> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 1 - 25 of 510Sort Results By: Published Date | Title | Company Name
By: HP     Published Date: Apr 13, 2014
Cut the cost and complexity of managing you large, hybrid server estate. Learn how Turkcell, the leading GSM operator in Turkey, reaps benefits from server automation including reductions in the time needed to check adherence to security compliance policies from 55 hours to 20 minutes and cutting the time taken to provision virtual PCs from five days to 40 minutes.
Tags : hp operations orchestration, hp server automation, hp support, it case study, turkcell
     HP
By: Code 42     Published Date: Apr 08, 2014
Enterprise IT teams face increasing challenges as the amount of valuable data living on endpoints continues to grow. Adding complexity is the mounting list of government regulations to which enterprises must comply. Read how endpoint backup can satisfy data collection and preservation requirements in a more streamlined and cost-effective manner than traditional e-discovery methods.
Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies
     Code 42
By: Code 42     Published Date: Apr 08, 2014
Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn't provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data.
Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies
     Code 42
By: Code 42     Published Date: Apr 08, 2014
A large amount of mission-critical data exists exclusively on laptops and desktops (i.e. "endpoints") making them a primary source of unnecessary (and often unrecognized) data loss risk for today's organizations. Through helping thousands of top brands around the world properly manage and protect the critical corporate data on their endpoints, Code 42 identified the five common stages of "enterprise endpoint backup grief." In which stage is your organization?
Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies
     Code 42
By: Code 42     Published Date: Apr 08, 2014
A new research survey reveals several important—and potentially alarming—trends on endpoint backup. As more and more users create essential data on their desktops and laptops—and often store at least a copy of that data on those devices—it’s increasingly clear that endpoint backup must be a fundamental part of the IT department’s mandate when it comes to ensuring availability of critical data.
Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies
     Code 42
By: Code 42     Published Date: Apr 08, 2014
While consumerization offers many benefits for both end users and the enterprise in terms of convenience, efficiency and productivity, it presents important challenges for IT departments, especially in terms of endpoint backup and data security. To reap the benefits of consumerization while avoiding security and other pitfalls requires an understanding of the origins of this latest IT trend, its enduring presence and how the most successful enterprises have effectively embraced this new reality.
Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies
     Code 42
By: Code 42     Published Date: Apr 08, 2014
Traditional backup protected information stored on servers in data centers, and it was very manageable. A predictable, controlled, contained environment that underwent scheduled backups and updates. But then the inevitable happened: office employees began saving information to desktops; mobile workers began doing the same with laptops; and backup admins began losing control.
Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies
     Code 42
By: Code 42     Published Date: Apr 08, 2014
There’s no doubt consumer-grade sync and share solutions are convenient, but it’s the risk they introduce to the enterprise that keeps IT leaders up at night. But what really constitutes an enterprise-grade sync and share solution? To get a second glance from enterprise IT, sync and share solutions must, at a minimum, include the basic business feature sets: security, integrations, roles and permissions, audit trails,remote wipe, comprehensive APIs, real-time administration, bandwidth controls and de-duplication.
Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies
     Code 42
By: Cisco     Published Date: Apr 08, 2014
Service providers around the world share concerns about running out of bandwidth. Business challenges surrounding continued bandwidth growth, linked to video, mobility, and cloud applications, are significant. Service providers also report declining revenue from a cost-per-bit perspective, so not only does the network need to grow, it also needs to grow more cost effectively. Download this whitepaper to learn more!
Tags : cisco, 100g, data, video, mobile
     Cisco
By: Riverbed Technology, Inc.     Published Date: Apr 08, 2014
A new kind of storage architecture allows IT to consolidate remote servers and data in the data center by decoupling storage from its server over any distance and still get the same performance as if the storage remained local to the branch. Learn how organizations can now consolidate remote infrastructure to increase security and efficiency, without impacting performance in branch offices
Tags : consolidate remote servers, data center, storage architecture, remote infrastructure, increase security
     Riverbed Technology, Inc.
By: HP Enterprise Services     Published Date: Apr 02, 2014
A video explaining how high-end replication and fail over solutions used to be economical only for stock exchanges and other similar environments, but not anymore. Find out how HP can help you cut recovery time and data loss with a cloud-based disaster recovery solution that is less than you would think.
Tags : disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service
     HP Enterprise Services
By: Intacct Corporation     Published Date: Mar 31, 2014
Thinking about moving your financial apps to the cloud? Chances are, you've asked yourself the same crucial question that's applied to every strategic decision in your business: What's the ROI? A solid business case not only unlocks budget dollars, it provides a roadmap for successful deployment and maximum value.
Tags : roi, finance, cloud based financial applications, finance applications, financial management
     Intacct Corporation
By: Workday     Published Date: Mar 28, 2014
In this whitepaper, we discuss the turbulent business landscape, a key emerging trend is the adoption of cloud-based technologies such as Software-as-a-Service(SaaS) in order to reduce costs, accelerate business transformation, and create new business value.
Tags : workday, cloud computing, saas, finance, business
     Workday
By: Dyn     Published Date: Mar 27, 2014
If your ads are slow to load, chances are, consumers aren’t going to wait around to see them. Just the smallest amount of latency can cost you thousands of views, clicks, and conversions. By following these 5 guidelines, you can reduce your overall network latency and keep those clicks coming.
Tags : dyn, network latency, customer retention, serve content, combating latency
     Dyn
By: Dyn     Published Date: Mar 27, 2014
DDoS, cache poisoning, footprinting, oh my! Who knew that there were so many ways to threaten the security of your DNS? Find out all of the scary details about these attacks and what you can do to prevent them.
Tags : dyn, dns, security risks, arbor networks survey, ddos attacks
     Dyn
By: Dyn     Published Date: Mar 27, 2014
The cost of security might seem steep, but compared to what you’ll have to pay to mitigate a DDoS attack, it’ll look like chump change. DDoS attacks don’t just cost your company the annoyance of downtime, but brand reputation, customer acquisition, and of course, sales all are affected.
Tags : dyn, ddos attack, cost of downtime, business transactions, infrastructure
     Dyn
By: HP Enterprise Services     Published Date: Mar 25, 2014
HP created and implemented a disaster recovery plan for BAT Italia, across data and desktop, to comply with the Group’s global standards. Read how the HP approach consolidated the existing server infrastructure and planned a new disaster recovery site.
Tags : disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service
     HP Enterprise Services
By: OutSystems     Published Date: Mar 24, 2014
Mobile has become standard in the enterprise with smartphones and tablets common in the workplace. Anywhere, anytime access to company systems is expected and systems must work flawlessly on these devices! This eBook looks at how to kick start your mobile application strategy.
Tags : outsystems, mobile, app, mobile applications, mobile strategy
     OutSystems
By: CompareBusinessProducts.com     Published Date: Mar 21, 2014
Learn about the 5 most commonly made mistakes when purchasing business phone systems and see how your organization can avoid these costly pitfalls to receive the system that will benefit them the most.
Tags : compare business, common business concerns, voip, small business, phone system
     CompareBusinessProducts.com
By: CompareBusinessProducts.com     Published Date: Mar 21, 2014
Learn about the best ways to future-proof your business communications strategy to prepare your organization to be able to communicate with your clients and employees regardless of what device they prefer to use.
Tags : compare business, common business concerns, voip, small business, phone system
     CompareBusinessProducts.com
By: CompareBusinessProducts.com     Published Date: Mar 21, 2014
Learn about the 11 most vital questions to ask when negotiating for a new phone system to ensure that you get right system for your organization’s needs.
Tags : compare business, common business concerns, voip, small business, phone system
     CompareBusinessProducts.com
By: Logicalis     Published Date: Mar 12, 2014
We are pleased to present the findings of The Impact of IT Transformation on Enterprise Computing sponsored by Logicalis and HP. The objective of this research is to better understand how the different stages of IT transformation can affect an organization, the challenges of advancing through each stage and how successful progression can improve an organization’s IT effectiveness.
Tags : logicalis, it transformation, it strategy, it budget, it solutions
     Logicalis
By: Norse     Published Date: Mar 10, 2014
Learn about how the internet has changed over the past year and see how these major changes have affected security protocols and how your organization should respond to keep current in a world that is run by the Internet.
Tags : norse, sans, internet of things, cybersecurity, nstac
     Norse
By: Code 42     Published Date: Mar 04, 2014
Valuable enterprise data lives on endpoint devices, changes constantly and flows freely throughout organizations. But what happens when that data is inappropriately shared or breached because a business user adopts an unsafe consumer-based sync and share tool?
Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies
     Code 42
By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance
     Smarsh
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search