Hardware  >   Networking Hardware  >   Internetworking Hardware  >   Gateways (Hardware)  >  

Residential Gateways

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: RGW
DEFINITION: Devices that connect either multiple computers in the home to a single Internet connection or all internal home networks (telephone, LAN, cable TV, etc.) to their external counterparts.
Residential Gateways Reports
226 - 250 of 445 Matches Previous Page  |  Next Page
ING-DiBa future-proofs, migrates from Solaris to Red Hat Enterprise Linux
sponsored by Red Hat
CASE STUDY: Access this case study to learn why one bank chose to migrate their systems to Red Hat Enterprise Linux.
Posted: 17 Jul 2015 | Published: 29 Nov 2013

Red Hat

Integrated infrastructure simplifies desktop virtualization management and deployment
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: Access this white paper to learn how integrated infrastructures – a combination of servers, networking, storage, and management platforms – alleviate desktop virtualization issues. Explore the characteristics of an ideal integrated infrastructure and discover an integrated system that can simplify the deployment and management of your VDI project.
Posted: 10 Jun 2015 | Published: 31 Jul 2014

Cisco Systems, Inc and Citrix

Intervention areas for superfast broadband project Connecting Cumbria
sponsored by ComputerWeekly.com
DATA SHEET: UK broadband roll-out: Download this Excel spreadsheet detailing the intervention status of postcodes across Cumbria
Posted: 15 Oct 2013 | Published: 15 Oct 2013

ComputerWeekly.com

Is Network Functions Virtualization (NFV) Moving Closer to Reality?
sponsored by Global Knowledge
WHITE PAPER: This paper examines the history of Network Functions Virtualization (NFV) and explores the prospects for networking to gradually evolve from a hardware-centric approach to a software-driven model.
Posted: 05 Aug 2014 | Published: 23 Jul 2014

Global Knowledge

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

It’s Time to Refresh Your Organization’s Laptop Fleet
sponsored by Dell and Microsoft
WHITE PAPER: Access this white paper to explore top tips to help maintain optimal data security as it moves from device to device, without affecting employee productivity. Also, learn the benefits of refreshing client operating systems and how this can be key to keeping your system secure.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Dell and Microsoft

Join Brian Madden as he explores the Dell vWorkspace Clients & User Experience
sponsored by Dell, Inc.
WEBCAST: Access this video to listen to Brian Madden and Gabe Knuth, experts on all things virtualization, talk with Dell representative Kelly Craig about what can be done with vWorkspace in regards to client devices and client configuration. Find out how you can set up vWorkspace on different client devices.
Posted: 03 Jun 2015 | Premiered: Jun 3, 2015

Dell, Inc.

Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

SearchSecurity.com

Makita Case Study
sponsored by Rackspace
CASE STUDY: Access this case study to find out how Hosted Exchange has provided Makita USA's employees with 25 GB of storage and is compatible with a multitude of devices.
Posted: 18 May 2015 | Published: 31 Dec 2012

Rackspace

Malware Attacks Demand a New Malware Defense Approach
sponsored by SearchSecurity.com
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

SearchSecurity.com

Integrating HP Data Protector Software with HP Data Deduplication Solutions
sponsored by HP
WHITE PAPER: This white paper will discuss HP Data Protector Software which fully supports HP data deduplication technologies allowing you to recover files more quickly while reducing your data management and storage costs.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

HP

Intel Xeon Processor 5600 Series
sponsored by Dell, Inc. and Intel®
PRODUCT OVERVIEW: This product overview points out the key constraints on today's infrastructures. Find out how upgrading to multi-core servers can free up space, labor, and power and cooling resources.
Posted: 29 Jun 2011 | Published: 29 Jun 2011

Dell, Inc. and Intel®

Intel Xeon Processor 7300 Series - Visual Demo
sponsored by Intel Corporation
PRODUCT OVERVIEW: Discover how Intel Xeon processor 7300 series offer innovations in data traffic optimization.
Posted: 24 Jul 2008 | Published: 24 Jul 2008

