RSS feed Get our RSS feed

News by Topic

data networks

Results 201 - 225 of 255Sort Results By: Published Date | Title | Company Name
By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
     SPSS, Inc.
By: Cisco     Published Date: Jan 05, 2015
The four pillars of computing — cloud, mobility, social, and analytics — are driving new levels of network innovation in datacenter networks. These forces are now buffeting the datacenter along with virtualization and the Internet of Things (IoT), resulting in sweeping changes in traffic patterns that expose the limitations of traditional networks and their operational models. To become a resource rather than a bottleneck to overall datacenter performance, the network must deliver not just exceptional performance and scalability but also unprecedented automation and orchestration that can yield agility, flexibility, and service velocity. This Technology Spotlight examines these key trends and discusses the role that Cisco's Application Centric Infrastructure (ACI) plays in addressing these ongoing challenges for enterprise IT and network managers.
Tags : cloud computing, infrastructure, marketplace, application, hybrid, enterprise
     Cisco
By: Cisco     Published Date: Jan 05, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : cloud computing, infrastructure, marketplace, application, hybrid, enterprise
     Cisco
By: Cisco     Published Date: Jan 15, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter
     Cisco
By: Cisco     Published Date: Jan 20, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : datacenter, optimization, computing, enterprise, scalability, network, orchestration, innovation
     Cisco
By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: distilnetworks     Published Date: Jun 13, 2014
In the 2014 Annual Bad Bot Report, Distil Networks identifies the trends and changes of bad bot activity over the past year. This report serves as the industry standard of defining malicious attacks and reporting on bad bot origins and makeup to help organizations prepare for, and mitigate, this rapidly accelerating security threat.
Tags : block bot, block bots, data protection, distil networks, online trust, prevent web scraping, price scraping, web scraping
     distilnetworks
By: Riverbed     Published Date: Aug 19, 2014
EMC® RecoverPoint family provides cost-effective, local continuous data protection and/or continuous remote replication solutions that allow for any-point-in-time data recovery. Riverbed SteelHead WAN Optimization solutions deliver maximum performance for business applications and data transfers over Wide-Area Networks (WANs).
Tags : data protection, performance, optimization, data transfer, wan
     Riverbed
By: Riverbed     Published Date: Sep 05, 2014
Riverbed announced its collaboration with partner VMware to solve performance monitoring visibility challenges arising out of the ongoing evolution of virtual network technologies and architectures within Virtual Data Center (VDC) environments. Speci?cally, Riverbed and VMware have developed IPFIX ?ow record templates that reveal valuable insights into data and session ?ows occurring within virtual networks that use VXLAN. By adding VXLAN support to its Cascade family of solutions, Riverbed will take a market-leading role in applying application-aware network performance management to Software-Defined Networks (SDNs).
Tags : vxlan, performance, monitoring, virtual data, insights, visibility
     Riverbed
By: LeftHand Networks, Inc.     Published Date: Jan 15, 2009
Carefully protecting and managing the storage that holds a company’s data has become one of the most important missions of today’s Information Technology (IT) organizations. With data being a company’s most valuable asset, many are turning to Storage Area Networks (SANs) as a way to meet a number of challenges.  This White Paper looks at how a well built SAN can provide real benefits to your organization and improve overall efficiency within you network.
Tags : lefthand networks, san, storage area networks, simplification of storage, central data storage
     LeftHand Networks, Inc.
By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers, security
     Symantec
By: SocialFlow     Published Date: Jan 08, 2015
This webinar will break down the findings from SocialFlow’s recent study, “Data Drives Social Performance: The Benchmark Study on Organic Publishing to Social Networks” that spans 1.6 million posts that generated 1.5 billion engagements.
Tags : social content publishing, social networks, social media content distribution, customer engagement, emerging marketing, social media, crm & customer care, marketing research
     SocialFlow
By: VisiStat     Published Date: Mar 22, 2007
This report outlines five important "insider" secrets for measuring the effectiveness of your Website, along with tips on how to turn it into a lead generation machine.
Tags : website traffic, visitor tracking, web analytics, web metrics, site analysis, online marketing, site management, increase sales
     VisiStat
By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : wireless, best practices, enterprise security, wi-fi, wireless security, network security, intrusion prevention, lan
     AirTight Networks
By: Alacritech     Published Date: Aug 21, 2009
Today's systems and servers need an efficient way to move the ever-increasing amounts of data over networks. Many companies have introduced solutions such as TCP/IP Offload Engines (TOE) Network Interface Cards (TNICs), Network Interface Cards (NICs), and iSCSI Host Bus Adapters (HBAs) to solve efficiency and throughout challenges. However, the functionality of these solutions is quite varied, and in some cases, rapidly becoming obsolete.
Tags : data transfer, tcp/ip, tnic, nic, hba, iscsi, alacritech
     Alacritech
By: Schneider Electric     Published Date: Feb 12, 2018
Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source. This white paper explains the drivers of edge computing and explores the various types of edge computing available.
Tags : 
     Schneider Electric
By: ProStor Systems     Published Date: Mar 15, 2007
The need for protecting data is universal – whether a small to mid-size business, the largest enterprise data center, or an individual. The recognition of the value of information and the impact of data loss has reached the point where repeating it is no longer required. The issue now has turned to how to protect the data.
Tags : smb, archiving, backup, hardware, security, data management, database security, data protection
     ProStor Systems
By: IBM     Published Date: Apr 23, 2008
This white paper explains the why's and how's of data center transformation. It reveals the breakthrough IBM approach that supports dynamic, service oriented applications and consolidates systems, servers and networks for decreased operational costs on all fronts—freeing up funds for business innovation. Download white paper on new data center.
Tags : it management, service management, datacenter, data center, network, networking, network management, ibm
     IBM
By: IBM     Published Date: Aug 21, 2008
Natural and manmade disasters have costly, far-reaching impacts on businesses. And organizations of all types are making business continuity plans that protect their data, networks, core business applications and facilities. But it’s important to build resiliency into your business operations as well your human capital. This Web seminar on Workplace Recovery will take you through the risks related to human capital resiliency and provide a framework for addressing them.
Tags : ibm, ibm mi, ibm grm, disaster recovery, recovery, business continuity, security, storage
     IBM
By: iDirect     Published Date: Aug 21, 2009
The global demand for voice and data services delivered over cellular networks continues to grow as new markets open and existing ones increase capacity. The networking infrastructure to support subscriber growth and new services have experienced aggressive expansion as the worldwide economy evolves.
Tags : infrastructure, gsm, cellular, telecom, telecommunications, networking infrastructure, network expansion, voice services
     iDirect
By: Reactivity     Published Date: Aug 21, 2009
Businesses are rapidly adopting Web services to provide new levels of integration between applications. By comparison with earlier data communications techniques, Web services are faster and cheaper to develop, quicker to deploy, and easier to adapt to emerging business needs. This paper discusses the special security challenges posed by the use of Web services, and how to secure networks against them.
Tags : web services, web service management, web service deployment, web service, web service security, network security, secure networks, reactivity
     Reactivity
By: Quocirca     Published Date: Jan 11, 2008
Small and medium-sized businesses (SMBs) can benefit from the expansive use of information technology (IT) just as much as their larger counterparts. Indeed, in many cases they have to, because to trade they need to interact with business partners of all sizes and IT failure affects not just internal users but those of third parties.
Tags : insight report, quocirca, smb, small business, soho, mid-sized business, smbs, data security
     Quocirca
By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip
     Quocirca
By: Force10 Networks     Published Date: Dec 04, 2006
This white paper explores the technologies needed to ensure businesses are prepared to meet the new challenges and opportunities of the emerging “answer economy”.
Tags : virtualization, ethernet, it consolidation, consolidation, data center, datacenter, business management, new economy
     Force10 Networks
By: Neterion     Published Date: Dec 05, 2006
As the demand for bandwidth grows, so does the reach of networks. Users need to access data globally, from multiple locations around the world, quickly and transparently without breaking budgets. Data centers locked into servicing only local users unnecessarily constrain growth and expansion.
Tags : storage area network, gigabit, iscsi, datacenter, datacenters, sans, san, storage area networks
     Neterion
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics