Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Technology > Networking > Network Architecture
 

Network Architecture

Network Architecture is the design of a communications system, which includes the backbones, routers, switches, wireless access points, access methods and protocols used. This may refer only to the access method in a LAN, such as Ethernet or Token Ring
Results 476 - 479 of 479Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Nov 06, 2006
Download this paper to learn why IBM believes that the real business value of IPC voice systems is reflected in improved employee productivity, enhanced business processes, and the ability to deliver more responsive services and offerings.
Tags : 
voip, converge, productivity, convergence, communications convergence
    
IBM
White Paper Published By: EMC     Published Date: Nov 06, 2006
EMC, the world leader in storage and IT management, developed these Top 10 Tips for SMBs considering stepping up to SAN. The following tips can help you make informed decisions when selecting the hardware and technologies that you use.
Tags : 
storage management, it management, storage area networks, san, small business
    
EMC
White Paper Published By: EMC     Published Date: Nov 06, 2006
The amount of data on business computers has grown astronomically over the past few decades.  If a company loses this data, business grinds to a halt. The following tips can help you select the hardware and software you need to safeguard the integrity of your data, guarantee accurate restores, and manage backups without placing an undue burden on IT personnel.
Tags : 
data protection, raid, disaster plan, smb, smbs
    
EMC
White Paper Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance
    
Secure Computing
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.