Skip to main content
 

networks

Results 251 - 275 of 1790Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Aug 10, 2017
To maximize the benefits of its next-generation systems and successfully execute its information strategy, CU had to overcome its aging network. Most of CU’s network infrastructure, which was built from solutions by another vendor, was introduced in 2007, when its computing center was first built. Over time, the equipment began to fail, affecting the stability of applications which relied on network connectivity. Technical support also became a major issue as the equipment faced obsolescence and maintenance contracts with vendors expired.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital, connected world is fundamentally changing the dynamics of the financial services industry. Consumers expect anytime and anywhere access with a customer experience commensurate with the Internet world, while fintech start-ups disrupt established value chains, driving a need to deliver faster innovation. This is creating tremendous pressure on the network, with escalating demands for performance and agility, while cost control and compliance imperatives remain as dominant as ever. This paper looks at optimal strategies for CIOs and CTOs, exploring how the future network needs to evolve to both drive operational effectiveness and enable business change, while assessing key investment and strategic considerations for equipping the network for the digital financial institution.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
    
Juniper Networks
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The advent of cloud computing and software-defined data center architectures for modern application delivery has made networking more sensitive than ever before. Applications in the digital age require networks that can expand and contract dynamically based on consumer demand. Enterprises are implementing software-defined networking (SDN) to deliver the automation required by these new environments, but the dynamic nature of SDN makes network management and monitoring fundamentally more challenging. Network infrastructure teams need monitoring tools that can provide visibility into these new and constantly changing networks. This white paper explores the importance of SDN monitoring and examines a leading example of a solution, CA Performance Management with CA Virtual Network Assurance integration.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
SDx Central host a webcast to look at troubleshooting top-down application performance in Cisco SDWAN networks as well as assessing impact to application bottoms-up in a Cisco ACI data Center. Featuring: Jeremy Rossbach, Sr. Product Marketing Manager, CA Technologies Jason Normandin, Sr Principal Manager, CA Technologies Jessica Lyons Hardcastle, Senior Editor, SDx Central
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
    
CA Technologies EMEA
Published By: Limelight Networks     Published Date: Feb 21, 2018
Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). In some cases, using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But how do you know if a multi-CDN strategy is right for your business? This free Guide will help!
Tags : 
    
Limelight Networks
Published By: Limelight Networks     Published Date: Feb 21, 2018
Content delivery networks (CDNs) can significantly improve the user experience of your online audiences….but not all CDNs deliver the same level of service. Learn how to choose the right CDN for your business
Tags : 
    
Limelight Networks
Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks
Published By: Limelight Networks     Published Date: Feb 22, 2018
The State of Online Video is Limelight Networks’ latest in a series of surveys that explores consumer perceptions and behaviors around digital content.
Tags : 
    
Limelight Networks
Published By: Limelight Networks     Published Date: Feb 22, 2018
In the increasingly competitive OTT market, competition for viewers is high. Providers must find ways to not just deliver compelling content, but to deliver compelling viewing experiences. In this whitepaper, you’ll learn about the critical challenges facing OTT providers today and how they can be overcome to provide the broadcast quality experiences viewers expect, regardless of the device in use or the viewers location in the world. Are you ready to keep your subscribers happy and away from your competition? Download this free white paper OTT 3.0: How to Build a Better Mousetrap and learn: Why personalized content discovery is so important to viewers – and to the success of your business How to avoid internet congestion by leveraging technologies like a CDN The importance of global network scale to meet spikes in consumer traffic The impact of advertising on viewer abandonment
Tags : 
    
Limelight Networks
Published By: Dell SB     Published Date: Jan 24, 2019
DELL DOCKS — GIVING YOU MORE POWER TO GET AHEAD. Designed to efficiently connect to displays, keyboards, mice, printers, networks and other accessories, Dell docks expand your laptop, mobile workstation or 2-in-1 capabilities so you can quickly connect to all your devices at your desk.
Tags : 
    
Dell SB
Published By: IBM     Published Date: Jun 16, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
cloud computing, mobility, big data, business analytics, it security landscape, enterprise networks, cloud integration, virtualization
    
IBM
Published By: IBM     Published Date: Jul 07, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
the cloud, mobile, mobility, social, analytics, networks, enterprise network, big data, network infrastructure
    
IBM
Published By: BitSight Technologies     Published Date: Aug 02, 2016
Organizations today aren’t just single entities—they are networks of partners, vendors, and third parties. While interconnected networks are critical for success in most businesses, they also leave data more vulnerable to exposure from bad actors. Because of this, vendor risk management (VRM) is a critical business practice.
Tags : 
    
BitSight Technologies
Published By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Published By: ipoque     Published Date: Feb 14, 2019
Application-aware vEPC is the key to SDN/NFV service deployments. Deep packet inspection software provides granular network data, which lays the foundation for application awareness in mobile networks. This case study explains how a leading provider of virtualized network solutions uses the best-berforming deep packet inspection (DPI) software R&S®PACE 2 by Rohde & Schwarz to provide their CSP customers with overall network intelligence at a highly granular level.
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Published By: Cisco     Published Date: Oct 08, 2018
Cisco DNA takes a software-delivered approach to automating and assuring services across your campus, WAN, and branch networks. Based on an open and extensible platform, DNA allows you to build value on the network, so you can streamline operations and facilitate IT and business innovation.
Tags : 
networking, intent-based networking, gartner, wan, network, innovation, digital, digital network, digital transformation
    
Cisco
Published By: Pure Storage     Published Date: Jan 12, 2018
Data is growing at amazing rates and will continue this rapid rate of growth. New techniques in data processing and analytics including AI, machine and deep learning allow specially designed applications to not only analyze data but learn from the analysis and make predictions. Computer systems consisting of multi-core CPUs or GPUs using parallel processing and extremely fast networks are required to process the data. However, legacy storage solutions are based on architectures that are decades old, un-scalable and not well suited for the massive concurrency required by machine learning. Legacy storage is becoming a bottleneck in processing big data and a new storage technology is needed to meet data analytics performance needs.
Tags : 
reporting, artificial intelligence, insights, organization, institution, recognition
    
Pure Storage
Published By: Pure Storage     Published Date: Jan 12, 2018
Deep learning opens up new worlds of possibility in artificial intelligence, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-fl ash storage infrastructure that is built specifically to work with high-powered analytics.
Tags : 
data, deep learning, automated, intelligence, pure storage
    
Pure Storage
Published By: Pure Storage     Published Date: Jan 12, 2018
Interest in machine learning has exploded over the past decade. You see machine learning in computer science programs, industry conferences, and the Wall Street Journal almost daily. For all the talk about machine learning, many conflate what it can do with what they wish it could do. Fundamentally, machine learning is using algorithms to extract information from raw data and represent it in some type of model. We use this model to infer things about other data we have not yet modeled. Neural networks are one type of model for machine learning; they have been around
Tags : 
learning machines, automated intelligence, scalars, vectors, mathematics, classification, pure storage
    
Pure Storage
Published By: Gigamon EMEA     Published Date: Feb 20, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon EMEA
Published By: Gigamon EMEA     Published Date: Feb 20, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon EMEA
Published By: Gigamon EMEA     Published Date: Feb 20, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon EMEA
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : 
data research, big data, virtualization, applications, networks
    
HP - Enterprise
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.