Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Technology > Networking > Network Architecture
 

Network Architecture

Network Architecture is the design of a communications system, which includes the backbones, routers, switches, wireless access points, access methods and protocols used. This may refer only to the access method in a LAN, such as Ethernet or Token Ring
Results 451 - 475 of 478Sort Results By: Published Date | Title | Company Name
White Paper Published By: xmannnnn     Published Date: Aug 06, 2010
Ultra High Speed Internet, TV and local/long distance phone services combined into 1 superior service.
Tags : 
active directory, bandwidth management, convergence, distributed computing, ethernet networking
    
xmannnnn
White Paper Published By: Webfishery     Published Date: Aug 03, 2010
This white paper explains how businesses can develop effective strategies to improve efficiency and reduce networking and application costs.
Tags : 
application management, white paper, bandwidth management, ethernet networking, gigabit networking
    
Webfishery
White Paper Published By: iDirect     Published Date: Aug 21, 2009
Secure communications is a necessity for many organizations to protect corporate data. Some highly secure organizations mandate the use of third-party encryption devices or external end to end security protocols. The iDirect Network Accelerator is an external appliance that maximizes the speed of encrypted traffic over a satellite network.
Tags : 
network security, encryption, secure communications, idirect, network accelerator
    
iDirect
White Paper Published By: Reactivity     Published Date: Aug 21, 2009
Security is one of the main issues when deploying Web services in the enterprise. This white paper discusses the advantages of an appliance over an agent-oriented architecture for Web services security, how cross platform interoperation is immediate with a hardened appliance, and why web services security is different from web server security.
Tags : 
network architecture, quality assurance, xml, web service management, web service
    
Reactivity
White Paper Published By: Reactivity     Published Date: Aug 21, 2009
This white paper introduces the requirements for an XML infrastructure that is designed to ensure the opportunities and benefits of SOAs and Web Services can be realized.
Tags : 
soa, web services, xml, infrastructure, service oriented architecture
    
Reactivity
White Paper Published By: SilverStorm Technologies     Published Date: Aug 21, 2009
The world of super computing has changed in recent years, moving from a scale-up, monolithic, expensive architecture to the scale-out clustering of low cost microprocessors, also referred to as High Performance Business Computing (HPBC) clusters.
Tags : 
clustering, cluster, network architecture, grid, utility computing
    
SilverStorm Technologies
White Paper Published By: Sybase     Published Date: Aug 21, 2009
The paper will explore the differences between smart-client and thin-client mobile architectures. It will then examine the details of common smart-client architectures, including what type of back-end systems they integrate with, the types of devices they support, how data is managed within the architecture, and development languages that can be used to build the application.
Tags : 
mobile app, mobile apps, mobile architecture, mobile device, mobile application
    
Sybase
White Paper Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
As MRM becomes a mainstream tool of marketers, it is helpful to understand the technology underpinnings and the various types of business processes that are related to marketing.
Tags : 
aprimo, marketing resource management, enterprise marketing management, campaign management, service oriented architecture
    
Aprimo, Inc.
Webinar Published By: VMware Dell     Published Date: Sep 29, 2008
Virtualization offers the promise of simplifying your IT infrastructure from the desktop to the data center. But can your virtual environment maintain the level of availability you need to keep your business running or to recover from a disaster?
Tags : 
vmware, dell, virtual data center, data protection, disaster recovery
    
VMware Dell
White Paper Published By: Tail-f Systems     Published Date: Sep 16, 2008
This paper reviews the business cost of major outages. It also details some of the reasons that network architecture has become so complex, discusses current approaches to the problem and finally presents NETCONF as a powerful building block solution to the network management problem.
Tags : 
network management, netconf, network architecture, ietf standard, tail-f
    
Tail-f Systems
White Paper Published By: AT&T     Published Date: Jun 25, 2008
Quantum Cryptography is an emerging technology that may offer new forms of security protection. Relying on the laws of quantum mechanics, transmission is carried by a single particle that can only be measured one time, making encryption and decryption difficult to compromise. Businesses are evaluating architectural solutions using Quantum Cryptography to understand its potential benefits. Future implementations of the technology may soon make it more available for enterprise business.
Tags : 
att, at&t, encryption, decryption, quantum
    
AT&T
White Paper Published By: COMDOM Software     Published Date: Aug 09, 2007
This paper provides an overview of costs of spam facing large organizations, such as multinational enterprises, universities, and governments, as well as small and medium sized businesses that own or operate networks used by employees and other end users.
Tags : 
spam, bayesian, filter, filtering, block
    
