• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

it networks

Results 451 - 475 of 842Sort Results By: Published Date | Title | Company Name
By: Microsoft     Published Date: Jul 20, 2018
At its Build conference in May, Microsoft took the wraps off Cosmos DB, the new incarnation of its existing cloud-based Azure DocumentDB NoSQL database. With a nod to the dramatic, Microsoft terms Cosmos DB as its biggest database bet since SQL Server; it is positioning it as its flagship cloud database, suited for use cases ranging from security and fraud detection, to IoT (consumer and industrial), personalization, e-commerce, gaming, social networks, chats, messaging, bots, oil and gas recovery and refining, and smart utility grids. Cosmos DB is a good example of how cloud platform providers are rethinking databases for scalable, elastic environments and commodity infrastructure. The platform that is most comparable is Google Cloud Spanner, but each of these databases is engineered for different purposes: Cosmos DB as a globally distributed operational database and Spanner as a globally distributed SQL-supporting OLTP database. The highlights of Cosmos DB include its flexibility in
Tags : 
    
Microsoft
By: Kaspersky Lab     Published Date: Feb 18, 2014
Download the Kaspersky Lab security experts' Guide to the Threat Landscape to have access to a wealth of IT security intelligence.
Tags : 
kaspersky, kaspersky lab, malware, anti-virus industry, organizational security, mobility, byod, the cloud
    
Kaspersky Lab
By: EdgeWave     Published Date: Oct 15, 2011
This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.
Tags : 
e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave
    
EdgeWave
By: Enterprise Management Associates     Published Date: Jul 20, 2015
Research from leading IT analyst firm Enterprise Management Associates (EMA) has evidenced strong and growing interest in cloud deployment models. While public cloud has gotten the earliest attention, stronger adoption is happening within private and hybrid models. In the EMA April 2014 report “Managing Networks in the Age of Cloud, SDN, and Big Data Network Management Megatrends 2014,” over 50% of respondents reported public/hybrid cloud initiatives were driving network management priorities. Since 2012, cloud projects have moved from early adopter status to mainstream business initiatives, and their impact on network management grew from 36% in 2012 to over 50% in 2014.
Tags : 
network optimization, application delivery, public/hybrid cloud initiatives, network management
    
Enterprise Management Associates
By: IBM     Published Date: Feb 25, 2008
Enterprise Strategy Group (ESG) Labs performed a hands-on analysis of IBM's System Storage SAN Volume Controller storage virtualization solution in order to validate its value proposition to customers. ESG Labs found that SAN Volume Controller is a rock-solid, feature-rich platform that delivers on the promise of network based storage virtualization: reducing the complexity and cost of managing SAN attached storage.
Tags : 
hardware, ibm, san volume controller, roi, storage, storage management, storage virtualization, virtualization
    
IBM
By: IBM     Published Date: Nov 13, 2008
Improve operational efficiencies with next-gen networks and servicesThere has never been a better time for service providers to streamline operations, improve responsiveness and reduce costs. Find out in this white paper how all three can be accomplished with IBM Tivoli® Netcool® solutions. Also discover methods to boost efficiency and minimize expenditures.
Tags : 
ibm, operations management, tivoli, value-added services, operational support systems, wireless, ibm, power
    
IBM
By: ESET     Published Date: Feb 01, 2008
With the ever evolving threat landscape, what will 2008 hold for IT Managers?  This podcast provides a high level overview of a few trends to watch for this year.
Tags : 
2008 predications, it security predictions, it security, mobile devices, laptops, endpoint, operating systems, antivirus
    
ESET
By: YouSendIt     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer makes networks safer; and how to avoid email compliance hassles. Don’t let large files become a security issue—download this white paper now.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment
    
YouSendIt
By: Cisco     Published Date: Jan 28, 2009
Building a small office network means starting with a foundation of switches and routers. The following guide will help you understand the difference between switches and routers and develop a clear vision for what your network foundation needs. Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;}
Tags : 
small office network, cisco, switches, routers, multiple devices, multiple networks, integrated messaging, voip
    
Cisco
By: Cisco     Published Date: Jan 28, 2009
When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. The network operates by connecting computers and peripherals using two pieces of equipment; switches and routers. Switches and routers, essential networking basics, enable the devices that are connected to your network to communicate with each other, as well as with other networks. Though they look quite similar, routers and switches perform very different functions in a network.
Tags : 
cisco, networking basics, routing and switching, essential networking basics, switches, routers, virtual private network, vpn
    
Cisco
By: Cisco     Published Date: Jan 29, 2009
Small business telephone systems are available in a variety of configurations, offering an ever-growing range of features and benefits. The most advanced small business telephone systems today run on Internet Protocol (IP) networks—the same network many small businesses use to connect employees, devices and information resources.
Tags : 
cisco, small business phone systems, ip networks, internet protocol, videoconferencing, unified messaging, mobile softphones, automated attendant
    
Cisco
By: Cisco     Published Date: Jan 29, 2009
In a marketplace where too many products and services are chasing too little demand, businesses face a daunting challenge: do everything possible to attract and retain customers.The stakes are high.
Tags : 
cisco, customer satisfaction, crm, customer attrition, retain customers, customer infidelity, trouble-free shopping experience, knowing your customer
    
Cisco
By: Microsoft Dynamics CRM     Published Date: Mar 11, 2010
Covering All Points of Attack. As the availability of product and service information on the Internet grows, both the providers and receivers of service have larger networks through which to communicate, interact and transact.
Tags : 
microsoft dynamic crm, service delivery, contact center, customer satisfaction, customer relationship management, call center management, call center software, customer interaction service
    
Microsoft Dynamics CRM
By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : 
zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics
    
NetIQ
By: IBM Corporation     Published Date: Jun 30, 2011
This menu interface provides a high-level overview, product demonstrations, expert interviews, and resource links for the IBM Data Center Automation solution.
Tags : 
automation, launchpad, ibm, isms, ibm data center, data recovery, wireless internet, business intelligence
    
IBM Corporation
By: IBM Unica     Published Date: Feb 09, 2012
With the explosion of social networks, mobile devices, and micro sites, marketing executives are challenged to gain a truly integrated view of customer behavior across the range of established and emerging channels.
Tags : 
forbes, marketing, customer satisfaction, roi, cmo, marketing solutions, marketing budgets, online marketing
    
IBM Unica
By: CenturyLink     Published Date: Nov 18, 2011
Read this IDC Executive Brief to see how MPLS facilitates cost-effective and converged wide area networking with a high level of security and flexibility
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
CenturyLink
By: CenturyLink     Published Date: Mar 09, 2012
IT Security challenges are more complex than ever, as mobile devices, social technologies and cloud computing take hold. Find out how these top 2012 security trends will affect your organization-and make sure your data protection measures are ready.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
CenturyLink
By: TeamQuest     Published Date: Apr 09, 2014
Your customers rely on you to efficiently manage a highly dynamic, rapidly changing, highly shared, distributed environment so they can do their jobs effectively. This means working through the complexities of understanding the services in your virtualized networks, machines and storage, and determining how and when customers will be affected. Listen to virtualization expert Bernd Harzog discuss the complexities that many IT professionals face.
Tags : 
teamquest, virtualization, it professionals, optimize software, distributed environment, data center, performance, data management
    
TeamQuest
By: Cisco     Published Date: Jan 20, 2012
Discover how Virtual Radiologic uses Cisco Borderless Networks to secure electronic patient information transmitted between hospitals and doctors
Tags : 
cisco, radiology, healthcare, hospitals, sercure, information, virtual, borderless networks
    
Cisco
By: IBM     Published Date: Jul 02, 2012
Many organizations move a wide variety of sensitive information with file transfer protocol (FTP), and these servers are proving to be easy targets for thieves. Read this paper to learn more about IBM Sterling Managed File Transfer that helps you manage and control the critical information flows in your company's dynamic business networks.
Tags : 
ibm, ftp, secure file transfer, file, business, business network, technology, business technology
    
IBM
By: Limelight Networks     Published Date: Mar 02, 2018
There are a number of factors contributing to the growing popularity of streaming live events or offering content on demand, from anywhere, any time, on any device. Live streaming major sporting events such as the Superbowl or the Olympics is now a viable alternative to broadcast TV. And as Limelight’s 2017 State of Online Video report reveals, the average number of online viewing hours is almost six per week. However, as viewer expectations continue to rise, keeping audiences happy and engaged isn’t easy. In this white paper we discuss current trends and what to expect in 2018. We examine the role Content Delivery Networks (CDN) can play in optimizing the delivery of online video content at global scale, and the technologies available to ensure the lowest latency delivery possible. You’ll learn: Why sports leagues are enthusiastic about live streaming their events How content distributers can differentiate their services The apparent challenges of delivering live and on demand v
Tags : 
cdn, live video streaming, ott, over the top (ott) content delivery, video on demand, global content delivery, streaming video, content delivery network
    
Limelight Networks
By: Limelight Networks     Published Date: Mar 02, 2018
Can your business afford to lose $9,000 per minute? According to the Ponemon Institute $9,000 is the average cost of an unplanned outage. In some cases the costs are much higher. The catalogue of cloud outages over recent years is well publicized and reads like a “who’s who” of the technology industry. It seems no one is immune. But when it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questi
Tags : 
content delivery network, cdn, multi-cdn, multiple cdns, web performance, web acceleration, digital content delivery, mobile delivery
    
Limelight Networks
By: Limelight Networks     Published Date: Mar 02, 2018
Your online audience expects fast, flawless, secure experiences on any device in any location, every time. But whether you are delivering videos, your website, music, software or games, ensuring engaging online experiences from an increasing variety of devices around the world is a huge challenge. Content delivery networks (CDNs) can significantly improve the user experience of your online audiences. But not all CDNs deliver the same level of service. Dos and Don’ts of Evaluating and Deploying a CDN provides tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs. Download this guide to learn: The four major performance factors that can affect user experience Why speed alone isn't an accurate measure of performance How a content audit can identify performance bottlenecks The role content storage can play in reducing costs and latency How to decide what features are most important to your business
Tags : 
content delivery network, cdn, web performance, web acceleration, digital content delivery, ddos protection, ddos, web application security
    
Limelight Networks
By: CDW     Published Date: Jan 14, 2015
Learn how to create an enterprise network architecture that delivers 100% tailored solutions that help your customers optimize their networks while bringing their organizations up to speed.
Tags : 
enterprise, networking, architecture, customer, technology, wireless, telephony systems, collaboration
    
CDW
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter