network performance

Results 301 - 325 of 434Sort Results By: Published Date | Title | Company Name
Published By: EMA     Published Date: Apr 01, 2014
Application-aware Network Performance Management (AANPM) practices and products provide detailed insights into exactly who is using which resources, what quality of experience is taking place, and where to look when things go wrong. Such information can significantly improve planning, monitoring, and troubleshooting efforts.
Tags : 
ema, application aware network performace, aanpm, quality of experience, research, it management, data management, consulting
    
EMA
Published By: IBM     Published Date: Jul 27, 2015
Read this whitepaper to look at why network service quality matters to customer loyalty and CSP attitudes to improve it
Tags : 
customer loyalty, network service quality, communications service providers, service quality metrics, operational performance, customer experience management, cem, cem solution, cem architecture
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.
Tags : 
network security, threat landscape, network security solutions, network defense, security challenges, security, it management, database security, business technology
    
IBM
Published By: IBM     Published Date: Oct 08, 2015
Download the white paper now and learn how to make your network "Ready for Mobile."
Tags : 
ibm, mobilefirst, network, security, data, performance, service delivery, networking, wireless, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Tolly Group evaluated the security and performance of the IBM Security Network IPS GX7800 vs. a standard signature-based platform.
Tags : 
ibm, ibm security network, ips gx7800, security, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
Read this Forrester report to learn how to: 1) Increase network security, performance, and availability, 2) Reduce costs and protect your investment with Flexible Performance Licensing, 3) Evaluate the potential return on investment (ROI) your organization may realize with XGS.
Tags : 
economics, forresster, ibm, security, network protection, performance, business technology
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Read this Forrester report to learn how to: 1) Increase network security, performance, and availability, 2) Reduce costs and protect your investment with Flexible Performance Licensing, 3) Evaluate the potential return on investment (ROI) your organization may realize with XGS.
Tags : 
ibm, security, network protection, ibm security network protection, cyber threats, network, xgs, forrester, tei, total economic impact, networking, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor, power distribution network, vrm, voltage regulator module, signal, smas, analog models, backward crosstalk, capacitive crosstalk, controlling crosstalk, correct emc problems, correct emi problems, cross talk
    
Mentor Graphics
Published By: Focus     Published Date: Nov 15, 2011
When it's time to expand your network, this guide will help you evaluate the needs of your organization and enable you to provide best performance for mission-critical applications.
Tags : 
network, infrastructure, best practices, mission critial, applications, network, scale
    
Focus
Published By: IBM     Published Date: Oct 19, 2011
Learn how your organization can benefit from these top ten benefits of a server refresh!
Tags : 
server, refresh, benefits, system x, hardware solutions, hardware solutions, ibm., memory capacity, network performance, virtualization, cloud computing, infrastructure, design and facilities, power and cooling, green computing
    
IBM
Published By: F5     Published Date: Jan 31, 2013
Whether critical applications live in the cloud, in the data center, or both, organizations need a strategic point of control for application security. Learn how you can achieve the security, intelligence, and performance for today's standards.
Tags : 
application, security, cloud, cloud security, f5 networks, performance, prevent attacks, it management, data management, business technology, data center
    
F5
Published By: IBM     Published Date: Oct 10, 2013
With IBM Network Connectivity Managed Services, you can control costs, improve performance and streamline operations with feature-rich services that are designed to help build and proactively manage your enterprise WAN.
Tags : 
ibm, network connectivity, managed services, manage connectivity, improve performaces, reduce business costs, streamline operations, proactively manage, network services, ibm network, networking
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Mobile computing via smart phone, laptop, tablet and e-reader is becoming commonplace in the enterprise today. Unfortunately, so are the challenges it brings. This White Paper examines the network security, device management, network performance and user expectation issues you need to solve for effective mobile collaboration, and outlines the planned, architectural approach IBM recommends.
Tags : 
mobile computing, smart phones, wireless devices, device management, security, network performance, user expectations, mobile collaborations, architectural approach, mobile onslaught, networking, wireless
    
