Networking White Papers

Results 1 - 25 of 3338Sort Results By: Published Date | Title | Company Name
By: Singtel     Published Date: Apr 30, 2015

Join us at this webinar to learn more about this region and its data center landscape. From the latest developments and regulations, to potential opportunities and pitfalls, gain insight to the business advantages and challenges operating in key Asian countries.

Tags : singtel, data center, data center, asia data center, best practices, remote access, remote network management, backup and recovery
    
By: Iron Mountain     Published Date: Apr 29, 2015

Join Iron Mountain and EMC in this webinar to understand best practices on optimizing backup and off-site data protection.

Tags : iron mountain, backup, off site data protection, data protection, cloud, disk, tape, infrastructure
    
By: LogMeIn     Published Date: Apr 17, 2015

This whitepaper provides information on how users are bringing their devices and applications to work for simpler, faster, and better ways to communicate and collaborate.

Tags : web conferencing trends, consumerization, convergence, byod, virtual conference, video conferencing, online conference, byoa
    
By: Microsoft Dynamics     Published Date: Apr 15, 2015

If you aren’t tapping into social selling, you’re missing out. Customers want to be treated like individuals, not psychographic profiles. The more connected you are to today’s social and mobile customer, the better chance you have of establishing trust and having an honest dialogue. Social doesn’t replace email. Cold calls aren’t dead. These tactics all have their time and place, but social represents the most exciting channel that sales has had in a long time to stay connected and informed.

Tags : crm, microsoft crm, microsoft dynamics, crm online, free crm for small business, social media marketing, social media sales, best crm online
    
By: IBM     Published Date: Apr 15, 2015

IBM PureApplication System converges compute, storage, networking components, and software into a preconfigured and pretested system. This Forrester paper helps to better understand the benefits, costs, and risks associated with the IBM PureApplication System.

Tags : ibm, cost savings, data storage, analysis, efficiency, convergence, network performance, quality of service
    
By: IBM     Published Date: Apr 15, 2015

What if your organization could take advantage of emerging business opportunities by deploying new applications dramatically faster than you ever could before? What if you could increase the value of your existing application investments by leveraging them in the cloud—and easily move your apps across off-premises and on-premises cloud options? These capabilities are available today. With IBM® PureApplication® solutions, companies can build and use a cloud environment faster, easier and with less risk than traditional methods to better engage with their customers and partners in new ways. The result: increased competitiveness and improved profitability in a changing business landscape. This paper describes a simpler way forward to gain these advantages.

Tags : ibm, business intelligence, applications, cloud computing, migration, application integration, application performance management, design and facilities
    
By: IBM     Published Date: Apr 15, 2015

Still wondering what all the application monitoring hype is about? Read more to find out all the reasons why you still don't need to monitor your apps, no matter what everyone else says!

Tags : applications, monitoring, ibm, analytics, business intelligence, application performance management, application integration, analytical applications
    
By: IBM     Published Date: Apr 15, 2015

Technology Adoption Analyst whitepaper by Forrester. This IBM-commissioned profile of IT operations decision-makers at enterprise companies in the US, UK and Germany evaluates IT operations analytics adoption, benefits, and challenges based on Forrester’s own market data and a custom study of the same audience.

Tags : ibm, it operations, decision makers, analytics, market analysis, monitoring, business intelligence, business metrics
    
By: IBM     Published Date: Apr 15, 2015

This book helps you understand DevOps and how your organization can gain real business benefits from it. You also discover how a holistic view of DevOps that encompasses the entire software delivery life cycle.

Tags : ibm, devops, cloud computing, best practices, development, operations, software delivery, application integration
    
By: Basho     Published Date: Apr 13, 2015

Today’s consumers expect instant access to communications services whether they’re in the office, at home, or on the road. With data speeds increasing and international roaming costs decreasing, data usage is rapidly growing. Telecommunications Service Providers (TSPs) are under pressure to deliver more services to more people and approach 100% uptime all while lowering prices to consumers. Traditional relational databases can’t meet the requirements for massive scalability, availability, and fault tolerance that the rapid growth in data usage and rise of big data demands. Read this solution brief to learn how Riak excels at these. Riak is a distributed NoSQL database optimized for big data. Riak meets many of the challenges you may be facing with your own service operations systems.

Tags : riak, basho, telecommunications service provider, license fees, scalability, availability, data usage, big data
    
By: Adobe     Published Date: Apr 13, 2015

This Gigaom Research report aims to help technology decision-makers better understand: - What the modern workforce thinks it needs to succeed in this rapidly changing world of mobile-first communications and new work-collaboration technologies - How IT is supporting those needs and overall corporate objectives - If there are gaps between worker expectations and IT requirements, and how technology buyers can address them Download this Gigaom Research white paper to learn more.

Tags : adobe, modern workforce, platform support, platform productivity, it support, work-collaboration technologies, business intelligence, collaboration
    
By: Adobe     Published Date: Apr 13, 2015

This Gigaom Research study aims to help technology decision-makers better understand the role of IT in supporting the need for business agility and pace. In this report you will gain insight into: - How to increase business agility with the best tools for your workforce - Strategies to speed up new tool adoption so the workforce has a range of work tools that match different sorts of work activities and interactions - The shifting role of IT to create a technology landscape in which productivity and innovation flourish Download this Gigaom Research white paper to learn more.

Tags : adobe, it tools, modern workforce, business agility, it productivity, business intelligence, collaboration, intranets
    
By: Cyveillance     Published Date: Apr 10, 2015

In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.

Tags : myths, cyber, threat, intelligence, fact, fiction, big data, cloud
    
By: Appcito     Published Date: Apr 09, 2015

Elastic Load Balancing automatically distributes incoming web tra?c across multiple EC2 instances. With Elastic Load Balancing, you can add and remove EC2 instances as your needs change without disrupting the overall ?ow of information. If an EC2 instance fails, Elastic Load Balancing automatically reroutes the tra?c to the remaining running EC2 instances. If a failed EC2 instance is restored, Elastic Load Balancing restores the tra?c to that instance.

Tags : cloud architect, web traffic, elastic load balancing, information flow, load balancer, application security, amazon web services, aws
    
By: IBM     Published Date: Apr 09, 2015

This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts explore the complexities of mobile test environments, the value of the mobile device cloud, the unique role crowd sourcing can play, and how teams can leverage automation to help deliver quality apps.

Tags : mobile apps, mobile app testing, mobile device cloud, crowd sourcing, ibm, networking, software development, enterprise applications
    
By: IBM     Published Date: Apr 09, 2015

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.

Tags : data security, ibm, risk management, network security, security threat, networking, security, it management
    
By: IBM     Published Date: Apr 09, 2015

Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.

Tags : data security, ibm, converged network security, security risk, networking, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

Access the latest Gartner Magic Quadrant for Intrusion Prevention Systems to learn more about IBM's position and the latest developments in the market.

Tags : magic quadrant, ibm, intrusion prevention systems, security, security risk, data security, networking, it management
    
By: IBM     Published Date: Apr 09, 2015

This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.

Tags : access management solution, ibm, security risk, security compliance, networking, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.

Tags : user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks, networking
    
By: IBM     Published Date: Apr 09, 2015

IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

Tags : ibm, user access, enhanced security, security risk, networking, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.

Tags : ibm, risk management, security risk, security officer, data security, networking, security, it management
    
By: IBM     Published Date: Apr 09, 2015

Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.

Tags : cloud, cloud security, ibm, ibm dynamic cloud security portfolio, access management, data protection, application protection, visibility
    
By: IBM     Published Date: Apr 09, 2015

You may be considering a cloud computing solution or in the midst of specifying one or even implementing a solution. Read this paper to see what IBM discovered about how companies like yours are adopting, implementing and using cloud computing solutions. Learn about the current rate of adoption, as well as drivers, barriers, and considerations that are influencing the adoption of cloud computing.

Tags : ibm, cloud, efficiencies, innovation, midsize businesses, network access, business value, innovation
    
By: IBM     Published Date: Apr 09, 2015

Although cloud is recognized as a technological change, its potential for driving business innovation remains untapped. Cloud computing can have an impact on operations, customer relationships and industry value chains. Read this executive report to discover how the cloud can open the door to more efficient, responsive and innovative ways of doing business.

Tags : ibm, cloud, efficiencies, innovation, midsize businesses, network access, business value, innovation
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
175 Documents
Bandwidth Management
266 Documents
Cloud Computing
1047 Documents
Colocation and Web Hosting
252 Documents
Content Management
320 Documents
Convergence
266 Documents
Data Center
1144 Documents
Data Center Design and Management
651 Documents
Data Management
1912 Documents
Distributed Computing
195 Documents
Enterprise Applications
1867 Documents
Ethernet Networking
190 Documents
Fibre Channel
154 Documents
Gigabit Networking
162 Documents
Governance
206 Documents
Green Computing
296 Documents
Grid Computing
174 Documents
Infrastructure
927 Documents
Internetworking Hardware
240 Documents
Interoperability
219 Documents
IP Networks
336 Documents
IP Telephony
313 Documents
IT Management
2368 Documents
Knowledge Management
946 Documents
Load Balancing
177 Documents
Local Area Networking
233 Documents
Migration
256 Documents
Monitoring
319 Documents
Network Architecture
484 Documents
Network Management
704 Documents
Network Performance
460 Documents
Network Performance Management
435 Documents
Network Provisioning
220 Documents
Network Security
544 Documents
OLAP
142 Documents
Optical Networking
152 Documents
Power and Cooling
266 Documents
Quality Of Service
194 Documents
Remote Access
306 Documents
Remote Network Management
259 Documents
Server Hardware
270 Documents
Servers
508 Documents
Small Business Networks
289 Documents
TCP/IP Protocol
178 Documents
Test And Measurement
199 Documents
Traffic Management
194 Documents
Tunneling
150 Documents
Utility Computing
163 Documents
VPN
220 Documents
Wide Area Networks
240 Documents
Wireless
456 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.