IT Systems  >   Communications Networks  >   Internet  >  

Mid-Level Networks

RSS Feed    Add to Google    Add to My Yahoo!
Mid-Level Networks White Papers (View All Report Types)
 
Using the CyrusOne IX for Active-DR Interconnection
sponsored by CyrusOne
WHITE PAPER: Effective DR strategies rely on highly connected data centers. Discover in this white paper how to situate your large-scale production environments within Web-scale carrier-neutral data centers, therefore maintaining the highest DR reliability.
Posted: 28 Mar 2016 | Published: 28 Mar 2016

CyrusOne

Simplify Unified Communications Management
sponsored by IR
WHITE PAPER: Maintaining communications and collaboration within your enterprise can be complex and expensive. Discover why some companies are turning to service providers to keep their business running and overcome 5 common UC challenges.
Posted: 13 May 2016 | Published: 13 May 2016

IR

The Global Evolving Workforce Study
sponsored by Dell, Inc. and Intel®
WHITE PAPER: The following extensive white paper examines the evolving workplace in relation to new technologies permeating the business environment. View now and gain an understanding of the change taking place, how it affects technology adoption, workspace ergonomics, career evolution, and much more.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

Dell, Inc. and Intel®

Effectively Manage Multi-Vendor Communications Environments
sponsored by IR
WHITE PAPER: Does your organization experience voice quality issues during global conferences? Learn now about ways to bring insight and control to complex, multi-vendor, multi-technology unified communications environments.
Posted: 20 May 2016 | Published: 20 May 2016

IR

The Real Impact of IT Downtime
sponsored by LogicNow
WHITE PAPER: This white paper discusses the real impact of IT downtime. Uncover the 4 critical ways IT downtime affects you, your employees, and your customers, and learn best practices to avoid downtime.
Posted: 23 Feb 2016 | Published: 23 Feb 2016

LogicNow

What’s the Real Value Behind UC?
sponsored by Mitel Networks Limited
WHITE PAPER: This paper explores the most popular reasons for committing to a UC future, and how different organizations have gained real value out of UC strategies.
Posted: 18 Apr 2016 | Published: 31 Dec 2015

Mitel Networks Limited

Using Static Source Code Analysis to Develop Secure Embedded Software
sponsored by Programming Research
WHITE PAPER: When it comes to embedded software, it's critical to address the root causes of security issues rather than just the symptoms of the problem. This resource explains how static analysis tools can simplify and automate code review to eliminate mistakes before they become integrated into the code base.
Posted: 08 Mar 2016 | Published: 08 Mar 2016

Programming Research

Migrate to SIP with Confidence
sponsored by Level 3 Communications, Inc.
WHITE PAPER: It's important to enable reliability and security for conversations with customers, colleagues and partners in order to ensure clear and concise communication across all platforms. Download this infographic to learn how SIP can help you optimize your voice communication network.
Posted: 15 Mar 2016 | Published: 30 Dec 2015

Level 3 Communications, Inc.

5 Data Quality Problems in Every CMDB
sponsored by BDNA
WHITE PAPER: Explore why clean data is essential for your configuration management database (CMDB). Uncover the top 5 data quality problems in every CMDB and how you can address these challenges.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

ISM Essentials Guide – Threat Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.
Posted: 18 Dec 2012 | Published: 18 Dec 2012

SearchSecurity.com

Speak SMB Security: How You Can Be a Security Thought Leader
sponsored by OpenDNS
WEBCAST: In this webcast, learn best practices for defending against the new crime ecosystem and what SMBs need to do to stay protected. Download now to discover why cybercrime is easier than ever and 3 steps for securing your customers.
Posted: 09 Feb 2016 | Premiered: Dec 18, 2015

OpenDNS

What Are the Best Ways to Improve SMB Security?
sponsored by CDW
EGUIDE: Expert Mike O. Villegas advises SMBs on security defenses. Uncover control measures to improve security, such as: defining data breach notification requirements, using firewalls, antivirus software, and up-to-date patches, and more.
Posted: 19 May 2016 | Published: 18 May 2016

CDW

Small and Midsize Business guide to Mobile Security
sponsored by SearchSecurity.com
WHITE PAPER: In this mobile security FAQ for small to midsize businesses, hear the answers to all of your pressing questions about the mobile threat landscape and what you can do to protect your mobile workforce. Discover how vulnerable SMBs are to mobile threats, tips for evaluating your solution options, and more.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

SearchSecurity.com

Building a Business Case
sponsored by SearchSecurity.com
WHITE PAPER: Small to midsize organizations that fail to adopt adequate mobile security measures may soon be out of business. This expert white paper outlines the business case for mobile security among SMBs; also inside, discover the key features your solution needs, and the benefits of a cloud-based approach to mobile security.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

SearchSecurity.com

Internet of Things: Enterprise Risks, Platform Options to Consider
sponsored by Xively by LogMeIn
EGUIDE: The Internet of Things (IoT) increases the number of security risks businesses face, becoming a backdoor for attackers into the enterprise. Discover 7 key security risks associated with IoT and how to manage them. Plus learn how robust cloud platforms will allow IoT to reach its potential.
Posted: 10 Jun 2016 | Published: 03 Jun 2016

Xively by LogMeIn

DigiWorld Yearbook
sponsored by ComputerWeekly.com
RESEARCH CONTENT: IDATE's DigiWorld Yearbook provides an annual analysis of the recent developments shaping the telecoms, internet and media markets, identifying major global trends and scenarios.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

ComputerWeekly.com

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

Why Businesses Are Adopting Network Virtualization
sponsored by VMware
WHITE PAPER: Discover how network virtualization can help your enterpriseachieve major advances in simplicity, speed, agility, and security, by automatingand simplifying many of the processes that go into running a data center network.
Posted: 09 May 2016 | Published: 09 May 2016

VMware

Achieve Deeper Network Security and Application Control
sponsored by Dell Software
WHITE PAPER: Combating emerging threats effectively while reducing the total cost of ownership (TCO) is crucial in a firewall. Read this paper and learn how NGFWs help you achieve a deeper level of security and safeguard your organization against today's evolving threats.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software

The State of Software-Defined WAN
sponsored by Silver Peak
WHITE PAPER: This resource explores key trends in software-defined networks and offers in-depth advice on how to address the limitations of today's VPN. Read on to see how software-defined WANs could help your company maximize its investments with the cloud.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

Silver Peak

WAN Speak Musings – Volume II
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.
Posted: 01 Jul 2013 | Published: 01 Jul 2013

ComputerWeekly.com

Wireless LAN ITDC - Checklist #3
sponsored by SearchSecurity.com
EGUIDE: This is the third piece in SearchNetworking.com's three-part guide on wireless products. This expert asset takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing a wireless solution.
Posted: 23 Oct 2012 | Published: 23 Oct 2012

SearchSecurity.com

WAN Speak Musings – Volume VI
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bernt Ostergaard look at the key issues affecting network design and management in this continuing series of articles.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

ComputerWeekly.com

Can New Security Tools Keep Your Network Clean?
sponsored by SearchSecurity.com
EZINE: This issue provides network and security IT pros with step-by-step guidance so they can decide what advanced security monitoring tools are right for their network's particular needs.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

SearchSecurity.com

National Fibre Strategies
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Arthur D Little assess five strategic models for deploying national fibre optic telecommunications networks that have been implemented by countries around the globe.
Posted: 07 Jun 2013 | Published: 07 Jun 2013

ComputerWeekly.com

Uncover The Advantages Behind Standardized MSP Reports
sponsored by Solarwinds N-able
WHITE PAPER: Discover why professional, standardized reports have emerged as a key success factor for many MSPs and IT services providers, helping prove relevance and demonstrate the value of service delivered to their clients. View now to learn how such reporting can help you gain the title of "Trusted Advisor."
Posted: 06 Dec 2012 | Published: 06 Dec 2012

Solarwinds N-able

Myth vs. Reality: Cloud-Managed Wireless LAN and the Primary Access Network
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide debunks common misconceptions associated with cloud-managed wireless LAN (WLAN) offerings. Separate fact from fiction and discover the opportunity of next-generation WLAN by reading on now.
Posted: 13 May 2013 | Published: 13 May 2013

SearchSecurity.com

Advanced cyber-security intelligence
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

WAN Speak Musings – Volume III
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

ComputerWeekly.com

FM, IT and Data Centres
sponsored by ComputerWeekly.com
ANALYST REPORT: Are Facilities and IT data centre managers implacable enemies, or is it a case of different work priorities, asks analyst Clive Longbottom.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

An Introduction to Software Defined Networks
sponsored by Citrix
WHITE PAPER: This white paper serves as an introduction to SDN as a solution that can serve your enterprise, but only after you parse the competitive landscape of networking suppliers.
Posted: 02 Sep 2015 | Published: 31 Dec 2014

Citrix

Future-Proofing the Data Center: A New Architecture for Innovation and Investment Protection
sponsored by Juniper Networks, Inc.
WHITE PAPER: Explore how carrier-class routers can help future-proof your data center infrastructure while improving application delivery, availability, and manageability.
Posted: 28 Oct 2015 | Published: 31 Dec 2014

Juniper Networks, Inc.

Special report on EMC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on EMC, its strategy, products and services and financial performance.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement