Find White Papers
Home
About Us
List Your Papers
    
> Technology > Networking

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 4501 - 4525 of 4616Sort Results By: Published Date | Title | Company Name
White Paper Published By: MASERGY     Published Date: Jul 20, 2007
Organizations of all sizes are evolving to an enlightened, business-focused method of choosing network services and service providers called Total Customer Experience (TCE). This white paper describes the evolution toward a TCE approach and the benefits and clarity that TCE brings to the marketplace.
Tags : 
mice, multimedia, internet, communications, entertainment
    
MASERGY
White Paper Published By: MASERGY     Published Date: Jul 20, 2007
This paper will explore the problems inherent in an overlay management approach and describe a new approach that allows for the management of the wide-area network to be not only offered as a service, but actually embedded in the network itself, resulting in several incremental benefits to the enterprise.
Tags : 
ip services, ip networks, network management, voip, it management
    
MASERGY
White Paper Published By: Knoa     Published Date: Jul 17, 2007
What is often overlooked is that application performance is just one of three key drivers of return on investment (ROI) from your Siebel application. An efficient infrastructure is critical. It's important to optimize the Siebel application for your own unique business environment, user needs and usage patterns. But, it's all for naught if you do not build and sustain adoption and efficient and effective use of the Siebel application by your end users.
Tags : 
epm, performance management, experience management, knoa, siebel
    
Knoa
White Paper Published By: Quocirca     Published Date: Jul 11, 2007
Wide areas networks (WANs) are essential to the majority of businesses, connecting remote locations and individuals back to centralized IT resources. But as the network is expected to handle more bandwidth intensive applications such as voice and video it is essential to ensure the WAN usage is well managed – eliminating unwanted traffic and accelerating business content.
Tags : 
wan, wans, wide area network, wan acceleration, remote workers
    
Quocirca
White Paper Published By: Quocirca     Published Date: Jul 11, 2007
Operating and maintaining a complex IT infrastructure requires the necessary skills and investment but getting the right staff at an affordable price can be a problem. Finding ways around this can give SMBs a competitive edge leaving them free to focus on new business opportunities.
Tags : 
infrastructure, smb, small business, online business, high availability
    
Quocirca
White Paper Published By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : 
security software, pci, payment card, credit card, compliance
    
GFI
White Paper Published By: GFI     Published Date: Jul 09, 2007
This white paper highlights why organizations need to implement event log auditing as an integral part of their security policy to meet industry standards such as the Payment Card Industry Data Security Standard (PCI DSS).
Tags : 
security software, pci, payment card, credit card, compliance
    
GFI
White Paper Published By: Torry Harris Business Solutions     Published Date: Jul 05, 2007
The information overload on SOA is largely on describing its merits, its principles and the vast variety of products intended to address its needs. This document is written to identify the factors to be considered, and articulate the principles and questions to be asked that will drive the decisions within each enterprise towards creating a road map for implementation.
Tags : 
service oriented, service-oriented, soa, network architecture, soa roi
    
Torry Harris Business Solutions
White Paper Published By: CCSS     Published Date: Jul 05, 2007
Capability breeds dependence. The more you can do, the more is asked of you. The more time you save, the more time you spend seeking out ways to save more time or money. If less really is more, how do you do more with less? Effective system monitoring could help you break free of the system shackles and use your System i (iSeries) network to save time and money.
Tags : 
ibm, system monitoring, monitoring, network monitoring, productivity
    
CCSS
White Paper Published By: CCSS     Published Date: Jul 05, 2007
Is a lack of availability costing your business thousands or even hundreds of thousands of dollars? Assessing the true financial impact of unplanned downtime may surprise you. Placing a dollar amount on this issue is often the first step and biggest motivator to meeting your ongoing availability requirements.
Tags : 
availability, high availability, business continuity, network monitoring, server monitoring
    
CCSS
White Paper Published By: Torry Harris Business Solutions     Published Date: Jul 05, 2007
This whitepaper is written as a guide to an alternative mechanism for project implementation for business owners holding responsibility to deliver IT solutions in the SOA space. It could also be of interest to those who would like to know more about how the phenomenon of offshore/onsite coordination, that emerged in the nineties, can be effectively applied towards realizing the promise of SOA.
Tags : 
service oriented, service-oriented, governance, service management, outsource
    
Torry Harris Business Solutions
White Paper Published By: Ingate Systems     Published Date: Jun 21, 2007
A complete guide to SIP trunks, this whitepaper provides a comprehensive overview on the basics of SIP trunking, including a discussion of infrastructure needs and deployment issues and solutions. In-depth sections dedicated to interoperability, security as well as quality and reliability issues are also included.
Tags : 
pbx, phone, phone system, phone systems, best practices
    
Ingate Systems
White Paper Published By: GFI     Published Date: Jun 14, 2007
This white paper details how integrated network faxing remains a relevant technology that can give you a business edge in an ever competitive marketplace, providing higher productivity and helping you save thousands of dollars in labor costs alone.
Tags : 
ip networks, ip network, ip fax, ip faxing, faxing
    
GFI
White Paper Published By: GFI     Published Date: Jun 14, 2007
This technical white paper describes the different ways in which GFI FAXmaker for Exchange/SMTP 12 can be deployed, depending on your mail server type/version and network infrastructure.
Tags : 
ip fax, ip faxing, infrastructure, network infrastructure, faxmaker
    
GFI
White Paper Published By: GFI     Published Date: Jun 14, 2007
A fax server buyers' guide, this paper describes the features you need to look for in fax server software and why. It also discusses the type of fax server devices (fax cards) available and which to choose.
Tags : 
fax server, buyers guide, buyer's guide, buying guide, ip fax
    
GFI
White Paper Published By: GFI     Published Date: Jun 14, 2007
This technical white paper gives an introduction to fax over Internet Protocol (FoIP) and explains the various usages and advantages of FoIP including Least Cost Routing (LCR).
Tags : 
ip fax, faxing, ip faxing, foip, fax server
    
GFI
White Paper Published By: GFI     Published Date: Jun 14, 2007
This white paper provides an overview of how to use GFI LANguard Network Security Scanner (N.S.S.) and Microsoft Windows Software Update Services (WSUS) to keep your network automatically updated with the latest security patches.
Tags : 
patch, patches, patch management, windows, windows patch
    
GFI
White Paper Published By: GFI     Published Date: Jun 14, 2007
This white paper shows where GFI EventsManager fits in this picture and how it is an invaluable asset in the corporate toolbox.
Tags : 
event management, performance management, employee performance, roi, return on investment
    
GFI
White Paper Published By: Jumpnode Systems     Published Date: Jun 12, 2007
Network monitoring software packages require complex installation, ongoing maintenance and additional costs for servers and third-party applications. Software-as-a-Service (SaaS) network monitoring alternatives greatly simplify implementation and maintenance, but they rely on uninterrupted Internet access to function, often require complex VPNs or firewall modifications, and typically provide limited access to historical data.
Tags : 
monitoring, software as a service, saas, high availability, network management
    
Jumpnode Systems
White Paper Published By: GFI     Published Date: Jun 12, 2007
A buyers' guide to anti-spam software, this white paper highlights the key features to look for in anti-spam software and why.
Tags : 
buyers guide, buyer's guide, buying guide, antispam, anti spam
    
GFI
White Paper Published By: GFI     Published Date: Jun 12, 2007
This white paper examines why having multiple anti-virus scanners at mail server level substantially reduces the chance of virus infection and explores ways in which this can be achieved.
Tags : 
anti virus, anti-virus, virus, norton, network security
    
GFI
White Paper Published By: GFI     Published Date: Jun 12, 2007
Describing what trojans are and why they pose a danger to corporate networks, this paper discusses the need and method to protect your network from the threat of trojans.
Tags : 
network security, trojan, trojans, anti virus, anti-virus
    
GFI
White Paper Published By: GFI     Published Date: Jun 12, 2007
Virus-writers are using increasingly complex and sophisticated techniques in their bid to circumvent anti-virus software and disseminate their viruses. Anti-virus software, though essential, cannot combat such threats alone; an email exploit detection tool is also necessary.
Tags : 
email security, trojan, trojans, anti-virus, anti virus
    
GFI
White Paper Published By: GFI     Published Date: Jun 12, 2007
Examining the different kinds of email threats and email attack methods, this paper describes the need for a solid server-based content-checking gateway to safeguard your business against email viruses and attacks as well as information leaks.
Tags : 
network security, virus, anti virus, anti-virus, content checking
    
GFI
Start   Previous    171 172 173 174 175 176 177 178 179 180 181 182 183 184 185    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Content Management, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search