Networking White Papers

Results 1 - 25 of 2731Sort Results By: Published Date | Title | Company Name
By: NetShelter - CyrusOne     Published Date: Oct 12, 2011

This whitepaper outlines issues that arise when planning for growth of IT infrastructure and explains how the colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.

Tags : cyrus one, data center, texas, infrastructure, capacity, planning, colocation, scablability
    
By: Intel Corp.     Published Date: Aug 08, 2012

This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.

Tags : assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance
    
By: Gomez IT     Published Date: Apr 12, 2011

Almost 700 businesses in North America and Europe were independently surveyed to understand whether they are already experiencing the impact of poor application performance in their cloud application deployments, and how this is affecting their cloud strategies going forward.

Tags : cloud application, compuware, sla, survey report, cloud performance, cloud deployment, apm, application performance management
    
By: AMD     Published Date: Jul 20, 2012

Business agility be defined as a company's ability to respond to changes in business conditions quickly enough to benefit from them.

Tags : virtualization, it support, it management, data managemtn, cloud computing, cloud network, virtual server performance, data migration
    
By: ForeScout     Published Date: Aug 14, 2012

The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.

Tags : pad, mine, enabling, secure, personal, mobile, device, use
    
By: Quest     Published Date: Jul 07, 2012

When disaster strikes, don't waste hours and dollars recovering critical data. vRanger delivers blazing-fast speed and granular recovery for your VMware applications and data. Get your free trial today.

Tags : applications, data, delivers, protection, disaster, security, recovery, backup
    
By: PC Mall     Published Date: Dec 07, 2011

This white paper discusses critical best practices including approaches for both policy and technology.

Tags : sonicwall, mobile security, mobile phone security, mobile device security, mobile device management, mobile antivirus, data loss prevention, malware
    
By: LifeSize, a division of Logitech     Published Date: Aug 19, 2011

Incorporating video collaboration as a standard business practice can result in tighter employee and business partner relationships, increased productivity, faster decision-making and many more lucrative bene?ts.

Tags : lifesize, best practices, video collaboration, standard business practice, productivity, video conferencing technology, virtualization, communications objectives
    
By: Cleversafe     Published Date: Dec 07, 2012

Shutterfly and Cleversafe Partner for Big Data Performance, Availability and Reliability to Meet Growing Customer Needs

Tags : shutterfly, images, growing, reliability, performance, storage, dispersal, networking
    
By: Citrix     Published Date: Jul 25, 2014

This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.

Tags : citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management
    
By: Mimecast     Published Date: May 20, 2009

Mimecast delivers Software-as-a-Service based enterprise email management including archiving, discovery, continuity, security and policy. By unifying disparate and fragmented email environments into one holistic service that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email.

Tags : mimecast, saas, software as a service, rto, email archive, seamless, medium-size business, zhara
    
By: CDW Vmware     Published Date: Aug 02, 2012

In today's competitive business landscape, users' needs are continuously changing. Employees want access to their data and applications anytime, anywhere, from any device. The journey to seamlessly integrate data and applications across all devices begins with desktop modernization.

Tags : modernize, desktop, data, application, access, device, seamlessly, integrate
    
By: Riverbed     Published Date: Apr 03, 2014

Learn how Riverbed® Cascade® gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.

Tags : riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization
    
By: Identity Engines     Published Date: Mar 24, 2008

For over a decade now, RADIUS servers have been a mainstay of dial-up and VPN access control. The rather inconspicuous RADIUS server, perhaps better known as that beige, general-purpose PC collecting dust in the corner of your data center, has proved sufficient for performing basic duties like validating passwords and granting network access.

Tags : radius, servers, idengines, id engines, identity engines, vpn, access control, auditing
    
By: Xero     Published Date: Feb 18, 2014

You're mobile and streamlined -- or trying to be both those things -- while you provide salient financial advice to your clients, who are mostly small businesses like you. As your job is moving from traditional accounting work to involve a lot of business growth and marketing.

Tags : online accounting, marketing, small business, smb, finances, cloud, cloud computing, small business networks
    
By: Idera     Published Date: Oct 18, 2012

Download this paper to learn how implementing basic performance enhancements can provide tremendous improvements to the operation and performance of SharePoint within the enterprise.

Tags : sql, servers, database traffic, data connectivity, microsoft sharepoint, data management, data center
    
By: SunGard Availability Services     Published Date: Oct 30, 2013

Learn the 10 strategies for selecting a disaster recovery service provider to ensure that your organization will be better protected should a natural disruption occur.

Tags : sungard, sungard availability services, disaster recovery, disaster recovery provider, disaster recovery service provider, dr plan, drsp, business impact analysis
    
By: eFax     Published Date: May 15, 2007

If faxing is a critical component to your business, you want to be sure you make a wise decision on how to do it. This paper offers 10 tips to help you sort through the myriad of choices in order to get the best combination of features and flexibility.

Tags : fax, faxing, ip faxing, ip telephony, fax over ip, efax, infrastructure, ip networking
    
By: Mashery     Published Date: Feb 06, 2014

With more exposure to different industries and the continued diversification of attendees, it is clear that hackathons have evolved. Learn the tips and tricks to making your next Hackathon a success.

Tags : hackathon, api, big data, collaborative coding, hack days, networking, it management, cloud computing
    
By: Mimecast     Published Date: Oct 25, 2010

Download this whitepaper to learn 10 ways your company will save by moving your email management to the cloud.

Tags : mimecast, cloud-based email management, email archiving, software-as-a-service, e-discovery, continuity, policy management, business continuity
    
By: Mimecast     Published Date: Nov 10, 2010

Practical cost saving benefits of cloud-based email management.

Tags : mimecast, software as a service, saas, email spend datasheet, cloud-based email management, archiving, email security, email archiving
    
By: ITManagement     Published Date: Jul 24, 2008

The days of deploying new equipment for the sake of having the latest and greatest ended when the Internet bubble burst. So when you know it's time for a network upgrade, you need to have more than the technical facts — you need to arm yourself with a rock-solid business case. Start with these 10 ways to sell the members of your upper-management team on the network upgrade.

Tags : it management, upgrade, servers, management, network, network upgrade, selling management, itmanagement
    
By: Panda Security     Published Date: Feb 27, 2008

E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.

Tags : malware, hacker, hacking, hackers, email security, e-mail security, panda, panda security
    
By: Emulex Corporation     Published Date: Nov 07, 2013

Flying blind at 100G It might go something like this: Your company is a voracious consumer of bandwidth – perhaps a very large enterprise, a research lab, or a service or content provider of some description. Today you are running multiple 10Gbps network connections in the core of your network, but these links are rapidly approaching capacity. An upgrade in the not-too-distant future to 40/100G ultra-high-speed links now looks inevitable.

Tags : network monitoring, network visibility, technology, endace, best practices, networking
    
By: CompareBusinessProducts.com     Published Date: Mar 21, 2014

Learn about the 11 most vital questions to ask when negotiating for a new phone system to ensure that you get right system for your organization’s needs.

Tags : compare business, common business concerns, voip, small business, phone system, business phone, purchase decision, networking
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
165 Documents
Bandwidth Management
242 Documents
Cloud Computing
827 Documents
Colocation and Web Hosting
225 Documents
Content Management
301 Documents
Convergence
255 Documents
Data Center
991 Documents
Data Center Design and Management
548 Documents
Data Management
1504 Documents
Distributed Computing
172 Documents
Enterprise Applications
1438 Documents
Ethernet Networking
180 Documents
Fibre Channel
143 Documents
Gigabit Networking
152 Documents
Governance
202 Documents
Green Computing
280 Documents
Grid Computing
167 Documents
Infrastructure
827 Documents
Internetworking Hardware
211 Documents
Interoperability
206 Documents
IP Networks
335 Documents
IP Telephony
312 Documents
IT Management
1654 Documents
Knowledge Management
647 Documents
Load Balancing
169 Documents
Local Area Networking
224 Documents
Migration
224 Documents
Monitoring
302 Documents
Network Architecture
420 Documents
Network Management
646 Documents
Network Performance
380 Documents
Network Performance Management
379 Documents
Network Provisioning
211 Documents
Network Security
503 Documents
OLAP
133 Documents
Optical Networking
142 Documents
Power and Cooling
241 Documents
Quality Of Service
171 Documents
Remote Access
280 Documents
Remote Network Management
237 Documents
Server Hardware
262 Documents
Servers
473 Documents
Small Business Networks
271 Documents
TCP/IP Protocol
175 Documents
Test And Measurement
184 Documents
Traffic Management
185 Documents
Tunneling
141 Documents
Utility Computing
154 Documents
VPN
216 Documents
Wide Area Networks
224 Documents
Wireless
361 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.