IBM
Published By: Cisco     Published Date: Apr 10, 2015
Public cloud services and mobility are driving business needs where the Internet and MPLS play an equally important role for enterprise connectivity. Network planners must establish a unified WAN with strong integration between these two networks to avoid application performance problems.
Tags : 
cisco, cloud computing, public cloud, cloud services, enterprise, connectivity, application performance, design and facilities
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
The Cisco Intelligent WAN (IWAN) solution provides design and implementation guidance for organizations looking to deploy wide area network (WAN) transport with a transport-independent design (TID), intelligent path control, application optimization, and secure encrypted communications between branch locations while reducing the operating cost of the WAN. IWAN takes full advantage of cost-effective transport services in order to increase bandwidth capacity without compromising performance, reliability, or security of collaboration or cloud-based applications.
Tags : 
cisco, wan, iwan, network transport, path control, cloud computing
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Not all 802.11ac solutions are the same, with the right approach, you can combine the mobility of wireless with the performance of wired networks. To get up to speed on 802.11ac, we're providing an 802.11ac migration cheat sheet and webinar on-demand.
Tags : 
cisco, 802.11ac, wireless, wifi, network performance
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Cisco engaged Miercom to conduct a competitive analysis of its Catalyst 2960-X switch versus two comparable Hewlett-Packard switches from the 2920 and 5120 product families. Miercom executed comprehensive hands-on testing and evaluated the performance of some widely deployed features that are critical for reliable functioning of enterprise networks. The test methodology focused on specific areas in which Cisco believed there were key competitive differentiators between the products. Test results validated include throughput, latency, energy efficiency, stacking, LACP load balancing and Quality of Services (QoS) performance. Miercom found that the Cisco Catalyst 2960-X demonstrated superior performances against the competitive switches in the tests featured in this report.
Tags : 
cisco, miercom, competitive analysis, catalyst switch, wifi, wireless
    
Cisco
Published By: Cisco     Published Date: Jun 10, 2015
Network planners must establish a unified WAN with strong integration between these two networks to avoid application performance problems.
Tags : 
wifi, wireless, technology, network, application
    
Cisco
Published By: Cisco     Published Date: Sep 16, 2015
Public cloud services and mobility are driving business needs where the Internet and MPLS play an equally important role for enterprise connectivity. Network planners must establish a unified WAN with strong integration between these two networks to avoid application performance problems.
Tags : 
applications, systems integration, cloud, platform, wan
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
This document discusses the hardware architecture of the new switch platforms in the Cisco Nexus® 9000 Series Switches product family: in particular, the Cisco Nexus 9200 platform switches. The Cisco Nexus 9200 platform is a new extension of the Cisco Nexus 9000 Series. The platform uses a compact fixed-switch form factor and operates in the NX-OS mode, based on Cisco NX-OS Software. Built with next-generation Cisco application-specific circuits (ASICs), the Cisco Nexus 9200 platform brings high-performance and high-density 25, 50, and 100 Gigabit Ethernet connectivity to data center networks, providing industry-leading performance, power efficiency, and capabilities in compact fixed-form-factor switches.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
The data center infrastructure is central to the overall IT architecture. It is where most business-critical applications are hosted and various types of services are provided to the business. Proper planning of the data center infrastructure design is critical, and performance, resiliency, and scalability need to be carefully considered. Another important aspect of the data center design is the flexibility to quickly deploy and support new services. Designing a flexible architecture that can support new applications in a short time frame can result in a significant competitive advantage. The basic data center network design is based on a proven layered approach that has been tested and improved over the past several years in some of the largest data center implementations in the world. The layered approach is the foundation of a data center design that seeks to improve scalability, performance, flexibility, resiliency, and maintenance.
Tags : 
    
Cisco
Published By: McAfee     Published Date: Oct 10, 2013
Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
Tags : 
mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, business technology
    
McAfee
Published By: cPacket Networks     Published Date: Oct 02, 2014
The modern applications delivery environment is distributed and dependent on data centers and network connectivity. Therefore, users are increasingly dependent on consistent network performance for day-to-day activities. Learn what pitfalls a business should avoid when implementing a network monitoring solution.
Tags : 
cpacket, cpacket networks, data center, network intelligence, network performance, application delivery, cloud computing, cloud network, infrastructure
    
cPacket Networks
Published By: Riverbed     Published Date: Jun 02, 2015
This brief focuses on performance gains when using SteelHead SaaS with Office 365 for multi-tenant cloud services.
Tags : 
microsoft office, riverbed, saas, enterprise networks, application latency, network performance, cloud-based, optimization, network upgrades, cloud computing
    
Riverbed
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept