ip networks

Results 351 - 375 of 412Sort Results By: Published Date | Title | Company Name
Published By: MASERGY     Published Date: Jul 20, 2007
This paper will explore the problems inherent in an overlay management approach and describe a new approach that allows for the management of the wide-area network to be not only offered as a service, but actually embedded in the network itself, resulting in several incremental benefits to the enterprise.
Tags : 
ip services, ip networks, network management, voip, it management, system management software, smb network, smb networks, small business networks, wan, wans, wide area network, provider, masergy
    
MASERGY
Published By: AT&T     Published Date: Jun 25, 2008
Mobile applications are transforming how companies operate. With new ways to work flexibly, employees are becoming more responsive and more productive. But enterprises have experienced only the start of what IP networks will bring to mobile working.
Tags : 
mobile workers, mobile applications, productivity, mobile, wireless, pda, att, at&t
    
AT&T
Published By: AT&T     Published Date: Jun 25, 2008
IP Multimedia Subsystem (IMS) is an open international standard for Next Generation Networking. It supports the delivery of Voice over IP (VoIP) and various multimedia services. IMS is not in itself a service, but an architecture for service delivery. IMS was originally developed by wireless carriers within the context of the Third Generation Partnership Project (3GPP) in 2002. Since then, its advantages have led to the adoption of IMS by wireline carriers.
Tags : 
voip, voice over ip, ip telephony, ip networks, wireless ip, wireless technology, at&t, att, wireless communications
    
AT&T
Published By: Solarflare Communications Inc.     Published Date: Sep 14, 2007
This white paper discusses how utilizing copper cabling in the data center can lead to high performance networking, along with other beneficial features.
Tags : 
data center, semiconductor, 10 gbe, copper cabling, solarflare, network performance, network performance management, ip networks, twisted pair, untwisted pair, networking, gigabit
    
Solarflare Communications Inc.
Published By: Solarflare Communications Inc.     Published Date: Nov 08, 2007
This paper will highlight the improvements that SolarStorm's virtualization acceleration can provide, not only in networking I/O performance, but also in server efficiency.
Tags : 
data center, semiconductor, 10 gbe, copper cabling, solarflare, network performance, network performance management, ip networks, twisted pair, untwisted pair, networking, gigabit
    
Solarflare Communications Inc.
Published By: TamoSoft     Published Date: Feb 14, 2008
This white paper covers the VoIP basics, deployment and usage of a VoIP solution over both wireless (Wi-Fi) and wired (Ethernet) network infrastructures, guidelines on efficient monitoring and analyzing VoIP network traffic, troubleshooting various VoIP problems, etc.
Tags : 
voip, wifi, voip deployment, voip monitoring, voip network, ip network, ip telephony, voice over ip, tamosoft
    
TamoSoft
Published By: Easynet     Published Date: Mar 26, 2008
With demand for freight transportation services continuing to grow faster than GDP growth in Europe, the logistics industry has structured itself around the provision of very specific value-added services beyond just transportation. Many logistics companies are vying to capture new opportunities in the area of value-added services. Find out how in this IDC paper.
Tags : 
information management, voice over ip, vpn, business process management, logistics, managed networks, voip, bpm, easynet
    
Easynet
Published By: Signiant Inc.     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery
    
Signiant Inc.
Published By: Network Automation     Published Date: Dec 02, 2008
AutoMate BPA Server 7 is a revolutionary advance in the automation of systems and applications across multiple-machine networks. No other automation software has the power and range of capabilities offered by AutoMate BPA Server, while also making automation so easy and intuitive.
Tags : 
network automation, automate bpa server 7, server management console
    
Network Automation
Published By: Network Automation     Published Date: Dec 02, 2008
A rare combination of power and simplicity, AutoMate BPA Server is a major advance in the automation of systems and applications acrossmultiple-machine, crossplatform networks.
Tags : 
network automation, automate bpa server, crossplatform networks
    
Network Automation
Published By: BMC ESM     Published Date: Mar 01, 2009
Free utility finds the fragmentation that's crippling your network! New Disk Performance Analyzer for Networks 2.0 takes the guesswork out of tracking networked system performance. This revolutionary utility scans networked systems' performance from one single access point. It equips administrators with an arsenal of performance data, so they can zero in on systems' fragmentation and slows. This second edition comes with a series of improvements which afford users more control and flexibility. Systems can be selected from the Active Directory or IP Address. And this cutting-edge tool supports custom grouping. So, repeated scans are easy to set up and run. Performance reports can also be scheduled for off-peak hours. Results will be automatically sent to your e-mail address. Performance reports are now exported to a MicrosoftT SQL database for easy sorting and querying. Don't let low-functioning systems go unnoticed. Get Disk Performance Analyzer for Networks 2.0 free now!
Tags : 
    
BMC ESM
Published By: Focus     Published Date: Aug 04, 2011
Download this white paper, sponsored by Juniper Networks, to read an interview with IDC's Vice President of Enterprise Communications and Datacenter Networks about the future of network architectures.
Tags : 
data center, data center design, information technology, juniper, networking, traffic spikes, virtualization
    
Focus
Published By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : 
backup infrastructure, legacy systems, overload infrastructure, cloud
    
Arcserve
Published By: HP and Intel® Xeon® processors     Published Date: May 08, 2012
This EMA paper reviews the HP IRF approach and examines potential savings and efficiencies that it enables specific to the design, deployment, and ongoing operations management of Ethernet networks.
Tags : 
smb, networks, operations, ethernet, ema, design, ethernet networks, ip networks, sustained growth, savings, efficiencies
    
HP and Intel® Xeon® processors
Published By: Infoblox     Published Date: Dec 28, 2012
Download this whitepaper guide to discover how to design a phased approach for adopting IPv6 on your own network.
Tags : 
ipv6, networks, methodology, success, infoblox, ipv6 adoption
    
Infoblox
Published By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : 
distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance, ddos mitigation
    
Arbor
Published By: Juniper Networks     Published Date: Sep 10, 2014
To understand how to improve business agility with a virtualized data center, get our Infographic. Find out the top reasons for investing in data center virtualization, the challenges and the opportunities for success.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
Understand the changing threat landscape and how to secure your business against Distributed Denial of Service attacks with our Whitepaper. Read about the latest detection and mitigation strategies to ensure always-on protection.
Tags : 
security, ddos attacks, detection, prevention, mitigation strategy, always on-protection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
Concerned about attacks on web-facing applications? Download the Whitepaper to understand the limitations of next-generation firewalls and learn about three technologies that protect web applications and data centers.
Tags : 
next generation firewalls, application attacks, web-facing applications, firewall limitations, protection technology
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
Get insight into the innovative solutions demanded by data center security in IDC’s Whitepaper. Read about the unique challenges enterprises face in securing data centers, and how Juniper Networks security technologies meet these.
Tags : 
security challenges, data center demand, innovative solutions, security technologies, innovative solutions
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
Discover how a dynamic, intelligent firewall can improve your security with our Webinar. Learn about the dynamic, intelligent protection and active defense and management of resources you can get from a Next-Generation Firewall.
Tags : 
next generation firewall, intelligent firewall, security, intelligent protection, active defense, active management
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
Watch our Webinar to find out more about the capabilities offered by connecting networks to IT automation tools as well as capabilities offered by SDN solutions. Find out if you need to employ just one or both of these technologies.
Tags : 
sdn, network automation, it automation, network connection, sdn solutions, automation tools, it capabilities
    
Juniper Networks
Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data
    
Cisco
Published By: GENBAND     Published Date: Apr 01, 2014
See how GENBAND offers CIOs of large multi-site enterprises effective ways to reduce telecom spend by leveraging their IP data networks for inter-site, intra-enterprise multimedia communication and consolidation of connectivity to service providers.
Tags : 
genband, enterprise, telecom, ip data networks, service provider networks
    
GENBAND
Published By: Windstream     Published Date: Apr 17, 2013
One of the great challenges in deploying a Unified Communications (UC) solution is determining the ROI for the expenditure. Learn how Windstream Communications will work with you to understand how your business operates and has the ability to integrate UC into your business processes.
Tags : 
windstream, windstream communications, unified communications, ip networks, voip, communications, wireless, roi, it budget
    
Windstream
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.