Networking White Papers

Results 1 - 25 of 3352Sort Results By: Published Date | Title | Company Name
By: Singtel     Published Date: Apr 30, 2015

Join us at this webinar to learn more about this region and its data center landscape. From the latest developments and regulations, to potential opportunities and pitfalls, gain insight to the business advantages and challenges operating in key Asian countries.

Tags : singtel, data center, data center, asia data center, best practices, remote access, remote network management, backup and recovery
    
By: Iron Mountain     Published Date: Apr 29, 2015

Join Iron Mountain and EMC in this webinar to understand best practices on optimizing backup and off-site data protection.

Tags : iron mountain, backup, off site data protection, data protection, cloud, disk, tape, infrastructure
    
By: IBM     Published Date: Apr 21, 2015

The workplace—and they way we perform our jobs—is changing rapidly. What is the future of work, and what kinds of tools do you need to navigate it successfully?

Tags : ibm, cloud, efficiencies, innovation, midsize businesses, network access, business value, innovation
    
By: LogMeIn     Published Date: Apr 17, 2015

This whitepaper provides information on how users are bringing their devices and applications to work for simpler, faster, and better ways to communicate and collaborate.

Tags : web conferencing trends, consumerization, convergence, byod, virtual conference, video conferencing, online conference, byoa
    
By: Microsoft Dynamics     Published Date: Apr 15, 2015

If you aren’t tapping into social selling, you’re missing out. Customers want to be treated like individuals, not psychographic profiles. The more connected you are to today’s social and mobile customer, the better chance you have of establishing trust and having an honest dialogue. Social doesn’t replace email. Cold calls aren’t dead. These tactics all have their time and place, but social represents the most exciting channel that sales has had in a long time to stay connected and informed.

Tags : crm, microsoft crm, microsoft dynamics, crm online, free crm for small business, social media marketing, social media sales, best crm online
    
By: IBM     Published Date: Apr 15, 2015

Web content management is no longer simply a tool for creating Web pages — it's now vital software for increasing the effectiveness of digital strategies. IT leaders responsible for WCM should consider the software's functions in the broader context in which they will deliver their full value.

Tags : content creation, interoperability, web content management, digital strategy, value added, infrastructure, internetworking hardware, quality of service
    
By: Citrix Systems     Published Date: Apr 15, 2015

When evaluating which app and desktop virtualization solution you should adopt, it is important to start your comparison using information you can trust. Learn how 3 companies benefited from true mobility and IT efficiency with Citrix Desktop Virtualization.

Tags : citrix, desktop virtualization, vmware, efficiency, virtualization, mobile computing, migration, application integration
    
By: Citrix Systems     Published Date: Apr 15, 2015

Not all VDI solutions are alike. To deliver the best results for your business, you need to make sure the solution you choose can enable full productivity not just in the office on traditional endpoints, but anywhere people work, on any device they use. With Citrix XenDesktop, you can provide access to virtualized apps and desktops from anywhere, on any device, with a great experience in any scenario.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, migration, application integration, best practices
    
By: Citrix Systems     Published Date: Apr 15, 2015

Empowering people to use Windows applications and native mobile apps on any type of device—with full security.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, migration, remote access, remote network management
    
By: Citrix Systems     Published Date: Apr 15, 2015

This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, migration, network architecture
    
By: IBM     Published Date: Apr 15, 2015

IBM WebSphere Portal software helps bank offer a clearly differentiated digital experience.

Tags : ibm, portal, customer experience, web experience, sales, monitoring, quality of service, customer interaction service
    
By: Citrix Systems     Published Date: Apr 15, 2015

App and desktop virtualization is much more than a technology solution. It is transforming the way organizations of all sizes are enabling their workforces while simplifying the desktop management process for IT administrators. With app and desktop virtualization, IT organizations can provide every user with a workspace environment completely unrestricted by physical location. This paper addresses many common business challenges facing IT organizations, such as enabling mobile workstyles without compromising security, streamlining desktop management efforts as the number of employees in remote offices and offshore locations increases and making the user experience personal through self-service access to applications and desktops.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, network security, vpn, application integration
    
By: IBM     Published Date: Apr 15, 2015

Performance Bicycle created an interactive Learning Center seamlessly linked to its e-commerce site. By leading engaged, inspired visitors to the e-commerce site, the company boosts conversion, drives online sales and supports its growth objective.

Tags : e-commerce, content management, conversion, quality of service, sales & marketing software, sales automation, content integration, customer experience management
    
By: Seagate Technology     Published Date: Apr 14, 2015

You can have all the latest features of iOS 8 on your iPhone, but if you’re still using an iPhone 4s, you won’t be able to take advantage of most of them. This should serve as an appropriate metaphor for this audience because when it comes to data storage, many of today’s storage solutions have been around since the 1970s…as in the the world of mobile, today’s data storage needs are revealing just how limited those older solutions are. Even if a company has updated almost everything in its IT ecosystem, it takes only one unchanged layer to prevent them from realizing the benefits of the latest technology. With petabyte scale, reliability, performance, and efficiency the order of the day we are fast approaching that point with storage. There is without question a need to change in the current storage paradigm. In this webinar you will learn about current IT storage challenges and useful insights about next-generation storage solutions.

Tags : storage solutions, mobile data storage, it ecosystem, petabyte scale, network architecture, network attached storage, storage management, data integration
    
By: Seagate Technology     Published Date: Apr 14, 2015

Gartner's 2015 top 10 strategic technology trends for IT leaders are the prime enablers behind new digital business opportunities. Their disruptive power stems from merging virtual and physical worlds, the growth of intelligence everywhere, and the emerging new realities of IT. Read this white paper to learn the top ten strategic technology trends organizations can follow to deliver high value and drive change.

Tags : intelligence, cloud, 3d printing, internet of things, digital business, network management, best practices, data integration
    
By: Seagate Technology     Published Date: Apr 14, 2015

Download this case study to learn how Seagate/Xyratex partnered with HP to develop an innovative storage system solution with the scalable performance the Institute needed to continue its groundbreaking work.

Tags : seagate, storage system, healthcare, network performance, network performance management, network attached storage, application performance management
    
By: Seagate Technology     Published Date: Apr 14, 2015

Upgrading security systems to meet both current and future needs is no small feat. So when a Texas-based surveillance system integrator began work with a large national nonprofit foundation on its 20,000 square foot park-like property, existing infrastructure and future system deployment were primary considerations. With the objective to update the nonprofit’s Virtual Management Software (VMS) while leveraging existing analog and IP cameras, the system integrator needed a cost-effective solution to meet their current needs with the ability to scale for rapid growth. Download this case study to learn more about how the system integrator engaged with NUUO, a leading NVR and VMS manufacturer known for seamless integration of 3rd party cameras to build a customized system that would suit the nonprofit’s needs.

Tags : surveillance, security system, virtual management software, cameras, network performance management, intrusion prevention, network security appliance, security management
    
By: Seagate Technology     Published Date: Apr 14, 2015

Finding a better place to store an ever-expanding volume of valuables is a near universal challenge—for individuals and their businesses. From physical holes in the ground to the ethereal cloud and beyond, the range of options for stashing stuff is immense. And, depending on what you’re storing and how easily you want others to find it, some options are better than others. Read this white paper to learn how a Network Attached Storage (NAS) system provides the customization, speed, ease-of-use, security and affordability needed to protect and share digital assets for many small business owners.

Tags : cloud, security, network attached storage system, customization, affordability, network security, network attached storage, storage management
    
By: Basho     Published Date: Apr 13, 2015

Today’s consumers expect instant access to communications services whether they’re in the office, at home, or on the road. With data speeds increasing and international roaming costs decreasing, data usage is rapidly growing. Telecommunications Service Providers (TSPs) are under pressure to deliver more services to more people and approach 100% uptime all while lowering prices to consumers. Traditional relational databases can’t meet the requirements for massive scalability, availability, and fault tolerance that the rapid growth in data usage and rise of big data demands. Read this solution brief to learn how Riak excels at these. Riak is a distributed NoSQL database optimized for big data. Riak meets many of the challenges you may be facing with your own service operations systems.

