Find White Papers
Home
About Us
List Your Papers
    
> Technology > Networking

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 151 - 175 of 4589Sort Results By: Published Date | Title | Company Name
Webinar Published By: IBM     Published Date: Oct 07, 2016
In this session, we will talk about the latest release of DataPower V7.5. This release delivers enhanced cloud and API capabilities, in an updated modernized user experience.
Tags : 
ibm, cloud, api, ibm datapower v7.5, ibm datapower
    
IBM
Webinar Published By: IBM     Published Date: Oct 07, 2016
The world of IT is rapidly transforming — from back office process automation to front line engagement. Put another way, IT no longer supports the business, it *is* the business. The challenge is, the application architectures and processes of existing applications are inadequate to support the requirements of tomorrow’s IT. This presentation will discuss the changing nature of business and customer engagement and discuss what capabilities IT must put in place to deliver the next generation of enterprise applications.
Tags : 
ibm, cloud, middleware, infrastructure, enterprise applications
    
IBM
Webinar Published By: IBM     Published Date: Oct 07, 2016
The new capabilities of WebSphere Application Server Liberty profile, based on Java EE 7 standards, are designed for enhanced developer productivity, dynamic scale, resilient production deployments and ease of integration into modern DevOps workflows. These new production ready capabilities of Liberty profile enable development and delivery of engaging and responsive applications by providing the application infrastructure that meets expectations for speed, agility and user friendliness.
Tags : 
ibm, middleware, cloud, platform services, websphere application server
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2016
IBM® i2® Analyst’s Notebook® provides rich visual analysis capabilities that help to quickly turn complex sets of disparate information into high-quality, actionable intelligence. It is designed to help analysts, and others involved in intelligence analysis, identify, predict, and prevent criminal, terrorist and fraudulent activities.
Tags : 
cyber security, intelligence, prevention, ibm, data protection
    
IBM
Free Offer Published By: VASCO Data Security International, Inc.     Published Date: Oct 06, 2016
This presentation details top trends in patient portal security along with the first steps and top considerations for piloting digital identity management programs within a healthcare organization.
Tags : 
vasco, identitiy management, portal security, patient security, password protection
    
VASCO Data Security International, Inc.
White Paper Published By: Cambium Networks     Published Date: Oct 03, 2016
Download this white paper to learn how Cambium Networks helped the South Asian Games connect with end-to-end wireless broadband.
Tags : 
wan, lan, wi-fi, wireless broadband, network management
    
Cambium Networks
White Paper Published By: Cambium Networks     Published Date: Oct 03, 2016
Read this case study to learn how Wisper Internet leveraged Cambium Networks for ePMP scalability and air fairness.
Tags : 
wireless isp, network performance, customer service, nlos, epmp
    
Cambium Networks
White Paper Published By: Cambium Networks     Published Date: Oct 03, 2016
For PMP sectors, the ePMP1000 system supports two modes of operation: TDD GPS Synchronized and non-TDD Unsynchronized.
Tags : 
tdd, epmp, wireless broadband, iperf, jperf
    
Cambium Networks
White Paper Published By: Cambium Networks     Published Date: Oct 03, 2016
Cambium Networks’ fixed wireless broadband solutions provide an attractive ROI for electric utilities when replacing leased-lines for: Redundant backbone IP network rings Smart meter and distribution automation aggregation transport Transport for substation and distribution SCADA data Remote office connectivity Mobile WiFi connectivity in substations and operation centers Download this white paper to learn more.
Tags : 
wireless broadband, roi, mobile wi-fi connectivity, smart meter, network performance
    
Cambium Networks
White Paper Published By: Cambium Networks     Published Date: Oct 03, 2016
Download this white paper to learn more about these 7 things utilities should know about private wireless networks: Capacity vs. range Topologies (PTP, Rings, Mesh, PMP) Licensed vs. unlicensed Line of sight vs. non-line of sight Security Quality of service Network management
Tags : 
wireless networks, security, network management, quality of service, wireless service providers
    
Cambium Networks
White Paper Published By: IBM     Published Date: Sep 30, 2016
Working with ESM Technology, Infirmary Health System deployed a comprehensive security solution from IBM that has enabled it to meet data security requirements for meaningful use, qualify for meaningful use dollars, and reduced security incidents significantly.
Tags : 
ibm, security. big fix, infirmary health system, case study, esm technology
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, security, big fix, advanced threats, security
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, security, network protection, ibm security network protection, cyber threats
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM Security as a leader in providing Intrusion Prevention Systems (IPS) appliances in the newly published Gartner Magic Quadrant for IPS technology.
Tags : 
ibm, security, network protection, ibm security network protection, intrusion prevention systems
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Read this Forrester report to learn how to: 1) Increase network security, performance, and availability, 2) Reduce costs and protect your investment with Flexible Performance Licensing, 3) Evaluate the potential return on investment (ROI) your organization may realize with XGS.
Tags : 
ibm, security, network protection, ibm security network protection, cyber threats
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM as a leader in providing Security Information and Event Management (SIEM) software in the newly published Gartner Magic Quadrant for SIEM Technology. Read the Gartner report to learn why IBM is positioned as a leader, the strenghts of IBM QRadar for security intelligence & analytics and market trends and vendor evaluation criteria.
Tags : 
ibm, security, security intelligence, gartner, magic quadrant
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
nucleus, research guidebook, ibm qradar, cloud, networking
    
IBM
White Paper Published By: DellEMC and Intel®     Published Date: Sep 29, 2016
This infographic shows how VxRail is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments
Tags : 
vxrail, hyper-converged infrastructure, converged infrastructure, vmware, convergence
    
DellEMC and  Intel®
White Paper Published By: DellEMC and Intel®     Published Date: Sep 29, 2016
This infographic explains how you can streamline IT infrastructure, gain new levels of speed and performance to enhance the end-user experience, and spend more time on innovation.
Tags : 
it infrastructure, performance, end-user experience, converged infrastructure, convergence
    
DellEMC and  Intel®
White Paper Published By: DellEMC and Intel®     Published Date: Sep 29, 2016
This infographic shows how VxRail is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das Intel Inside-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Intel Xeon Phi und Xeon Inside sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern
Tags : 
ultrabook, celeron, celeron inside, core inside, intel
    
DellEMC and  Intel®
White Paper Published By: DellEMC and Intel®     Published Date: Sep 29, 2016
This infographic explains how you can streamline IT infrastructure, gain new levels of speed and performance to enhance the end-user experience, and spend more time on innovation. Intel® Xeon® Processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das Intel Inside-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Intel Xeon Phi und Xeon Inside sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern
Tags : 
ultrabook, celeron, celeron inside, core inside, intel
    
DellEMC and  Intel®
White Paper Published By: IBM MaaS360     Published Date: Sep 27, 2016
Protecting confidential data while keeping mobile users productive.
Tags : 
ibm, mobile, mobilize, mobile data security, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Sep 27, 2016
Learn How Enterprise Mobility Has Forever Changed the Way Enterprises Conduct and Secure Business
Tags : 
ibm, maas360, mobile, security, mobile security
    
IBM MaaS360
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
On June 20, Akamai Technologies mitigated one the largest confirmed Distributed Denial-of-Service (DDoS) attacks of the year. Read the case study to learn more about the attack, including payload samples and sources.
Tags : 
akamai, cybersecurity, security, ddos, ddos attack
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Content Management, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search