network

Results 301 - 325 of 4656Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Nov 07, 2014
Fournissez de nouveaux services mtier scuriss et amliorez lexprience client. De plus en plus dentreprises adoptent le Cloud, la technologie mobile et les rseaux sociaux pour largir leurs activits, crer de nouveaux canaux commerciaux et amliorer les services aux clients.
Tags : 
accelerate service engagement, improve customer engagement, cloud, social networks, secure services, improve the customer experience, mobile computing, mobile data systems, wireless security, customer interaction service, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 07, 2014
Les supports mobiles, sociaux et de cloud computing ont aid liminer les vieux primtres rseau. La nouvelle entreprise ouverte doit faire avec un large ventail d'utilisateurs, d'appareils et d'applications, sans limites dfinies. De nouveaux modles de scurit sont essentiels pour la fois permettre et protger les activits commerciales dans ce monde nouveau. Tlchargez le guide.
Tags : 
mobile media, social media, mobile workers, security in the cloud, removal of the network perimeters, remote access, access control, application security, web service security, mobile computing, wifi, wireless security, cloud computing
    
CA Technologies
Published By: Dell EMC     Published Date: Feb 23, 2017
In ESG research conducted shortly after the announced acquisition of EMC by Dell, 65% of the respondents indicated that they expected to benefit from more complete and innovative solutions from the combined company. Thats not surprising, given the complementary strength of their respective portfolios. Perhaps the most potential synergy is in the Converged Platforms and Solutions division, where servers, networking, storage and software come together.
Tags : 
    
Dell EMC
Published By: Ruckus Wireless     Published Date: Jan 19, 2016
Lodi USD needed a long-lasting wireless infrastructure with enough headroom to support media-rich apps running on tens of thousands of Chromebooks. This case study explains why the school district turned to Ruckus Wireless.
Tags : 
lodi school, student-to-mobile, students, wlan, wifi, mobile devise, network, wireless, classroom, media-rich apps, school
    
Ruckus Wireless
Published By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
    
Akamai Technologies
Published By: Polycom     Published Date: Sep 04, 2012
As new visual communication applications are created to harness the power of next-generation broadband, a new model for government is emerging - one that will bring interpersonal interaction into cyberspace.
Tags : 
video collaboration, government, broadband networks, video conferencing, multi-point video, point-to-point video, telepresence, tele-services
    
Polycom
Published By: Polycom     Published Date: Sep 04, 2012
Polycom's introduction of H.264 High Profile allows CIOs to meet budget challenges and power more visual communication with fewer resources, thus limiting or avoiding costly network upgrades.
Tags : 
h.264 high profile, polycom, real-time video, visual communication, video deployment, video conferencing
    
Polycom
Published By: MobileIron     Published Date: Apr 20, 2015
A case study of how MobileIron Core, App@Work, and app delivery network technologies have been leveraged to augment and support ShiSeiDo operations. Study is in Japanese.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Apr 20, 2015
Angesichts der Geschwindigkeit, mit der Unternehmen auf Mobiltechnik umsteigen, muss man statt von einer Entwicklung schon eher von einem globalen Wandel sprechen. Unter Bercksichtigung der Tatsache, wie schnell Benutzer und Unternehmen von PCs auf Mobilgerte umsatteln, prognostizierte IDC, dass der Absatz von PCs 2013 auf ein Rekordtief fallen wrde.
Tags : 
mobileiron, byod, enterprise app store, productivity apps, mobile network access
    
MobileIron
Published By: MobileIron     Published Date: Apr 20, 2015
Diese Anleitung beschreibt nicht nur, wie Enterprise Mobility Management funktioniert, sondern zeigt auch an einem typischen Implementierungsbeispiel, wie ein Unternehmen die Einfhrung plant und alle Teile einer EMM-Lsung verwaltet. Diese Anleitung enthlt einen detaillierten Bereitstellungsprozess unter Verwertung der gesammelten Erfahrungen und Empfehlungen zur Suche nach dem richtigen EMM-Anbieter und Schritt fr Schritt umsetzbare Erkenntnisse aus der Praxis, die jedem Unternehmen bei der Umwandlung zum Mobile-First-Unternehmen helfen knnen.
Tags : 
mobileiron, byod, enterprise app store, productivity apps, mobile network access
    
MobileIron
Published By: MobileIron     Published Date: Apr 20, 2015
En plus de dcrire le fonctionnement de lEMM, ce guide livre galement une implmentation type en expliquant comment une organisation s'y prend pour dployer et grer tous les lments d'une solution EMM. En donnant un processus dtaill de dploiement des bonnes pratiques ainsi que des recommandations pour identifier le bon fournisseur EMM, ce guide propose des informations pratiques et des procdures qui permettront toute organisation d'acclrer la transition vers une entreprise Mobile First.
Tags : 
mobileiron, byod, enterprise app store, productivity apps, mobile network access
    
MobileIron
Published By: Akamai Technologies     Published Date: May 08, 2017
This paper, which has been jointly developed by Akamai and Wuaki.tv an OTT service provider covers the importance of satisfying viewer expectations for a broadcast-quality experience by quickly and reliably streaming video online. It explains why it is challenging to do so and outlines best practices for online video delivery. It also explores the option of splitting traffic across multiple content delivery networks (CDNs) versus tightly integrating video player technology with a single CDN in order to improve online video delivery in a strategic manner. Finally, the paper shows how Wuaki.tv chose the latter option and boosted customer retention, customer referrals, and revenues as a result.
Tags : 
content delivery, online video delivery, broadcast quality, viewer expectations, video streaming
    
Akamai Technologies
Published By: Cisco     Published Date: Oct 08, 2015
Miercom was engaged to conduct a comparative testing of two high-capacity L2 and L3 network switches: the popular Cisco Catalyst 4500E, and a comparably configured, competitive switch, the FastIron SX 1600, from Brocade Communications Systems.
Tags : 
network switches, communications systems, cisco catalyst, enterprise applications, infrastructure, network architecture, network management, network performance, quality of service, server hardware
    
Cisco
Published By: Cisco     Published Date: Oct 08, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides. The best practices conclusions are derived from thorough solution-level end-to-end characterization of various levels of system types, network design alternatives, and enterprise applications.
Tags : 
cisco infrastructure, enterprise network, network design, infrastructure, migration, network architecture, network management, network performance, network performance management, quality of service, remote access, remote network management
    
Cisco
Published By: Cisco     Published Date: Oct 08, 2015
This paper outlines and explains the 5 steps to help defend your network from infection, hacking and hard to detect threats.
Tags : 
network defense, hacking, detecting threats, security, network security
    
Cisco
Published By: Cisco     Published Date: Oct 08, 2015
Cisco can help you get there, using capabilities embedded in the network you already have in place. And it is as easy as 1+1=2
Tags : 
simplifying your network, cisco visual network, ethernet networking, gigabit networking, governance, infrastructure, migration, network architecture, network management, network performance, network performance management, network provisioning, network security
    
Cisco
Published By: Cisco     Published Date: Oct 08, 2015
Businesses looking to transition to 802.11ac Wave 2 should fully understand the new technologys requirements for the wired network and choose a solution provider that can minimize the disruption to the business.
Tags : 
wi-fi networks, cisco, wifi speed, enterprise applications, ethernet networking, fibre channel, gigabit networking, infrastructure, 802.11, wifi, wireless infrastructure, wireless security
    
Cisco
Published By: ShoreTel     Published Date: Oct 26, 2012
Back in the days of wireline telephony, when all phone calls went over the Public Switched Telephony Network (PSTN), businesses would purchase "trunks" -dedicated lines or a bundle of circuits - from their service provider.
Tags : 
shoretel, sip trunking, best practices, pstn, public switched telephony network, trunks, circuits, roi, return on investment, enterprise applications
    
ShoreTel
Published By: EMC Converged Platforms     Published Date: Jan 12, 2016
In order for enterprises and IT organizations to truly innovate and offer differentiated value to customers, you need an IT infrastructure based on the latest advancements in computing, networking, and storage. Considering an investment in flash storage or converged infrastructure? Read this brochure to learn more about the Vblock System 540, the industrys first all-flash Converged Infrastructure System for high-performance mixed workloads and emerging 3rd platform applicationsbuilt on best of breed technology components including EMC XtremIO all-flash storage. All of this with the VCE Experience of unmatched management and one-call support.
Tags : 
vce, it infrastructure, all flash storage, vblock system 540, 3rd platform applications, networking, it management, knowledge management, data management
    
EMC Converged Platforms
Published By: Brocade     Published Date: Jun 12, 2015
Dieses Dokument bietet einen berblick ber Software-Defined Networking (SDN), und zeigt einige Anwendungsbeispiele sowie Brocades Beitrag zur Innovation durch SDN.
Tags : 
software-defined networking, sdn, network, network flexibility, apis, application programming interfaces, sdn innovation, infrastructure, network architecture, network management, network performance, traffic management, tunneling, virtualization
    
Brocade
Published By: Brocade     Published Date: Jun 12, 2015
This paper provides an overview of Software-Defined Networking (SDN), expected use cases, and Brocade contributions to SDN innovation.
Tags : 
software-defined networking, sdn, network, network flexibility, apis, application programming interfaces, sdn innovation, network architecture, network management, network performance, traffic management, tunneling, virtualization, infrastructure
    
Brocade
Published By: Brocade     Published Date: Jun 12, 2015
In diesem Bericht wird erlutert, welche Risiken die sinkende Bedeutung der IT-Abteilung in sich birgt, wie Sie Ihr Netzwerk selbst bewerten knnen und was Sie tun sollten, um die Flexibilitt Ihrer IT-Infrastruktur zu verbessern.
Tags : 
guide for it decision makers, it decision makers, it department, it agility, network challenges limiting it agility, infrastructure, it management, network architecture, network management, network performance management, virtualization
    
Brocade
Published By: Venafi     Published Date: Aug 10, 2015
The need for authentication and assurance is great and options are few; therefore, we have come to rely on encrypted SSL/TLS certificates for almost every new application, appliance, device and cloud service.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network, access control, anti spam, anti spyware, anti virus, application security, authentication, security management, security policies, ssl, vulnerability management
    
Venafi
Published By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institutes 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network, networking, software development, wireless security
    
Venafi
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.