RecruitingBlogscom

Follow Us:

 

ip network

Results 376 - 400 of 752Sort Results By: Published Date | Title | Company Name
Published By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : 
forescout, counteract, compliance, independent, assesment, network, access, control
    
ForeScout
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use
    
ForeScout
Published By: CDW     Published Date: Oct 10, 2013
An ambitious mobile strategy built around tablets is helping Hyatt Hotels reach new levels of customer service.
Tags : 
mobile strategy, case study, wireless strategy, customer service, modernizing hospitality, apple, ipad, technology for businesses
    
CDW
Published By: Viavi Solutions     Published Date: Apr 14, 2017
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network. This white paper guides you through the essentials of VoIP troubleshooting, including common problems and the metrics you should employ to fix and prevent them. You’ll learn how these metrics relate to one another and to overall VoIP health. You’ll also learn the best practices for keeping your VoIP network flowing smoothly, your time-to-resolution low, and end users happy.
Tags : 
sensitive information, data protection, network security, asset protection, network performance, network analysis, troubleshooting solutions
    
Viavi Solutions
Published By: Cisco Systems     Published Date: Oct 01, 2013
Annual global IP traffic has increased fourfold in the past five years, and it will surpass the zettabyte threshold by 2017. In this Cisco® Visual Networking Index (VNI) paper, discover the details and methodology of this forecast. Read report.
Tags : 
ip traffic, technology, cisco visual networking index, vni, best practices, telecommunication, wireless, business technology
    
Cisco Systems
Published By: Aruba Networks     Published Date: Jul 03, 2013
Microsoft Lync is not only changing the cost structure of enterprise telephony, but is also ushering in a new user experience in which every communication is transformed into a more collaborative, engaging interaction. But it’s impossible to achieve the promises of Lync if you haven’t fully considered the underlying infrastructure. And with laptops, smartphones and tablets on track to outnumber desktops, that means wireless infrastructure. Fortunately, with a little upfront planning, you can dramatically increase the quality and reliability of multimedia over enterprise Wi-Fi. Here are 10 tips for ensuring that Lync runs well on mobile devices in your network…
Tags : 
lync, smartphone, tablet, wireless infrastructure, deploy
    
Aruba Networks
Published By: Polycom     Published Date: May 12, 2015
To build deep relationships across a distributed network of consumers without skyrocketing costs, FSIs are turning to Highly Interactive Virtual Environments (HIVEs).
Tags : 
polycom, enterprise, collaboration, fsi, compliance, finance
    
Polycom
Published By: CradlePoint     Published Date: Sep 04, 2014
Every year, the public relations specialists from at least one bluechip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data. There’s always an immediate hit to the company’s reputation, resulting in a loss of brand loyalty, as customers take their business elsewhere. This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
Tags : 
security risks, crisis communications, security breaches, compromising customer data, security
    
CradlePoint
Published By: Ooyala     Published Date: Dec 09, 2014
Another critical sign of the times is that the Internetdriven evolution of TV and video is now embraced, rather than spurned, by the TV establishment. HBO, CBS and others are touting new IP-delivered offerings. Charter Communications CEO Tom Rutledge says the number of programmers planning OTT deployments is good for the cable industry, which will have more flexibility in content bundling; and good for the consumer, who will have more choice. And discussing heightened competition for audiences and ad dollars in VARIETY, Josh Sapan, president-CEO of AMC Networks, referred to “an almost unstoppable trend for technology to facilitate consumer discretion and choice.”
Tags : 
multi-device, mobile video, multi-screen, mobile, tablets, long-form video, networking
    
Ooyala
Published By: SAP     Published Date: Mar 22, 2016
Experts say the demand for electricity, natural gas, and water will double or triple as billions of people join the digital economy, and the use of energy and water will grow while vehicles and mass transit go electric. One thing is clear – the digital economy needs clean, dependable, and affordable electricity. This should be a great outlook for power generators, distributors, and retailers, but decarbonization, deregulation, and decentralization are disrupting the century-old utilities hierarchy. A “Digital Energy Network” is emerging that reflects new structures of power generation, transmission, distribution, and retail. It will foster new business models and processes and transform work in a competitive and collaborative digital economy.
Tags : 
digital utilities, sap, digital world, natural resources, business technology
    
SAP
Published By: SAP     Published Date: Mar 22, 2016
All participants will use digital innovation to run their enterprise in real time and operate in a global network. They will provide superior products and services for a unique customer experience with the highest safety and environmental standards. This also paves way for new mobility concepts and business models. Our vision is where urban mobility and transportation systems run in a sustainable ecosystem while protecting natural resources and environment. This requires the ability to connect companies, people, and vehicles in real time for accident-free driving with zero-emission operated vehicles.
Tags : 
digital network, digital enterprise, value creation, best business practices, sap, business technology, internet marketing, e-commerce
    
SAP
Published By: Ciena     Published Date: Jun 12, 2017
Explore "The Utility of the Future, Considerations for Evolving to a Smart Grid Infrastructure" by downloading it today.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
    
Ciena
Published By: Ciena     Published Date: Jun 12, 2017
In this whitepaper, you will see the smart city models and the keys to obtaining a smart city with SDN and NFV.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
    
Ciena
Published By: Ciena     Published Date: Jun 12, 2017
In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow.
Tags : 
sdn, nfv, packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud
    
Ciena
Published By: 8x8 Inc.     Published Date: Jun 16, 2017
Some companies opt to deploy UC solutions on-premises, but the cloudbased model is gaining popularity. Cloud-based UC solutions are ideal for businesses that have limited IT staff, a distributed workforce and/or a desire for pay-as-you-go flexibility. By enabling diverse communication media to be carried over a common IP network, UC solutions make it possible to manage a full suite of capabilities from a single point—and use them with common devices. But what’s the best way to maximize UC capabilities for your specific workplace? Spiceworks surveyed IT decision makers to get their insights on identifying and deploying collaboration and communication solutions across their organizations. This white paper explores the survey results, including key concerns, pain points, and roadmaps around driving UC strategies.
Tags : 
technology solutions, mobile workforce, interface optimization, 8x8, desk phones, internal collaboration, remote employees, cost reduction
    
8x8 Inc.
Published By: Juniper Networks     Published Date: Sep 29, 2017
To try and understand the path to the cloud in greater detail, we’ve created this eBook from an extended interview conducted by the team at DatacenterDynamics with Juniper Networks’ Andy Ingram, the Global Vice President for Data Center and Cloud.
Tags : 
juniper, public cloud, cloud, cloud applications, data center
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 29, 2019
Get the Secrets to Designing a Resilient, Secure Campus Network. Download our 2019 buyer's guide to learn more. It’s challenging to design, deploy, and manage a campus network. Adding to this, aging equipment can slow your network down and hinder your ability to advance IT innovations that help keep your business competitive. What's more, the proliferation of devices and IoT sensors can expose your network to cyberattacks and other security threats. Our 2019 Buyer’s Guide can help you modernize your campus network, reducing OpEx while delivering a richer, more reliable user experience. Learn about the key trends and challenges that shape your campus network design and the essential considerations that should influence your selection process.
Tags : 
multiprotocol label switching (mpls), switching, ethernet network services, data center design, data center management
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: • Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities • Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded • Ensuring that your organization has a unified view of your assets and the threat environment
Tags : 
network management, network security, network security appliance, security, security architecture
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
When data center architecture extends beyond even moderate amounts of sophistication and complexity, it becomes a daunting challenge for operators to understand what is going on by relying on common tools and processes alone. Read this eGuide for five recommendations that can help you make sense of your data.
Tags : 
cloud providers, cloud provisioning, cloud services, data centre, data centre provider
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
As modernized data centers scale up and out, there is a strong potential for growing complexity as well. IT teams need to be vigilant in simplifying architectures and operations as the technological landscape changes. While the potential of monitoring and analytics in your data center is huge, to take advantage, you'll need an architecture that can handle shifting traffic patterns. In this expert eGuide, you'll discover three ways of simplifying architectures, and how they can help you reduce complexity, improve workforce efficiency, and ease administration.
Tags : 
cloud providers, cloud provisioning, cloud services, data centre, data centre provider
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
When considering data center security, you will need to decide which security functions need to be deployed and where you want to deploy them. These functions are expected to be implemented wherever a firewall is used. Read our eGuide to find out which security functions to deploy, and where to deploy them, including: • Next-generation firewalls • Intrusion prevention systems • Centralized security management
Tags : 
cloud providers, cloud provisioning, cloud services, data centre, data centre provider
    
Juniper Networks
Published By: Cloudian     Published Date: Feb 15, 2018
We are living in an age of explosive data growth. IDC projects that the digital universe is growing 50% a year, doubling in size every 2 years. In media and entertainment, the growth is even faster as capacity-intensive formats such as 4K, 8K, and 360/VR gain traction. Fortunately, new trends in data storage are making it easier to stay ahead of the curve. In this paper, we will examine how object storage stacks up against LTO tape for media archives and backup. In addition to a detailed total cost of ownership (TCO) analysis covering both capital and operational expenses, this paper will look at the opportunity costs of not leveraging the real-time data access of object storage to monetize existing data. Finally, we will demonstrate the validity of the analysis with a real-world case study of a longstanding network TV show that made the switch from tape to object storage. The limitations of tape storage go way beyond its lack of scalability. Data that isn’t searchable is becoming
Tags : 
    
Cloudian
Published By: Apstra     Published Date: Feb 21, 2019
Modern data centers based on hyperscale, leaf-spine switching architectures are growing so large and complex they are outstripping the capacity of operators to engineer, configure and manage these networks using traditional tools and techniques. As a result, data center operators are looking for new ways to automate workflows, maximize uptime and increase operational agility while reducing operating costs
Tags : 
acg, data center efficiency
    
Apstra
Published By: Apstra     Published Date: Feb 21, 2019
The enterprise data center has undergone several major shifts since the introduction of computing as a business resource. Data centers have evolved from mainframes to client/server to virtual servers, and then to being “software defned,” and fnally to their current state of disaggregation. Today, we sit on the precipice of the next major data center transition—the evolution to an intent-based data center (IBDC) (Exhibit 1). Each transition saw the cost of computing decrease and the importance of the network increase, and each enabled organizations to boost the efciency of their data center operations and improve asset utilization—ultimately leading to a better experience for users
Tags : 
ibn, ibdc, data center infrastructure
    
Apstra
Published By: Apstra     Published Date: Aug 19, 2019
The response to the question “How is one Intent-Based Networking offering different than the others?” typically sounds subjective, descriptive, and open to interpretation. What is needed is a tangible, objective, and fact-based nomenclature that can help you rationalize the maturity of Intent-Based Networking solutions. Using this nomenclature, we should be able to map Intent-Based Networking solutions to a specific maturity level, starting with Level 0 (low maturity/incomplete) up to Level 3 which enables a fully capable Intent-Based Networking solution (mature/complete). Apstra introduced the notion of Intent-Based Networking and Self-Operating Networks™ in June of 2016, and in our blog “Intent Based Networking: What Is It” we provided a definition of Intent-Based Networking, listing capabilities that a complete Intent-Based Networking system needs to provide. The goal is to categorize maturity levels of various Intent-Based Networking implementations and enable network operators to
Tags : 
    
Apstra
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top