Tags : riak, basho, telecommunications service provider, license fees, scalability, availability, data usage, big data
    
By: Adobe     Published Date: Apr 13, 2015

This Gigaom Research report aims to help technology decision-makers better understand: - What the modern workforce thinks it needs to succeed in this rapidly changing world of mobile-first communications and new work-collaboration technologies - How IT is supporting those needs and overall corporate objectives - If there are gaps between worker expectations and IT requirements, and how technology buyers can address them Download this Gigaom Research white paper to learn more.

Tags : adobe, modern workforce, platform support, platform productivity, it support, work-collaboration technologies, business intelligence, collaboration
    
By: Adobe     Published Date: Apr 13, 2015

This Gigaom Research study aims to help technology decision-makers better understand the role of IT in supporting the need for business agility and pace. In this report you will gain insight into: - How to increase business agility with the best tools for your workforce - Strategies to speed up new tool adoption so the workforce has a range of work tools that match different sorts of work activities and interactions - The shifting role of IT to create a technology landscape in which productivity and innovation flourish Download this Gigaom Research white paper to learn more.

Tags : adobe, it tools, modern workforce, business agility, it productivity, business intelligence, collaboration, intranets
    
By: Appcito     Published Date: Apr 09, 2015

Elastic Load Balancing automatically distributes incoming web tra?c across multiple EC2 instances. With Elastic Load Balancing, you can add and remove EC2 instances as your needs change without disrupting the overall ?ow of information. If an EC2 instance fails, Elastic Load Balancing automatically reroutes the tra?c to the remaining running EC2 instances. If a failed EC2 instance is restored, Elastic Load Balancing restores the tra?c to that instance.

Tags : cloud architect, web traffic, elastic load balancing, information flow, load balancer, application security, amazon web services, aws
    
By: IBM     Published Date: Apr 09, 2015

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.

Tags : data security, ibm, risk management, network security, security threat, networking, security, it management
    
By: IBM     Published Date: Apr 09, 2015

Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.

Tags : data security, ibm, converged network security, security risk, networking, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

Access the latest Gartner Magic Quadrant for Intrusion Prevention Systems to learn more about IBM's position and the latest developments in the market.

Tags : magic quadrant, ibm, intrusion prevention systems, security, security risk, data security, networking, it management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
175 Documents
Bandwidth Management
266 Documents
Cloud Computing
1050 Documents
Colocation and Web Hosting
252 Documents
Content Management
321 Documents
Convergence
266 Documents
Data Center
1145 Documents
Data Center Design and Management
653 Documents
Data Management
1914 Documents
Distributed Computing
195 Documents
Enterprise Applications
1868 Documents
Ethernet Networking
190 Documents
Fibre Channel
154 Documents
Gigabit Networking
162 Documents
Governance
206 Documents
Green Computing
296 Documents
Grid Computing
174 Documents
Infrastructure
927 Documents
Internetworking Hardware
240 Documents
Interoperability
219 Documents
IP Networks
336 Documents
IP Telephony
313 Documents
IT Management
2383 Documents
Knowledge Management
947 Documents
Load Balancing
177 Documents
Local Area Networking
233 Documents
Migration
256 Documents
Monitoring
322 Documents
Network Architecture
486 Documents
Network Management
706 Documents
Network Performance
463 Documents
Network Performance Management
438 Documents
Network Provisioning
220 Documents
Network Security
549 Documents
OLAP
142 Documents
Optical Networking
152 Documents
Power and Cooling
266 Documents
Quality Of Service
194 Documents
Remote Access
307 Documents
Remote Network Management
259 Documents
Server Hardware
270 Documents
Servers
508 Documents
Small Business Networks
289 Documents
TCP/IP Protocol
178 Documents
Test And Measurement
199 Documents
Traffic Management
194 Documents
Tunneling
150 Documents
Utility Computing
163 Documents
VPN
220 Documents
Wide Area Networks
240 Documents
Wireless
468 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.