Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

network architecture

Results 226 - 250 of 257Sort Results By: Published Date | Title | Company Name
Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance, hipaa compliance, configuration management, government agency
    
Secure Computing
Published By: SilverStorm Technologies     Published Date: Aug 21, 2009
The world of super computing has changed in recent years, moving from a scale-up, monolithic, expensive architecture to the scale-out clustering of low cost microprocessors, also referred to as High Performance Business Computing (HPBC) clusters.
Tags : 
clustering, cluster, network architecture, grid, utility computing, efficiency, integration, silverstorm
    
SilverStorm Technologies
Published By: XOsoft     Published Date: Aug 21, 2009
The primary IT concern today is to ensure that the applications and information that drive critical business processes are available when they are needed, whenever they are needed. We present a description of the required architecture and operation for an automatic failover solution, demonstrating how a solution should be carefully engineered for ease of operation and management.
Tags : 
high availability, business process management, network architecture, failover, redundant, infrastructure, xosoft
    
XOsoft
Published By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : 
quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations
    
Quocirca
Published By: Jumpnode Systems     Published Date: Jun 07, 2007
Get this free whitepaper now and read how a newer architecture, Appliance-enabled Software (AeS) services, combines a plug-in monitoring appliance with a hosted dashboard application to provide the benefits of SaaS (Software-as-a-Service) along with failover out-of-band communication capabilities for dependable alert notification and escalation.
Tags : 
saas, software as a service, monitoring, network monitoring, network management, remote access, remote network management, architecture
    
Jumpnode Systems
Published By: GFI     Published Date: Jun 14, 2007
This technical white paper describes the different ways in which GFI FAXmaker for Exchange/SMTP 12 can be deployed, depending on your mail server type/version and network infrastructure.
Tags : 
ip fax, ip faxing, infrastructure, network infrastructure, faxmaker, gfi, microsoft exchange, exchange server
    
GFI
Published By: Torry Harris Business Solutions     Published Date: Jul 05, 2007
The information overload on SOA is largely on describing its merits, its principles and the vast variety of products intended to address its needs. This document is written to identify the factors to be considered, and articulate the principles and questions to be asked that will drive the decisions within each enterprise towards creating a road map for implementation.
Tags : 
service oriented, service-oriented, soa, network architecture, soa roi, change management, it spending, governance
    
Torry Harris Business Solutions
Published By: ProofSpace     Published Date: Mar 04, 2008
The ProofMark software solution is a broadly applicable system that operates on a computer, server, network, system, or infrastructure. This system utilizes public-key cryptography to create an irrefutable record of the time-existence and exact composition of any digital data. This document, the ProofMark System Concepts, Architecture, and Planning Guide, provides you with a broad technical overview of the ProofMark system.
Tags : 
public key, secure content, encryption, proofspace, proofmark
    
ProofSpace
Published By: AT&T     Published Date: Jun 25, 2008
IP Multimedia Subsystem (IMS) is an open international standard for Next Generation Networking. It supports the delivery of Voice over IP (VoIP) and various multimedia services. IMS is not in itself a service, but an architecture for service delivery. IMS was originally developed by wireless carriers within the context of the Third Generation Partnership Project (3GPP) in 2002. Since then, its advantages have led to the adoption of IMS by wireline carriers.
Tags : 
voip, voice over ip, ip telephony, ip networks, wireless ip, wireless technology, at&t, att
    
AT&T
Published By: WiMAX 20/20     Published Date: Sep 27, 2007
This white paper presents how a radically consolidated, scalable core network architecture based on multi-core processor technology can significantly reduce the cost of the core network and thereby reducing the cost to serve the first WIMAX subscribers.
Tags : 
cost, cost efficient, cost efficiency, wimax, wireless connection, broadband, broadband wireless, dsl
    
WiMAX 20/20
Published By: Tail-f Systems     Published Date: Sep 16, 2008
This paper reviews the business cost of major outages. It also details some of the reasons that network architecture has become so complex, discusses current approaches to the problem and finally presents NETCONF as a powerful building block solution to the network management problem.
Tags : 
network management, netconf, network architecture, ietf standard, tail-f, tailf, networking
    
Tail-f Systems
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity
Published By: Focus     Published Date: Aug 04, 2011
Download this white paper, sponsored by Juniper Networks, to read an interview with IDC's Vice President of Enterprise Communications and Datacenter Networks about the future of network architectures.
Tags : 
data center, data center design, information technology, juniper, networking, traffic spikes, virtualization, infrastructure
    
Focus
Published By: HP and Intel® Xeon® processors     Published Date: May 08, 2012
Download this paper to learn how HP Networking platforms, built around HP Provision Architecture and Silicon, achieve substantial power savings for all customers and all deployment situations.
Tags : 
smb, hp networking, networking, switches, deployment, power, cooling, packet processing
    
HP and Intel® Xeon® processors
Published By: HP and Intel® Xeon® processors     Published Date: Aug 23, 2012
Leave no Cloud unturned, with a consistent and agile FlexNetwork Architecture.
Tags : 
cloud computing, flexnetwork
    
HP and Intel® Xeon® processors
Published By: CDW     Published Date: Sep 10, 2014
Enterprise-critical applications—those which drive the core of an organization—require the highest availability infrastructure to support the most stringent service levels. EMC meets this need with a high performing, functionally capable, and competitively priced high-end networked storage system—the EMC® Symmetrix® VMAX® 20K system with the Enginuity™ operating environment. The VMAX 20K scale-out architecture helps organizations exceed the performance and capacity demands of hyper-consolidation, cloud deployments, and all-virtual Software Defined Data Centers (SDDCs), while simplifying the costs of data management.
Tags : 
    
CDW
Published By: CDW     Published Date: Jan 07, 2015
Learn how optimizing your campus network solutions will transform the student body by allowing students to seamlessly surf the web, but also communicate with each other in a more fluid manner.
Tags : 
enterprise, networking, architecture, customer, technology, wireless, telephony systems, collaboration
    
CDW
Published By: Logicalis     Published Date: Aug 20, 2014
We are pleased to present the findings of The Impact of IT Transformation on Enterprise Computing sponsored by Logicalis. The objective of this research is to better understand how the different stages of IT transformation can affect an organization, the challenges of advancing through each stage, and how successful progression can improve an organization’s IT effectiveness.
Tags : 
logicalis, it transformation, it strategy, it budget, it solutions, it system, it priorities, networking
    
Logicalis
Published By: Cisco     Published Date: Sep 15, 2015
To better understand the benefits, costs, and risks associated with a Cisco UCS implementation, Forrester interviewed several customers with multiple years of experience using Cisco UCS. Cisco Unified Computing System and servers unify computing, networking, management, virtualization, and storage access into a single integrated architecture.
Tags : 
unified computing system, virtualization, networking, storage, it management, enterprise applications
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
To better understand the benefits, costs, and risks associated with Cisco TrustSec, Forrester interviewed two companies. Company A is an organization that provides senior housing for over 22,000 residents in the US. This organization used Cisco TrustSec to provide highly secure segmented mobile network services to its residents. Company B is an international packaging and paper group company experiencing rapid growth. It used Cisco TrustSec as an innovative solution to quickly integrate the infrastructure of new acquisitions into its own and standardize security architecture across its wide area network (WAN) globally. While the case study will talk about the experiences of these two companies, the financial analysis focuses on the impact that Cisco TrustSec had on one organization.
Tags : 
    
Cisco
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : 
viruses, malware, hackers, leaks, supply chain interruptions, stuxnet, scada, usb
    
Globalscape
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As organizations prioritize digital transformation initiatives, many are finding that legacy networks are holding them back. To support new business models, cloud adoption, and an explosion in connected devices, modern networks must support interoperability across data centers, multiple clouds, branch locations, and edge devices. Applications now run at every point on this spectrum, and they are critical to businesses’ ability to win in hypercompetitive marketplaces. Yet, even as business success has become more dependent on this new architecture, and the amount of data flowing across connections has increased, many organizations still lack a unified approach to management, automation, and security
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
The Wide Area Network (WAN) is in the midst of a significant evolution. Software-defined WAN (SD-WAN) is the key factor driving this evolution and bringing along with it many transformational changes. SD-WAN has enabled several new WAN uses cases, such as enabling reliable, secure and high performance support of software-as-a-service (SaaS), cloud compute, cloud storage, cloud security and the ability to use non-deterministic Internet services to provide business-class transport. The traditional WAN architecture was ill equipped to support these new use cases. As is usually the case with an emerging market, the first entrants into the SD-WAN space were start-ups. However, given the ability of SD-WAN to support both traditional and emerging WAN use cases, the market has recently been flooded with a range of vendors, solutions and technologies offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Citrix ShareFile     Published Date: Oct 04, 2019
Modern app delivery for an adaptive, optimized network To succeed in today’s cloud-first world, you need to manage and deploy modern applications in parallel with legacy applications. But traditional application delivery controller (ADC) solutions can’t bridge the gap between these two environments. See and hear how you can streamline the delivery of apps, desktops and data into a unified, fully integrated digital workspace experience. Download this brief to find out how you can: • Get one platform for traditional and modern application delivery • Support hybrid and multi-cloud environments • Convert and migrate legacy apps to microservices application architectures
Tags : 
    
Citrix ShareFile
Published By: Juniper Networks     Published Date: Jun 22, 2017
In today’s technology-driven world, a financial services organization’s ability to evolve the business quickly depends on the network. MetaFabric architecture, which is the foundation of Juniper’s unique end-to-end data center networking solution, helps financial services firms respond confidently to whatever happens in the market. With an open, simple, and smart network in place, organizations can adapt quickly and seamlessly to changing requirements while eliminating the disruptions of forced upgrades and unnecessary purchases that come with vendor lock-in. Most importantly, the MetaFabric architecture helps companies stay at the forefront of innovation, keeping them one step ahead of the competition.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.