COMDOM Software
White Paper Published By: Torry Harris Business Solutions     Published Date: Jul 05, 2007
The information overload on SOA is largely on describing its merits, its principles and the vast variety of products intended to address its needs. This document is written to identify the factors to be considered, and articulate the principles and questions to be asked that will drive the decisions within each enterprise towards creating a road map for implementation.
Tags : 
service oriented, service-oriented, soa, network architecture, soa roi
    
Torry Harris Business Solutions
White Paper Published By: Torry Harris Business Solutions     Published Date: Jul 05, 2007
This whitepaper is written as a guide to an alternative mechanism for project implementation for business owners holding responsibility to deliver IT solutions in the SOA space. It could also be of interest to those who would like to know more about how the phenomenon of offshore/onsite coordination, that emerged in the nineties, can be effectively applied towards realizing the promise of SOA.
Tags : 
service oriented, service-oriented, governance, service management, outsource
    
Torry Harris Business Solutions
White Paper Published By: GFI     Published Date: Jun 14, 2007
A fax server buyers' guide, this paper describes the features you need to look for in fax server software and why. It also discusses the type of fax server devices (fax cards) available and which to choose.
Tags : 
fax server, buyers guide, buyer's guide, buying guide, ip fax
    
GFI
White Paper Published By: GFI     Published Date: Jun 14, 2007
This technical white paper describes the different ways in which GFI FAXmaker for Exchange/SMTP 12 can be deployed, depending on your mail server type/version and network infrastructure.
Tags : 
ip fax, ip faxing, infrastructure, network infrastructure, faxmaker
    
GFI
White Paper Published By: Jumpnode Systems     Published Date: Jun 07, 2007
Get this free whitepaper now and read how a newer architecture, Appliance-enabled Software (AeS) services, combines a plug-in monitoring appliance with a hosted dashboard application to provide the benefits of SaaS (Software-as-a-Service) along with failover out-of-band communication capabilities for dependable alert notification and escalation.
Tags : 
saas, software as a service, monitoring, network monitoring, network management
    
Jumpnode Systems
White Paper Published By: Casewise Systems Inc.     Published Date: Jun 05, 2007
Read this guide, that was published in BusinessWeek, on how organizations are now beginning to tackle this problem by taking a more holistic approach to IT Portfolio Management, enabling rapid decision-making based on a company roadmap.
Tags : 
business management, architecture, alignment, align, strategy
    
Casewise Systems Inc.
White Paper Published By: NetIQ Corporation     Published Date: Apr 05, 2007
Learn why organizations need to limit IT administrator power to ensure operational integrity and assure compliance and how to implement robust change control processes and tools with this white paper.
Tags : 
insider threat, network security, it administrator, comply with regulations, it infrastructure
    
NetIQ Corporation
White Paper Published By: Aomega     Published Date: Jan 18, 2007
This white paper summarizes Enterprise Video Communications (EVC) and includes a high level plan to perform an EVC assessment helping ensure deployment success.
Tags : 
video conference, video conferencing, video communications, ip networks, video conference
    
Aomega
White Paper Published By: Neterion     Published Date: Dec 05, 2006
Virtualization is a key strategy for simplifying deployment of IT resources and maximizing their utilization. Specifically, virtualization refers to the concept of abstracting physical resources such as compute cycles, data storage, and network bandwidth, and then provisioning and sharing these resources amongst multiple applications.
Tags : 
virtualization, data center, data centers, datacenters, resource management
    
Neterion
White Paper Published By: Force10 Networks     Published Date: Dec 04, 2006
With Grid computing, computer systems and other resources aren’t necessarily constrained to be dedicated to individual users or applications, but can be made available for dynamic pooling or sharing to meet the changing needs of the organization.
Tags : 
ethernet, cluster, grid computing, performance cluster, utility computing
    
Force10 Networks
White Paper Published By: IBM     Published Date: Nov 06, 2006
This IBM white paper posits that most enterprises have yet to realize the full value of convergence and explains why the real promise of IP networks lies in converged applications. It goes on to explain how IP convergence can build real business value for today's busy contact centers.
Tags : 
convergence, communications convergence, ip telephony, ip faxing, networking
    
IBM
White Paper Published By: Texas Instruments     Published Date: Nov 06, 2006
Read how the Next Generation Residential Gateway (RG) is capable of supporting the ever increasing need for higher data throughput rates, signaling range that covers the whole house and robustness capable of mitigating the sources of interference found in the home.
Tags : 
bandwidth, residential gateways, bandwidth management, home networking, wireless networking
    
Texas Instruments
White Paper Published By: IBM     Published Date: Nov 06, 2006
Download this paper to learn why IBM believes that the real business value of IPC voice systems is reflected in improved employee productivity, enhanced business processes, and the ability to deliver more responsive services and offerings.
Tags : 
voip, converge, productivity, convergence, communications convergence
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.