Hardware  >   Networking Hardware  >   Internetworking Hardware  >   Switches  >   LAN Switches  >  

Token Ring Switches

RSS Feed    Add to Google    Add to My Yahoo!
Token Ring SwitchesReports
26 - 50 of 462 Matches Previous Page  | Next Page
Analyst's take: Business impact of Facebook in the workplace
sponsored by ComputerWeekly.com
WHITE PAPER: Nearly half of office employees access Facebook during work.  Nucleus found companies effectively lose an average of 1.5 percent of total office productivity when employees can access Facebook during the work day.
Posted: 21 Oct 2011 | Published: 09 Feb 2011

ComputerWeekly.com

Are you ready for 2020?
sponsored by ComputerWeekly.com
PRESENTATION: Dan Wood, senior manager for software market development at HP, discusses the results of HP's Enterprise 2020 study in this presentation.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

ComputerWeekly.com

Authentication Devices - User-friendly authenticators for every use case
sponsored by HID
WHITE PAPER: In this white paper, access over 10 different authentication devices from a reliable provider to achieve the strength and security you strive for.
Posted: 09 Jul 2014 | Published: 09 Jul 2012

HID

Avocent® Success Story: Sci-Quest Hands-on Science Center Enhancing Theater Interactions
sponsored by Avocent
WHITE PAPER: This whitepaper explains how The Sci-Quest Hands-on Science Center in Huntsville, Alabama, was able to provide students, educators and IT personnel a heightened interactive theater experience.
Posted: 15 May 2014 | Published: 15 May 2014

Avocent

Basics of Switching
sponsored by Global Knowledge
WHITE PAPER: A switch is a Layer 2 network device that forwards Ethernet frames based on the destination media access control (MAC) address. A switch has RJ-45 ports for connection and the intelligence to read MAC addresses to make forwarding decisions. The purpose of the switch is to quickly and accurately forward frames toward the destination.
Posted: 05 Sep 2013 | Published: 28 Jun 2013

Global Knowledge

Best Practices for Utilizing Network Monitoring Switches in Cisco Environments
sponsored by Ixia
WHITE PAPER: Access this white paper to discover how network monitoring switches can help overcome the challenges of deploying packet-based monitoring in a Cisco network.
Posted: 03 Mar 2014 | Published: 31 Mar 2013

Ixia

Big Data at Work: Dispelling the Myths, Uncovering the Opportunities
sponsored by SAS
WHITE PAPER: In this white paper, Thomas Davenport separates fact from fiction when it comes to big data.
Posted: 10 Jul 2014 | Published: 03 Mar 2014

SAS

Booz CIO briefing: Web 2.0 - lead now or get out of the way
sponsored by ComputerWeekly.com
WHITE PAPER: Web 2.0 and new media technologies, such as blogs, wikis, and social networks, are spreading rapidly through companies, often without IT's direct involvement. This report from Booz&Co argues that CIOs and their IT departments must take the lead in these emerging technologies.
Posted: 20 Oct 2011 | Published: 10 Mar 2011

ComputerWeekly.com

Application Virtualization and Desktop Virtualization Are Better Together
sponsored by Citrix
WHITE PAPER: This document is designed to help Citrix XenApp customers understand how and when Citrix XenDesktop can be used with Citrix XenApp to deliver virtual desktops to further reduce application and desktop computing costs.
Posted: 05 Nov 2008 | Published: 05 Nov 2008

Citrix

Architecting a Better Network Storage Solution
sponsored by BlueArc Corp.
WHITE PAPER: BlueArc's Titan Architecture is a revolutionary step in file servers with its hardware-based file system. This paper explains the details of the architecture to better understand the unique hardware-accelerated design and the object based file system.
Posted: 10 Mar 2008 | Published: 01 Jan 2007

BlueArc Corp.

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information
sponsored by ASG Software Solutions
WHITE PAPER: The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more.
Posted: 25 May 2010 | Published: 25 May 2010

ASG Software Solutions

AXA Technology Services Uses VMware ESX Server to Meet Consolidation Goals without Compromising Performance
sponsored by VMware and Intel
CASE STUDY: Is your business looking to save in its hardware expenditures, improve its server utilization and achieve faster server procurement? Learn how SMBs can leverage a virtual infrastructure to streamline maintenance and utilize fewer IT resources.
Posted: 15 Nov 2007 | Published: 01 Jan 2005

VMware and Intel

Benefits of Cloud-Based Communications
sponsored by Interactive Intelligence, Inc.
PRESENTATION TRANSCRIPT: This presentation transcript explores the options of moving your contact center applications and Unified Communications strategies to the cloud. Uncover the benefits and opportunities of cloud-based solutions and potential pain points, and get help deciding if the cloud is a good option for your organization.
Posted: 10 May 2012 | Published: 24 Apr 2012

Interactive Intelligence, Inc.

Best Practices for a Successful Upgrade Project
sponsored by HCL Technologies Ltd.
WHITE PAPER: Upgrades help businesses to maintain a competitive edge in the market. Yet, upgrades pose their own set of challenges. This white paper lists the best practices that should be followed when upgrading to achieve maximum reliability.
Posted: 10 Jul 2008 | Published: 16 May 2008

HCL Technologies Ltd.

Best Practices for Deploying LAN Security and NAC
sponsored by Nevis Networks
WHITE PAPER: Download this paper and discover best practices for planning and deploying a LAN Security solution. Learn about an integrated security strategy that provides reactive protection to identify and filter out malware attacks that infiltrate your network.
Posted: 05 Mar 2007 | Published: 01 Mar 2007

Nevis Networks

Best Practices for Implementing a Data Warehouse on Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: By using the Oracle Exadata Database Machine as a data warehouse platform you have a balanced, high performance hardware configuration. This paper focuses on the other two corner stones, data modeling and data loading, providing a set of best practices and examples for deploying a data warehouse on the Oracle Exadata Database Machine.
Posted: 25 Apr 2011 | Published: 30 Nov 2010

Oracle Corporation

Best Practices for Implementing a Data Warehouse on Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: By using the Oracle Exadata Database Machine as a data warehouse platform you have a balanced, high performance hardware configuration. This paper focuses on the other two corner stones, data modeling and data loading, providing a set of best practices and examples for deploying a data warehouse on the Oracle Exadata Database Machine.
Posted: 12 Mar 2012 | Published: 30 Sep 2010

Oracle Corporation

Best Practices for Public Folders to SharePoint Migration
sponsored by Dell Software
WHITE PAPER: Public Folder Migrator enables you to perform migration of public folders' structure and contents into SharePoint Services and Portal Server sites.
Posted: 20 Mar 2008 | Published: 01 Jan 2006

Dell Software

Best Practices for successful IP Address Management (IPAM)
sponsored by Infoblox
WHITE PAPER: This white paper discusses several ways to develop a successful IPAM strategy.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Infoblox

Beverage Distributor Virtualizes Data Center
sponsored by Cisco Systems, Inc.
CASE STUDY: Coca Cola Bottling Company adopted 10 Gigabit Ethernet, consolidating from 80 servers to 4 and reducing cabling costs.
Posted: 18 Dec 2009 | Published: 01 Aug 2009

Cisco Systems, Inc.

Beyond HA: The Middleware Factor in Rapid Services Deployment in Next-Generation Networks
sponsored by Enea
WHITE PAPER: This white paper examines the evolution of adoption commercial-off-the-shelf (COTS) middleware, including the criteria for what makes adoption more viable for the telecommunications industry.
Posted: 15 Sep 2008 | Published: 15 Mar 2008

Enea

Beyond the Hypervisor: Optimizing Virtualization Management
sponsored by ASG Software Solutions
WHITE PAPER: Enterprise Management Associates believes that sophisticated, integrated, heterogeneous, virtual systems management is a critical business differentiator for enterprises as they deploy and expand their virtualization infrastructure. Read this paper for more information.
Posted: 27 Jan 2010 | Published: 27 Jan 2010

ASG Software Solutions

Beyond UTM -- The Value of a Purpose-built Network Security Platform
sponsored by Fortinet, Inc.
WHITE PAPER: It is only with a purpose-built network security platform -- as defined by this paper -- that organizations will be assured of maximum security effectiveness, minimum cost of ownership, and the greatest degree of.
Posted: 27 Dec 2007 | Published: 01 Aug 2007

Fortinet, Inc.

Big Is In: X86 Buying Trends
sponsored by IBM
WHITE PAPER: Read the Gabriel Consulting x86 Server Vendor Preference Survey to learn why IBM is positioned as the leader for greater than 4-socket computing.
Posted: 02 Oct 2008 | Published: 02 Oct 2008

IBM

Boost Data Center Fabric Density: Getting Ready for 2013
sponsored by Brocade
EGUIDE: Uncover details about a new line of VDN modular switches that will help you increase scalability and efficiency in your data center network.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

Brocade
26 - 50 of 462 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement