IT Management  >   Systems Operations  >   Networking  >   Switching  >   WAN Switching  >   Cell Switching  >  

ATM Switching

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Asynchronous Transfer Mode, ATM
DEFINITION: A switching technology that allows voice, data, image, and video traffic to be combined into evenly sized cells for high-speed transmission over one access circuit. Each 53 byte cell contains 48 bytes of payload and 5 bytes of control information.
ATM Switching Reports
226 - 250 of 2560 Matches Previous Page  |  Next Page
Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

Avoiding the Pitfalls when Transitioning into Managed Services
sponsored by AVG Technologies
WHITE PAPER: This white paper can help you navigate that complexity of transitioning to managed services and avoid the pitfalls some businesses face when doing so.
Posted: 12 May 2015 | Published: 12 May 2015

AVG Technologies

Bare Metal Clouds: The Pros and Cons of a Non-Virtualized Option
sponsored by IBM
WHITE PAPER: This informative guide explores the pros and cons of a "bare metal cloud" – a cloud service that is not virtualized.
Posted: 06 Jun 2014 | Published: 17 Jan 2014

IBM

Battle of the Ethernet Switches: Cisco vs. NETGEAR
sponsored by IT Central Station
ESSENTIAL GUIDE: Have you ever wondered exactly how many options there are for purchasing enterprise level Ethernet switches? Take a look at this comprehensive list of all enterprise Ethernet switches in this expert report which includes real user reviews from IT professionals, like you.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Best Practice Security in a Cloud-Enabled World
sponsored by IBM
WHITE PAPER: Access this white paper to learn about a straightforward approach to cloud security that will not only assist in mitigating the risks associated with cloud deployments and usage, but also improve and standardize your security posture and practices across all environments.
Posted: 29 Oct 2014 | Published: 31 Jul 2014

IBM

Best practices for enterprise systems management
sponsored by TechTarget
RESOURCE: Access this exclusive guide that compiles key tips and tricks for minimizing top systems management and maintenance challenges in today's organizations. Ensure your IT infrastructure continues to run smoothly with help from the SearchDataCenter.com editorial team.
Posted: 12 Jun 2014 | Published: 25 Sep 2014

TechTarget

Best practices for introducing tablets in your enterprise
sponsored by SearchSecurity.com
EGUIDE: There is a lot of hype around tablets, but many companies are still weighing their benefits. This expert e-guide explores the top reasons businesses should consider these devices and offers advice for keeping them secure once they have been implemented.
Posted: 20 May 2011 | Published: 20 May 2011

SearchSecurity.com

Backup
sponsored by Panasas, Inc.
WHITE PAPER: The explosion of unstructured data and the advent of scale out NAS systems has caused backup of these systems to be an ever growing concern. This white paper describes the overall strategy for backup and restore taking into account the tape subsystem, networking, file system workload and administrative policy.
Posted: 12 Aug 2010 | Published: 12 Aug 2010

Panasas, Inc.

Balancing wireless LAN troubleshooting strategies for BYOD
sponsored by Extreme Networks
EGUIDE: This expert E-Guide highlights the variety of tools available for proactive and responsive BYOD troubleshooting.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Extreme Networks

Baseline Discovery Audit Datasheet
sponsored by BMC-Accenture
WHITE PAPER: This exclusive resource presents a baseline discovery auditing solution to help you gain insight into key infrastructure and application dependencies in your environment, before embarking on cloud, automation, or proactive operations initiatives.
Posted: 29 Aug 2011 | Published: 29 Aug 2011

BMC-Accenture

Be a Superhero: Use Application & Infrastructure Visibility to Gain Competitive Advantage
sponsored by IBM
VIRTUAL TRADESHOW: Access this resource to learn how to optimize operations, performance, analytics, automation and delivery of your IT services in today's complex on-premise, hybrid and cloud environments. You'll be able to select from a wide array of content in different media formats to help you make smarter decisions now and for your organization's future.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

IBM

Be a Superhero: Use Application & Infrastructure Visibility to Gain Competitive Advantage
sponsored by IBM
VIRTUAL ENVIRONMENT: Access this resource to learn how IBM can help you with the Operations, Performance, Analytics, Automation and Delivery of your IT services in today's complex on-prem, hybrid and cloud environments. You'll be access a wide array of content in different media format to help you make smarter decisions now and for your organization's future.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

IBM

Benefits of IPControl Deployment
sponsored by BT Diamond IP
CASE STUDY: Implementation of IPControl led to an immediate € 40,000 reduction in network maintenance costs.
Posted: 08 Feb 2008 | Published: 30 Jan 2008

BT Diamond IP

Benefits of Unified Messaging in Exchange Server 2007
sponsored by Global Knowledge
WHITE PAPER: Unified Messaging integrates different streams of communication (e-mail, fax, video, SMS, voice, etc.) into a single, or, unified message store, that is accessible from a wide range of different devices.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Best in Class Application Aware Network Performance Management (AANPM)
sponsored by Fluke Networks
WHITE PAPER: This guide explores the importance of end-to-end visibility and how effective application aware network performance management (AANPM) can lead to optimal application and network performance.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

Fluke Networks

Best Practice Guidelines for SAP Solutions on VMware® Infrastructure
sponsored by VMware and Intel
WHITE PAPER: This paper provides best practice guidelines for deploying SAP software solutions on VMware Infrastructure 3.
Posted: 24 Oct 2008 | Published: 24 Oct 2008

VMware and Intel

Best Practice Tips on Building a Unified Communications Business Case
sponsored by ShoreTel - OLD
WHITE PAPER: Unified communications (UC) is not so much a system as it is a way of thinking about the impact of the next generation of communications capabilities on businesses large and small. Use this guide to find the best UC solution for your organization, exploring the benefits and identifying the preferred modes and means of communication.
Posted: 16 May 2011 | Published: 16 May 2011

ShoreTel - OLD

Best Practices for Assuring VoIP Performance
sponsored by AppNeta
WHITE PAPER: Since no two networks are exactly the same, no two network assurance programs will be either. Fortunately, PathView Cloud adapts to your needs, and provides a complete approach.
Posted: 07 Sep 2011 | Published: 07 Sep 2011

AppNeta

Best practices for building a cloud computing infrastructure
sponsored by SAVVIS
EGUIDE: This e-guide takes a close look at what you need to know about building a cloud computing infrastructure to serve dual purposes and top recommendations to get started. Uncover the key to successful cloud computing infrastructure, best practices to build a private cloud and things you should know about the cloud before you begin.
Posted: 12 Sep 2011 | Published: 12 Sep 2011

SAVVIS

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: To maintain application performance and availability, enterprises must upgrade their application delivery controller (ADC) and SSL infrastructure. Specifically, consideration should be given to selecting an ADC, like Citrix NetScaler.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Citrix

Best Practices for Implementing 2048-Bit SSL
sponsored by Citrix
WHITE PAPER: The role of secure sockets layer (SSL) technology is no longer a luxury, it is now a crucial part of all networking systems. This guide explores some best practices for implementing 2048-bit SSL and how it can benefit your network infrastructure.
Posted: 03 Jan 2014 | Published: 31 Dec 2011

Citrix

Best Practices for IT Consolidation with HP and VMware
sponsored by VMware, Inc.
WHITE PAPER: Underutilized servers take up valuable data center floor space, consume scarce power and cooling resources, and drive up management costs. This white paper shows you how virtualization can help.
Posted: 19 Nov 2008 | Published: 18 Nov 2008

VMware, Inc.

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: It is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Best practices for managing continual data center growth
sponsored by HP
EGUIDE: Companies planning to expand their data center have many elements to consider. Download this e-guide and evaluate what the best strategy is for your upcoming data center project.
Posted: 15 Feb 2012 | Published: 10 Feb 2012

HP
226 - 250 of 2560 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement