traffic data

Results 51 - 75 of 82Sort Results By: Published Date | Title | Company Name
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
Software-Defined Wide Area Network (SD-WAN) is the application of software-based network technologies to WAN connections to more effectively route all network traffic between headquarters or data centers, remote and branch offices, and the cloud.
Tags : 
software-based networking, cloud data, sd-wan
    
VMware SD-WAN by VeloCloud
Published By: BrightRoll Exchange     Published Date: Apr 03, 2017
Take a peek at Yahoos proprietary data findings and the solutions available for QSR marketers.
Tags : 
qsr, qsr marketing, qsr customers, fast food, fast food marketing, casual dining marketing, customer, in-store traffic
    
BrightRoll Exchange
Published By: SAS     Published Date: Jun 05, 2017
For many of us, the term smart city conjures up images of sensors collecting data about everything from traffic patterns to energy use. Its common for government leaders to think, Thats not for us. Were not there yet. But if your organization is collecting data of any kind, you are in a position to use that data to create a smarter city for your citizens.
Tags : 
    
SAS
Published By: IBM     Published Date: Jul 11, 2012
This paper discusses the challenges of managing applications in highly dynamic IT environments such as public and private Clouds. Modern enterprise applications are engineered for agility and are frequently deployed over flexible IT infrastructures.
Tags : 
modern applications, architectures, infrastructure, cloud, dynamic it, web traffic, scalability, reliability
    
IBM
Published By: McAfee     Published Date: Apr 14, 2014
Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks..
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw
    
McAfee
Published By: Dyn     Published Date: Feb 06, 2015
Whether youre serving customers, partners, or internal users through two data centers or twenty, you want all users to have the best experience. Global load balancing (GLB) is the effective management and balancing of the Internet traffic to and from your data centers and cloud service providers and has become critical to growing enterprise ecommerce revenue, serving customers and empowering employee productivity.
Tags : 
glb, internet traffic, ecommerce revenue, employee productivity, cloud-based services, it management, enterprise applications, data management
    
Dyn
Published By: ThousandEyes     Published Date: Mar 14, 2017
Internet Outage Detection provides insights from global traffic and routing data into outages that cause path termination in ISPs and unreachable BGP prefixes.
Tags : 
    
ThousandEyes
Published By: Silver Peak     Published Date: Oct 28, 2013
In recent years, data deduplication has made its ways from the storage to the networking community. More specifically, it has become an important tool for optimizing application performance across the WAN. By eliminating the transfer of repetitive IP traffic, deduplication significantly improves WAN utilization and accelerates data transfers between geographically disperse locations. This saves bandwidth costs and helps to overcome many obstacles when communicating across a WAN. This paper discusses how WAN deduplication works, and how it can be effectively deployed as a complement to existing storage deduplication solutions.
Tags : 
wan, silver peak, deduplication, storage, data management
    
Silver Peak
Published By: Silver Peak     Published Date: Oct 28, 2013
Enterprises have long been battling the inherent performance limitations of Wide Area Networks (WANs) when delivering applications to remote offices. Caching emerged in the 1990s as a potential way of addressing this problem, accelerating the performance of specific applications, such as web services, while reducing overall WAN traffic. While caching achieved reasonable success for a few short years, the market for these point products ultimately subsided as a result of several operational and functional limitations. Enterprises require an application acceleration solution that spans all types of traffic, one that is easy to manage, and 100% data coherency when supporting business-critical applications. This white paper will address these issues and offer a solution that addresses these enterprise requirements. The result is a complete solution for improved application delivery across a distributed enterprise environment.
Tags : 
silver peak, network memory, application caching, wan, caching, networking
    
Silver Peak
Published By: AWS     Published Date: Oct 07, 2019
DigiCert implemented Imperva to protect their hybrid environment. They were already using Impervas WAF on-premises to defend against Layer 7 attacks, known threats, and zero-day attacks to rapidly identify the threats that required investigation. By expanding their usage of Imperva, DigiCert was able to extend protection to AWS and maintain their security posture both during and after migration. Impervas sophisticated threat detection technology draws upon vast experience in the WAF market. As traffic passes through their network, advanced client classification technology (together with crowdsourcing and IP reputation data) automatically analyzes it to identify and block web application attacks. These include SQL injection, cross-site scripting, illegal resource access, comment spam, site scraping, malicious bots, and other top threats. Granular filters and controls reduce false positives and prevent access from unwanted visitors, while IP address shielding hides the web servers IP
Tags : 
    
AWS
Published By: Splunk     Published Date: Apr 16, 2012
Read how Splunk enabled WhitePages, the largest on-line directory of people and businesses, to protect the site's content and the brand by monitoring abusive site traffic and learn how Splunk's in-house search eliminated a data warehouse investment.
Tags : 
splunk, whitepages, traffic, warehouse, data warehouse, directory, investment, threats data
    
Splunk
Published By: Cisco     Published Date: Jul 11, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco
Published By: Astrocom     Published Date: Dec 13, 2007
Enterprises with mission critical applications are exploring the benefits of disaster recovery sites for their data centers to ensure business continuity. Special network technology is needed to ensure that site failover and failback occurs reliably and predictably. An ideal solution should provide reliable network connections, manage inbound and outbound traffic over multiple WAN links, failover to a secondary data center if all links at the primary data center are down, and eliminate deployment barriers and costs of multi-homing with BGP (Border Gateway Protocol).
Tags : 
data center, datacenter, data centers, business continuity, disaster recovery, backup, recovery, failover
    
Astrocom
Published By: IBM     Published Date: Oct 10, 2013
With 2.5 billion employee-owned mobile devices in the workplace today, enterprises are struggling to capture the business benefits while bracing their IT infrastructure against data breaches and a deluge of mobile traffic. A new study reveals that the most mobile-savvy organizations are employing specific best practices, including mobile planning, integration, optimization and management to achieve mobile infrastructure maturity.
Tags : 
mobiles, mobile technology, technology leaders, ibm, global it, it leaders, mobility, wireless
    
IBM
Published By: Cisco     Published Date: Dec 21, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to see why securing the data center requires a solution that can: -Provide visibility and control over custom data center applications -Handle asymmetric traffic flows and application transactions between devices and data centers -Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco -Application-Centric Infrastructures (ACIs) and beyond -Address the entire attack continuum: before, during, and after an attack -Integrate with security deployed across the entire network -Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments
Tags : 
data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The four pillars of computing cloud, mobility, social, and analytics are driving new levels of network innovation in datacenter networks. These forces are now buffeting the datacenter along with virtualization and the Internet of Things (IoT), resulting in sweeping changes in traffic patterns that expose the limitations of traditional networks and their operational models. To become a resource rather than a bottleneck to overall datacenter performance, the network must deliver not just exceptional performance and scalability but also unprecedented automation and orchestration that can yield agility, flexibility, and service velocity. This Technology Spotlight examines these key trends and discusses the role that Cisco's Application Centric Infrastructure (ACI) plays in addressing these ongoing challenges for enterprise IT and network managers.
Tags : 
cloud computing, infrastructure, marketplace, application, hybrid, enterprise, it management, enterprise applications
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
While this dramatic growth occurs, projections call for the cloud to account for nearly two-thirds of data center traffic and for cloud-based workloads to quadruple over traditional servers. That adds another element to the picture: changing traffic patterns. Under a cloud model, a university, for example, can build its network to handle average traffic volumes but then offload data on heavier trafficked days to a public cloud service when demand dictates, such as when its time to register for the next semester of classes.
Tags : 
cloud, growth, traffic, projection, account, network, it management, enterprise applications
    
Cisco
Published By: VisiStat     Published Date: Mar 22, 2007
This report outlines five important "insider" secrets for measuring the effectiveness of your Website, along with tips on how to turn it into a lead generation machine.
Tags : 
website traffic, visitor tracking, web analytics, web metrics, site analysis, online marketing, site management, increase sales
    
VisiStat
Published By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : 
web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag
    
VisiStat
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
By redirecting traffic away from ISP outages and WAN link bottlenecks, Ecessa, with its PowerLink and ShieldLink family of affordable WAN Optimization Controllers help avoid critical WAN infrastructure problems. Ecessa optimizes WAN infrastructure as defined by 24/7 availability, high-performance, flexible scalability, and secure operations - while streamlining IT costs. PowerLink and ShieldLink simplify the management of network links, and optimize user access to datacenters and remote sites.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
    
Ecessa Corporation
Published By: SAS     Published Date: Apr 16, 2015
ITS technology is a general term. Two common and related forms of ITS communication technology using event stream processing are referred to as vehicle-to-vehicle (V2V) and vehicle to-infrastructure (V2X) in the US, and car-to-infrastructure (Car2X) in Europe. The two types of connected-car research and development programs often overlap and can be integrated. Car2X enables vehicle communication with the road transportation infrastructure and provides the ability to send or receive local information about traffic conditions, geo-markers (e.g. to identify pothole locations), road hazards, alerts, safety vehicles, etc. V2V focuses on connected-car technology and the anonymous communication of sensor data continuously transmitted to and from cars. Using event stream processing, this streaming data enables the real-time synthesis of information to communicate what will improve and promote driver safety, reduce crashes, and improve vehicle transportation efficiency.
Tags : 
    
SAS
Published By: HP and Intel Xeon processors     Published Date: Oct 30, 2012
Server virtualization initiatives are reshaping data center traffic flows, increasing bandwidth densities at the server edge and pushing conventional data center networks to the brink. This white paper reviews the impact of server virtualization.
Tags : 
virtualization, data management, it infrastructure, cloud computing, infrastructure
    
HP and Intel Xeon processors
Published By: Idera     Published Date: Oct 18, 2012
Download this paper to learn how implementing basic performance enhancements can provide tremendous improvements to the operation and performance of SharePoint within the enterprise.
Tags : 
sql, servers, database traffic, data connectivity, microsoft sharepoint, data management, data center
    
Idera
Published By: Cisco     Published Date: Apr 07, 2014
This report consists of research and important statistics in an effort to forecast the growth of global data center and cloud-based IP traffic.
Tags : 
cisco, global cloud index, forecast, research, ip traffic, data center virtualization, data center
    
Cisco
Start   Previous    1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.