: Dyn     Published Date: Apr 02, 2014

If you use multiple CDNs to serve your content, you are well aware of the benefit of quick content delivery. However, what happens if one of your CDNs goes down? Without load balancing, that fast load time can turn into downtime in an instant. Luckily your trusty DNS provider is here to help.

Tags : dyn, cdn, content delivery network, interconnected, dns companies, load balancing, proximity-based delivery, anycast network
    
By: VSS Monitoring     Published Date: Apr 01, 2014

Learn about the best practices for deploying a Network Visibility Controller and see how this network and security packet will allow for flexibility and resilience on your enterprise network.

Tags : network monitoring, network visibility, network monitoring best practices, network packet broker, networking, knowledge management, enterprise applications
    
By: Dyn     Published Date: Mar 27, 2014

If your ads are slow to load, chances are, consumers aren’t going to wait around to see them. Just the smallest amount of latency can cost you thousands of views, clicks, and conversions. By following these 5 guidelines, you can reduce your overall network latency and keep those clicks coming.

Tags : dyn, network latency, customer retention, serve content, combating latency, own network, global network, anycast
    
By: Dyn     Published Date: Mar 27, 2014

DDoS, cache poisoning, footprinting, oh my! Who knew that there were so many ways to threaten the security of your DNS? Find out all of the scary details about these attacks and what you can do to prevent them.

Tags : dyn, dns, security risks, arbor networks survey, ddos attacks, dns amplification, amplification exploits, network performance
    
By: Dyn     Published Date: Mar 27, 2014

The cost of security might seem steep, but compared to what you’ll have to pay to mitigate a DDoS attack, it’ll look like chump change. DDoS attacks don’t just cost your company the annoyance of downtime, but brand reputation, customer acquisition, and of course, sales all are affected.

Tags : dyn, ddos attack, cost of downtime, business transactions, infrastructure, ponemon institute study, ddos defense, productivity
    
By: OutSystems     Published Date: Mar 24, 2014

Mobile has become standard in the enterprise with smartphones and tablets common in the workplace. Anywhere, anytime access to company systems is expected and systems must work flawlessly on these devices! This eBook looks at how to kick start your mobile application strategy.

Tags : outsystems, mobile, app, mobile applications, mobile strategy, corporate it departments, smartphones, tablets
    
By: CompareBusinessProducts.com     Published Date: Mar 21, 2014

Learn about the 5 most commonly made mistakes when purchasing business phone systems and see how your organization can avoid these costly pitfalls to receive the system that will benefit them the most.

Tags : compare business, common business concerns, voip, small business, phone system, business phone, purchase decision, networking
    
By: CompareBusinessProducts.com     Published Date: Mar 21, 2014

Learn about the best ways to future-proof your business communications strategy to prepare your organization to be able to communicate with your clients and employees regardless of what device they prefer to use.

Tags : compare business, common business concerns, voip, small business, phone system, business phone, purchase decision, networking
    
By: CompareBusinessProducts.com     Published Date: Mar 21, 2014

Learn about the 11 most vital questions to ask when negotiating for a new phone system to ensure that you get right system for your organization’s needs.

Tags : compare business, common business concerns, voip, small business, phone system, business phone, purchase decision, networking
    
By: Box     Published Date: Mar 13, 2014

This recorded webinar discusses the latest challenges with BYOD (Bring Your Own Device) faced by today's organizations and recommendations on how to move forward with a BYOD workforce.

Tags : box, byod, mobile devices, iphone, android, mobile workers, mobile workforce, remote management
    
By: Citrix     Published Date: Mar 11, 2014

Empowering people to use Windows applications and native mobile apps on any type of device—with full security

Tags : citrix, xenapp, mobile applications, enterprise applications, windows applications, windows, mobile device, remote access
    
By: Dyn     Published Date: Feb 19, 2014

Do-it-yourself projects are great and can save you money, just not when it comes to doing your own DNS. In this paper, learn about four different reasons why outsourcing your DNS will actually save you money and time in the long run.

Tags : dyn, dns, dns services, managed dns services, outsourcing, ecommerce, points of presence, pops
    
By: Global Knowledge     Published Date: Feb 14, 2014

Amazon Web Services (AWS) offers increased agility, developer productivity, pay-as-you-go pricing, and overall cost savings. Learn what you need to know and where to start before launching an AWS-hosted service.

Tags : global knowledge, speed aws, aws deployment, amazon web service, developer productivity, cloudformation, aws resources, collaboration engines
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab experts are releasing new research designed to assist you in your cyber security business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.

Tags : threat management, cyberthreat, cybersecurity, kaspersky, it security, security management, network security, anti spyware
    
By: Kaspersky     Published Date: Feb 14, 2014

Are you guarding the cyber security gaps with patch management? Download Kaspersky Lab’s latest whitepaper, Your Data under Siege: Guard the Gaps with Patch Management, to learn about: how cybercriminals are utilizing weaknesses in trusted applications to distribute malware.

Tags : patch management, cybersecurity, firewalls, malware, hackers, virus, threats, network security
    
By: LogMeIn     Published Date: Jan 29, 2014

This guide details the factors that impact the purchasing decision of a remote support tool and provides a checklist for use as you work through your remote support solution selection process.

Tags : remote support, solution, complex, communication, sophistication, remote network management, customer interaction service, customer relationship management
    
By: CareCloud     Published Date: Jan 08, 2014

Get your Meaningful Use money! Make Meaningful Use easy with this free whitepaper that answers questions like: •How much money am I eligible to get? •When do I get paid? •What happens if I don’t participate? •How can CareCloud help me attest? Download this whitepaper to learn more!

Tags : meaningful use, carecloud, document management, information management, cloud computing
    
By: Citrix     Published Date: Dec 16, 2013

This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.

Tags : citrix, xenapp, xendesktop, mission critical applications, productivity, remote access, application integration, employee performance
    
By: Citrix     Published Date: Dec 09, 2013

Android, iOS and Windows tablets and smartphones play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions.

Tags : citrix, byod, apple ios, windows, android, smarphones, tablets, secure delivery
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
165 Documents
Bandwidth Management
242 Documents
Cloud Computing
825 Documents
Colocation and Web Hosting
225 Documents
Content Management
301 Documents
Convergence
255 Documents
Data Center
989 Documents
Data Center Design and Management
548 Documents
Data Management
1503 Documents
Distributed Computing
172 Documents
Enterprise Applications
1437 Documents
Ethernet Networking
180 Documents
Fibre Channel
143 Documents
Gigabit Networking
152 Documents
Governance
202 Documents
Green Computing
280 Documents
Grid Computing
167 Documents
Infrastructure
827 Documents
Internetworking Hardware
211 Documents
Interoperability
206 Documents
IP Networks
335 Documents
IP Telephony
312 Documents
IT Management
1663 Documents
Knowledge Management
642 Documents
Load Balancing
169 Documents
Local Area Networking
224 Documents
Migration
224 Documents
Monitoring
302 Documents
Network Architecture
420 Documents
Network Management
645 Documents
Network Performance
380 Documents
Network Performance Management
379 Documents
Network Provisioning
211 Documents
Network Security
500 Documents
OLAP
133 Documents
Optical Networking
142 Documents
Power and Cooling
241 Documents
Quality Of Service
171 Documents
Remote Access
278 Documents
Remote Network Management
237 Documents
Server Hardware
262 Documents
Servers
473 Documents
Small Business Networks
271 Documents
TCP/IP Protocol
175 Documents
Test And Measurement
184 Documents
Traffic Management
185 Documents
Tunneling
141 Documents
Utility Computing
154 Documents
VPN
216 Documents
Wide Area Networks
224 Documents
Wireless
361 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.