Intel Corporation

Intel® Xeon® Processor 5500 Series: An Intelligent Approach to IT Challenges
sponsored by Hewlett Packard Company and Intel
WHITE PAPER: As data centers reach the upper limits of their power and cooling capacity, efficiency has become the focus of extending the life of existing data centers and designing new ones. As part of these efforts, IT needs to refresh existing infrastructure with servers that deliver more performance and scalability, more efficiently. Read on to learn more.
Posted: 08 Jul 2009 | Published: 08 Jul 2009

Hewlett Packard Company and Intel

Introducing Dell 12th Generation PowerEdge Servers
sponsored by Dell, Inc. and Intel®
VIDEO: This short video examines the importance of remote server management, especially as organizations expand globally. Discover new design features that enable you to quickly detect issues, regardless of the physical location of your data center.
Posted: 26 Jul 2012 | Premiered: 05 Mar 2012

Dell, Inc. and Intel®

Introduction to Intel® Core™ Duo Processor Architecture
sponsored by Intel Corporation
PRODUCT OVERVIEW: The Intel® Core™ Duo processor is the first Intel® mobile microarchitecture that uses CMP technology, it was built to achieve high performance, while consuming low power and fitting into different thermal envelopes.
Posted: 24 Jul 2008 | Published: 15 May 2006

Intel Corporation

IT Briefing - Desktop and Application Virtualization: Getting Started
sponsored by Citrix
PRESENTATION TRANSCRIPT: In this document Barb Goldworm, President, Founder and Chief Analyst of Focus, explains the benefits for desktop and application virtualization.
Posted: 03 Feb 2009 | Published: 30 Jan 2009

Citrix

IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER: New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012

Intel

IT Takes Virtualization to Make an Agile Infrastructure
sponsored by AMD
WHITE PAPER: This paper discusses how AMD's ecosystem partners are adapting their software to take advantage of new virtualization extensions. It also explores the future of virtual technology, and assesses its impact on the industry in years to come.
Posted: 04 Nov 2008 | Published: 22 Aug 2008

AMD

It's Time to Address the Visibility Challenge Surrounding Applications
sponsored by Citrix
WHITE PAPER: Are you ready to solve the application visibility challenge? This resource outlines how a next-gen visibility solution provides the end-to-end visibility you need to win the battle.
Posted: 13 Aug 2013 | Published: 29 Mar 2013

Citrix

Jason Nolet Details New Solutions for Enterprise
sponsored by Brocade
VIDEO: This brief video uncovers two new network products that will help you adapt to the demands of new applications and ever-changing business requirements.
Posted: 29 Feb 2012 | Premiered: 21 Oct 2011

Brocade

Juniper Networks Virtual Chassis: High Availability
sponsored by Juniper Networks, Inc.
WHITE PAPER: Read this white paper to learn more about the high-availability capabilities of Juniper's Virtual Chassis technology.
Posted: 19 Apr 2013 | Published: 30 Nov 2012

Juniper Networks, Inc.

KPMG Netherlands Counts on Aruba for Network Rightsizing
sponsored by Aruba Networks
CASE STUDY: KPMG realized that network edge rightsizing could provide them an opportunity to save money and make money. This case study examines why KPMG chose Aruba to meet the needs of their global enterprise, the specific solutions used and the key benefits achieved.
Posted: 08 Oct 2010 | Published: 08 Oct 2010

Aruba Networks

Lowering Your Network Support Costs Can’t Be Done Blindfolded
sponsored by Dimension Data
WHITE PAPER: This whitepaper discusses the importance of getting a full understanding of your data center infrastructure so you can adjust operation to cut costs.
Posted: 06 Feb 2014 | Published: 06 Feb 2014

Dimension Data

Magic Quadrant for WAN Optimization Controllers, 2009
sponsored by BlueCoat
ANALYST REPORT: WAN optimization controllers seek to improve applications performance and reduce bandwidth requirements by intelligently managing traffic across the WAN. This analyst report presents a snapshot of the current market situation as well the results and explanation of Gartner's study of nine separate WOC vendors. Read the full report to learn more.
Posted: 10 Jul 2009 | Published: 30 Jun 2009

BlueCoat
226 - 250 of 445 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement