devices

Results 1726 - 1750 of 1773Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jan 28, 2009
Building a small office network means starting with a foundation of switches and routers. The following guide will help you understand the difference between switches and routers and develop a clear vision for what your network foundation needs. Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;}
Tags : 
small office network, cisco, switches, routers, multiple devices, multiple networks, integrated messaging, voip
    
Cisco
Published By: Cisco     Published Date: Jan 28, 2009
When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. The network operates by connecting computers and peripherals using two pieces of equipment; switches and routers. Switches and routers, essential networking basics, enable the devices that are connected to your network to communicate with each other, as well as with other networks. Though they look quite similar, routers and switches perform very different functions in a network.
Tags : 
cisco, networking basics, routing and switching, essential networking basics, switches, routers, virtual private network, vpn
    
Cisco
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
One of the unfortunate effects of the continued evolution of the load balancer into today's application delivery controller (ADC) is that it is often too easy to forget the basic problem for which load balancers were originally created-producing highly available, scalable, and predictable application services. This White Paper describes the Evolution of load balancing devices to Application Delivery Controllers.
Tags : 
application delivery controller, load balancer, load balancing
    
F5 Networks Inc
Published By: Dell Storage     Published Date: Jan 16, 2009
Most storage devices support multiple SAN connections for performance and reliability, but in many configurations servers use only a single storage connection. This creates a single point of failure and potential performance bottleneck for I/O. Multipath Input/Output (MPIO) is server software that extends redundancy to the entire I/O pathway in a SAN, delivering fault tolerance, high availability, and better performance.
Tags : 
dell, san connections, storage area networks, configuration servers, mpio, multipath input/output
    
Dell Storage
Published By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : 
quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip
    
Quocirca
Published By: Tail-f Systems     Published Date: Oct 01, 2008
The complexity and size of networks are increasing dramatically. This is placing new demands on network operators to deploy networks in an affordable and effective manner. NETCONF is a new IETF standard that is redefining the way in which network devices are configured using a highly-scalable, XML-based, machine-to-machine protocol. This webinar will provide a technological update on NETCONF.
Tags : 
netconf, ietf standard, xml-based network management, configuration management
    
Tail-f Systems
Published By: Quocirca     Published Date: Sep 18, 2008
Whether we like it or not we are all IT users now. Through the ubiquity of networks of devices that we rely on for information, security and day-to-day transactions even those who eschew technology now rely on it, even if they do not acknowledge it. The failure of these networks can lead to widespread disruption, unhappy customers, unproductive employees and lost business. Ensuring their availability, security and efficiency is a job for experts who need powerful tools to carry out the task.
Tags : 
quocirca, service management, high availability
    
Quocirca
Published By: Quocirca     Published Date: Sep 18, 2008
Businesses of all sizes have to manage an increasing diversity of remote users and devices. The task ranges from simply keeping systems running to ensuring security, compliance and the achievement of environmental goals. Under this sort of pressure, IT managers and managed service providers, to which the task is often outsourced, must have flexible access to powerful tools and an ability to share the data those tools rely on.
Tags : 
quocirca, remote, it management
    
Quocirca
Published By: Tail-f Systems     Published Date: Sep 16, 2008
The key issues involved in developing on-device network management systems for carrier-grade enterprise and operator networks are the same for any other networked resource, only with more complexity and built-in restrictions due to the limited space and processing capabilities inherent to these types of devices.
Tags : 
network management, on-device network management systems, carrier-grade requirements, high availability, network scalability, tail-f, tailf
    
Tail-f Systems
Published By: BlackBerry     Published Date: Aug 26, 2008
It's important that corporate mobile policies cover everything from what types of devices will be available to users, how and when they can use them, what corporate resources they are able to access and what security measures will be instituted. Furthermore, Mobile managers must not ignore the impact of government regulations and compliance when laying out their corporate mobile policies.
Tags : 
blackberry, mobile policies, vpn, mobile devices, microsoft exchange, mobile device management, mobile device management software, mobile workers
    
BlackBerry
Published By: NewField IT     Published Date: Aug 19, 2008
As offices review their office printing costs, one significant area almost entirely overlooked is the cost of having A3 devices. The perception is that the A3 document is as necessary to our office printing needs as power-steering is to our cars. The reality, as evidenced by NewField IT's review of more than 70,000 devices supporting over 200,000 users, is that A3 output in the office is remarkably low – less than 2.5% of total page volumes on average.
Tags : 
    
NewField IT
Published By: NewField IT     Published Date: Aug 19, 2008
The printer salesman began his pitch: "Once upon a time there was a poor, dull document that was of interest to no-one. Its vital information was ignored by one and all, and it stayed unloved and unlovely at the bottom of a drawer in the kingdom of Officeland." NewField IT is an independent consultancy practice with primary data covering 28 countries and over 70,000 devices. In this paper, they take an impartial look at the use of colour in an office, its advantages and the cost to a business.
Tags : 
    
NewField IT
Published By: Utimaco     Published Date: Aug 18, 2008
If company laptops, PDAs, or other mobile devices can't be found, it doesn't always mean that they've been stolen. Companies often lose track of these IT assets because there's no clear record of them. Encryption and inventory management can help to safeguard against the loss of confidential data.
Tags : 
leak, leakage, data protection, encryption, asset management, mobile, laptop security, mobile security
    
Utimaco
Published By: Managed Systems, Inc.     Published Date: Aug 14, 2008
No matter the size of the business, technology plays a critical role in its financial success. At the most basic level, companies have to deal with desktop and laptop computers for all their employees, e-mail, access to the Internet, Blackberries, and other kinds of on-site and remote devices. Add networking issues like viruses, spam and bandwidth utilization, and suddenly, this effort becomes a major challenge to anyone operating a small or mid-sized business (SMBs) with limited resources and a limited budget.
Tags : 
network management, smb, small business, medium business, mid-sized business, smb networks, managed systems, it services
    
Managed Systems, Inc.
Published By: Vertica     Published Date: Jul 23, 2008
Read how Comcast, the largest cable communications company in the U.S., is using Vertica Analytic DBMS able to quickly collect and analyze data being generated by millions of network devices to ensure quality of service and accuracy of capacity planning to ensure a consistently good customer experience.
Tags : 
vertica, comcast, data analysis, proliant, rdmbs, networking, telecommunications
    
Vertica
Published By: Dynapar Corp.     Published Date: Jun 22, 2008
In most drilling applications encoders are used to provide position and speed feedback for proper control of equipment like top drives and pipe racking systems. However, these electronic devices require special attention when used in hazardous environments such as a drilling platform. In this paper, we discuss ways to make encoders suitable for hazardous duty.
Tags : 
dynapar, encoder, sensor, motion feedback, product design, engineer, engineering, encoder output
    
Dynapar Corp.
Published By: BlackBerry     Published Date: Jun 11, 2008
By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise: namely, increased productivity, improved efficiency and improved response times resulting in decreased costs and increased revenue opportunities. But with these advantages come risks, and most have to do with controlling the data contained on wireless devices and the networks and applications to which they connect.
Tags : 
blackberry, corporate mobile policy, enterprise solution, crm, microsoft exchange, mobile device management, mobile device management software, mobile workers
    
BlackBerry
Published By: CommonTime     Published Date: Apr 02, 2008
Many companies that have already invested in IBM Lotus Domino/Notes for their business communications now look to achieve the business benefits that are delivered by mobility solutions. To address this challenge, CommonTime has partnered with Microsoft® to combine key elements our best-of-breed Lotus Domino/Notes mobility solution for Windows Mobile devices with Microsoft’s System Center Mobile Device Manager 2008 (MDM).
Tags : 
wireless device management, mobile device management, mobile workers, asset management, commontime
    
CommonTime
Published By: IBM     Published Date: Mar 11, 2008
More and more employees are working remotely or traveling around the world to meet with colleagues, customers and partners. Jobs are no longer tied to a specific physical location, and people have come to rely on devices such as mobile phones, personal digital assistants (PDAs) and laptops to stay connected and productive.
Tags : 
ibm, convergence, collaboration, pda, unified communications, productivity
    
IBM
Published By: Salesforce.com     Published Date: Mar 11, 2008
This 34 page guide readies you for a Salesforce Mobile rollout. Salesforce Mobile helps your mobile teams succeed by keeping them in touch with the latest data, whenever and wherever they need it, directly from mobile devices. With Salesforce Mobile, field professionals are prompted to log information directly in Salesforce or AppExchange apps immediately after important customer calls, emails, and appointments, so critical information is logged in near real time.
Tags : 
salesforce, crm, customer relationship management, sales tools, collaboration, smart phones, blackberry, appexchange
    
Salesforce.com
Published By: Motorola     Published Date: Feb 06, 2008
This paper details the importance of striking a balance between the lock-down management of your mobile solutions and allowing end users the freedom to use mobile devices in the way that works best for them.
Tags : 
motorola, motorola good, smart phone, smart phones, user experience
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
The need for the services provided by Specially for Children has continued to increase, placing extra demands on the group's physicians. To improve their efficiency, doctors began carrying multiple devices including cell phones, pagers and PDAs. Learn how Good Mobile Messaging helped the organization streamline its operation.
Tags : 
motorola, motorola good, case study
    
Motorola
Published By: ESET     Published Date: Feb 01, 2008
With the ever evolving threat landscape, what will 2008 hold for IT Managers?  This podcast provides a high level overview of a few trends to watch for this year.
Tags : 
2008 predications, it security predictions, it security, mobile devices, laptops, endpoint, operating systems, antivirus
    
ESET
Published By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : 
monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management
    
netForensics
Published By: TeraCloud     Published Date: Dec 11, 2007
Storage spawns where it is needed. This leaves IT to manage many islands of storage devices scattered across the enterprise. Compliance requirements, multimedia-rich applications, unstructured content and a proliferation of databases are pushing IT departments to increase the size and complexity of their storage networks. All of this is occurring at a time when the need for centralized storage management has never been greater.
Tags : 
storage, storage management, infrastructure, compliance, tsa, teracloud, teracloud storage analytics, san
    
TeraCloud
Start   Previous    57 58 59 60 61 62 63 64 65 66 67 68 69 70 71    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.