Monitoring White Papers

Network Monitoring describes the use of a system that constantly monitors a computer network for slow or failing systems and that notifies the network administrator in case of outages via email, pager or other alarms. It is a subset of the functions involved in network management.
Results 1 - 25 of 138Sort Results By: Published Date | Title | Company Name
By: Dyn     Published Date: Apr 02, 2014

If you use multiple CDNs to serve your content, you are well aware of the benefit of quick content delivery. However, what happens if one of your CDNs goes down? Without load balancing, that fast load time can turn into downtime in an instant. Luckily your trusty DNS provider is here to help.

Tags : dyn, cdn, content delivery network, interconnected, dns companies, load balancing, proximity-based delivery, anycast network
    
By: Dyn     Published Date: Feb 19, 2014

If your ads are slow to load, chances are, consumers aren’t going to wait around to see them. Just the smallest amount of latency can cost you thousands of views, clicks, and conversions. By following these 5 guidelines, you can reduce your overall network latency and keep those clicks coming.

Tags : dys, advertising, network, latency, advertising network latency, online advertising, delivery, display
    
By: Lumension     Published Date: Feb 07, 2014

Being able to compare the impact of application control and traditional anti-virus solutions could help you improve your server's performance and security.

Tags : lumension, server performance, server security, application control, anti-virus solutions, endpoints, application control solution, malware
    
By: Lumension     Published Date: Feb 07, 2014

Sit in on an expert panel discussion about the concerns of cyber security for businesses.

Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
By: Dyn     Published Date: Mar 27, 2014

If you use multiple CDNs to serve your content, you are well aware of the benefit of quick content delivery. However, what happens if one of your CDNs goes down? Without load balancing, that fast load time can turn into downtime in an instant. Luckily your trusty DNS provider is here to help.

Tags : dyn, cdn, content delivery network, interconnected, dns companies, load balancing, proximity-based delivery, anycast network
    
By: IBM     Published Date: Mar 20, 2014

Application downtime is just one of many costs associated with a fragmented application performance management (APM) strategy. Learn the 5 steps to simplify Application Performance Management through this infographic.

Tags : ibm, apm, application services, data center, application downtime, business implications, visibility, infrastructure
    
By: nettime solutions     Published Date: Mar 04, 2014

This whitepaper covers the best practices, methods and standards for time off accruals that are affecting PTO policies and will explain how a customizable, automated time and attendance platform can provide workforce analytics and labor management solutions.

Tags : nettime solutions, accruals, improving time, time off accruals, enhance pto policies, pto policies, automated time, attendance platform
    
By: IBM     Published Date: Feb 27, 2014

Why should we bother automating deployments in the first place? What should the scope of the automation effort be? How do we get started? This white paper provides a solid introduction to these topics.

Tags : ibm, ibm software, deployment automation, manual deployments, automation, change management, automated solution, automated investments
    
By: IBM     Published Date: Jan 02, 2014

Many organizations and agencies would like to improve their debt collection. They are aware that advanced analytics can help them optimize collections to drive down company debt and collection expenditures. However, they perceive that advanced analytics requires massive infrastructure changes, expensive software licenses, analytics expertise, long lead times and major upfront capital expenses.

Tags : ibm, analytic answers, prioritized collections, collection agencies, debt collection, constrained budgets, constrained resources, the cloud
    
By: Collaborative Consulting     Published Date: Dec 20, 2013

There are many attributes to consider when choosing sourcing options, some more obvious than others, such as hourly rate. However, when evaluating the true costs of sourcing, leading organizations also look at other critical factors associated with business-critical projects--such as agility, integration with other operations, security risks, scalability, public image, and business understanding-- that can make all the difference to ensuring successful project outcomes.

Tags : collaborative consulting, domestic solution, sourcing model, cost comparison, constrained workforce, offshore, financially constrained, user interaction
    
By: Clarabridge     Published Date: Dec 03, 2013

Transforming the customer contact center from cost center to a strategic asset by leveraging the voice of the customer

Tags : clarabridge, customer behaviors, social media program, interacting with customers, product and service problems, respond quickly, customer satisfaction, customer loyalty
    
By: APC     Published Date: Nov 21, 2013

A four-pronged approach consisting of a monitoring & automation software system, video technology, intelligent rack outlets, and sensor technology can greatly reduce the incidences of human error in these small environments.

Tags : monitoring, data protection, employee performance, project management, data center design and management, infrastructure
    
By: McAfee     Published Date: Nov 19, 2013

This white paper focuses on key issues that organizations should address in the context of cybercrime delivered through email.

Tags : osterman research, cybercriminals, mcafee email protection, clickprotect; mcafee email security, monitoring, authentication, email security, hacker detection
    
By: Aruba Networks     Published Date: Nov 15, 2013

802.11ac va por buen camino para convertirse en el modelo para la próxima generación de Wi-Fi. La velocidad de transmisión de gigabits, su capacidad mejorada y la fiabilidad que proporciona 802.11ac a las redes inalámbricas LAN son amplificadas ya que el número de usuarios de móviles y dispositivos, así como el uso de aplicaciones continúan creciendo a gran velocidad. Tanto como si usted es uno de los primeros que ya han empezado a planificarse como si, al igual que les sucede a diversas organizaciones, no está seguro de qué es lo siguiente que debe hacer, descárguese esta guía en cinco pasos que le ayudará a prepararse y planificar una migración exitosa a WLAN 802.11ac.

Tags : just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage
    
By: Aruba Networks     Published Date: Nov 15, 2013

L'802.11ac è sulla buona strada per diventare lo standard del Wi-Fi di nuova generazione. La velocità in gigabit, le migliori capacità e l'affidabilità che l'802.11ac conferisce alle reti LAN senza filo (WLAN) sono amplificate, mentre cresce a vista d'occhio l'utilizzo da parte di utenti, applicazioni e dispositivi. Sia che siate dei precursori che hanno già iniziato a pianificare o, come molte aziende, siate incerti sul da farsi, scaricando questa guida in cinque fasi potrete prepararvi e pianificare la corretta migrazione verso una rete WLAN da 802.11ac.

Tags : just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage
    
By: IBM     Published Date: Nov 08, 2013

Maximize asset productivity and process efficiency by gaining insight from your data.

Tags : ibm, predictive maintenance, asset productivity, asset-associated processes, maximize asset productivity, optimize asset-associated processes, consumer empowerment, strong financial returns
    
By: Neustar Inc.     Published Date: Oct 14, 2013

As the digital universe evolves in both volume and scope, companies must be diligent about protecting their content. Fortunately, companies can easily leverage IP information to protect themselves. This paper explores the best practices of using IP intelligence for digital rights management to reduce risk to online content.

Tags : digital rights management, ip intelligence, best practices, neutar, security, wireless security, online content, rights
    
By: Gigamon     Published Date: Oct 11, 2013

Simplifying IT operations by centralizing monitoring tools and connecting them into a Gigamon Visibility Fabric™ can reduce OPEX and CAPEX. These monitoring tools include systems used for application performance management (APM), customer experience management (CEM), data loss prevention (DLP), deep packet inspection (DPI), intrusion detection systems (IDS), intrusion prevention systems (IPS), network performance management (NPM), network analysis, and packet capture devices. This white paper explains how this new approach to monitoring and management of IT infrastructure provides pervasive visibility across campus, branch, virtualized and, ultimately, SDN islands.

Tags : intrusion detection, ids, apm, customer experience, data loss, dlp, packet, analyzer
    
By: GeoTrust     Published Date: Aug 09, 2013

What is it about e-commerce that causes online businesses to fail?Take a look at this E-commerce 101 Guide to help with avoid pitfalls and be successful when selling on the web.

Tags : nethawk, geotrust, ecommerce, web security, ssl, online selling, technology, solution
    
By: Sponsored by HP and Intel®     Published Date: May 09, 2013

Uncover the impact modern business demands are having on corporate networks today and learn what you must do to ensure your network performs the way you need it to for business success.

Tags : virtualization, agile, security, network, network performance, distributed computing, infrastructure, load balancing
    
By: HP and Intel®     Published Date: Feb 21, 2013

This strategy lets you leverage your existing virtualization investments in order to quickly and cost-effectively reap the full benefits of the cloud.

Tags : cloud, cloud computing, storage, networks, high availability, private cloud, public cloud, hybrid cloud
    
By: Lumension     Published Date: Jan 18, 2013

Learn the recommended steps to cure your patch management headache as we dive into a technical discussion of what the critical items to address.

Tags : patch, best practices, networking, risk mitigation, network security, security, monitoring, network management
    
By: Red Hat, Inc.     Published Date: Jul 10, 2012

Cloud computing has a lot of appeal, from auto-scaling to lower costs, and it's all just a few clicks away. Thus, the big question is not "why cloud?" but rather "how cloud?"

Tags : cloud, cloud computing, autoscaling, lower costs, applications technology, applications platform, it productivity, application lifecycle
    
By: Box     Published Date: Jun 04, 2012

Enter Box. Our partner integrations and robust security suite ensure employees get any-device, on-the-go content sharing and collaboration... while IT retains control and visibility of all user accounts. Get Your FREE Box IT Strategy Kit!

Tags : free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools
    
By: Datalink     Published Date: Jun 01, 2012

Assembling an internal private cloud or migrating to an external one is a challenge - both technically and organizationally. Datalink has answers - and a unified solution with the Datalink V-Scape Reference Architecture.

Tags : v-scape, vscape, datalink, architecture, infrastructure, migration, storage, networking
    
Start   Previous   1 2 3 4 5 6    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.