network applications

Results 326 - 350 of 380Sort Results By: Published Date | Title | Company Name
Published By: Signiant     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery
    
Signiant
Published By: Quocirca     Published Date: Mar 06, 2007
Arguably IP is the most successful open standard ever, but as network communications converge under a single standard used for an increasing number of applications, we need to understand how effectively these critical assets are being managed. Read more in this white paper now.
Tags : 
networking, ip networks, ip telephony, voip, convergence, voice over ip, network management, telecommunications
    
Quocirca
Published By: Quocirca     Published Date: Jul 11, 2007
Wide areas networks (WANs) are essential to the majority of businesses, connecting remote locations and individuals back to centralized IT resources. But as the network is expected to handle more bandwidth intensive applications such as voice and video it is essential to ensure the WAN usage is well managed – eliminating unwanted traffic and accelerating business content.
Tags : 
wan, wans, wide area network, wan acceleration, remote workers, bandwidth management, traffic management, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Apr 09, 2008
Today, many organizations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications.
Tags : 
quocirca, application security
    
Quocirca
Published By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : 
quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip
    
Quocirca
Published By: Neterion     Published Date: Dec 05, 2006
The relentless growth of data and network-intensive applications such as digital imaging, multimedia content, and broadcast/video continues to drive volumes of enterprise data and network traffic. As growth continues, IT managers are challenged with implementing solutions without interrupting critical business processes.
Tags : 
network infrastructure, traffic management, bandwidth management, bandwidth, network management, neterion
    
Neterion
Published By: Neterion     Published Date: Dec 05, 2006
Virtualization is a key strategy for simplifying deployment of IT resources and maximizing their utilization. Specifically, virtualization refers to the concept of abstracting physical resources such as compute cycles, data storage, and network bandwidth, and then provisioning and sharing these resources amongst multiple applications.
Tags : 
virtualization, data center, data centers, datacenters, resource management, it management, network management, virtual
    
Neterion
Published By: Tripp Lite     Published Date: Jan 24, 2007
Voice over IP (VoIP) is exploding in popularity as an application for business data networks. As a result, a company can lower its hardware and service costs while raising productivity through the use of more customizable telephony applications.
Tags : 
voice over ip, voip, ip telephony, call center management, quality of service, network infrastructure, infrastructure, power
    
Tripp Lite
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
TrueUpdate 2.0 is a comprehensive solution for software developers, network administrators and IT departments wanting to integrate automated update capabilities into their software applications and business processes. Read through a comprehensive list of features, and learn about the system requirements of TrueUpdate 2.0.
Tags : 
software development, networking, it management, indigo rose
    
Indigo Rose Corporation
Published By: Jumpnode Systems     Published Date: Jun 12, 2007
Network monitoring software packages require complex installation, ongoing maintenance and additional costs for servers and third-party applications. Software-as-a-Service (SaaS) network monitoring alternatives greatly simplify implementation and maintenance, but they rely on uninterrupted Internet access to function, often require complex VPNs or firewall modifications, and typically provide limited access to historical data.
Tags : 
monitoring, software as a service, saas, high availability, network management, jumpnode
    
Jumpnode Systems
Published By: ColdSpark     Published Date: Feb 23, 2007
Though legacy open-source email network applications like sendmail and postfix are widely used, the escalating demands of today's enterprise environments have outpaced their capabilities. Large organizations must now look to implement a true enterprise mail transport platform to support the standards of their current and growing business. Learn how to modernize your email system now.
Tags : 
email, email infrastructure, sendmail, postfix, email server, email servers, email routing, email platform
    
ColdSpark
Published By: AT&T     Published Date: Jun 25, 2008
Class of Service (CoS) functionality can help optimize network performance. For a successful deployment, network designers should identify all applications, understand requirements associated with each application, designate appropriate mapping for groups of applications and provide mechanisms in the underlying network to deliver CoS. CoS mapping and deployment are important; adhering to tested strategies and avoiding common misconceptions helps IT managers advance optimization across the wide area network.
Tags : 
class of service, service management, traffic management, bandwidth, at&t, att, network performance management
    
AT&T
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Solarflare Communications Inc.     Published Date: Feb 22, 2008
This paper will discuss the TIA-942 Data Center standard with emphasis on data center cabling and 10 GBASE-T twisted-pair Ethernet Data center applications.
Tags : 
data center, datacenter, cabling, cable, solarflare, twisted pair, copper
    
Solarflare Communications Inc.
Published By: WiChorus     Published Date: Nov 05, 2007
Rising demand for multimedia applications and mobile usage requires new paradigm to shift voice-oriented cellular architecture into data-oriented networks in order to serve bandwidth hungry packet based applications which include but not limited to multimedia gaming, mobiTV, streaming media, P2P, etc. Data oriented network requires 20-fold fatter air link and backhaul as compared to typical voice communication.
Tags : 
wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group
    
WiChorus
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Today’s web and application infrastructure continues to expand applications for e-commerce, and communications with customers, partners and internal employees. For those responsible for deploying, maintaining and supporting these networked applications, there is an increasing need to get the highest performance out of datacenter equipment, while simplifying the complexity that causes excess overhead and unnecessary costs.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies
Published By: Signiant Inc.     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery
    
Signiant Inc.
Published By: Tail-f Systems     Published Date: Sep 16, 2008
The NETCONF protocol is a modern building block for device management automation, offering a unified approach to network configuration, rather than a device-specific methodology. To equipment vendors, NETCONF is a way to standardize the management interface of network elements. To service providers, NETCONF is a way to optimize the administrative workflow, by moving management intelligence out of the device under management, and consolidating this management into higher-level applications.
Tags : 
netconf, netconf standard, device management automation, network standard, ietf standard, tail-f, tailf
    
Tail-f Systems
Published By: Tail-f Systems     Published Date: Oct 01, 2008
Network management systems must adapt to meet the requirements of next generation networks.  For example, a user interfaces may need to be refreshed with a state-of-the-art Web interface or support for the NETCONF protocol may be required to help customers deploy scalable networks. Adding functionality and integrating with existing applications and data stores has multiple trade-offs in terms of development time and system efficacy.
Tags : 
network management, next-generation networks, netconf, legacy networks, network management systems, tail f, tail-f, tailf
    
Tail-f Systems
Published By: Network Automation     Published Date: Dec 08, 2008
In order to deliver quality patient care, Health First must exchange information with a large number of partners, customers, and vendors on a timely basis. Complicating this enormous task is the fact that Health First has over 15 business units using a variety of mission-critical applications.
Tags : 
network automation, mission critical applications, process automation, automate
    
Network Automation
Published By: K Alliance, LLC     Published Date: Nov 14, 2008
The Cisco CCENT (Cisco Certified Entry Networking Technician) certification validates the skills required for entry-level network support positions, the starting point for many successful careers in networking and our course will help you prepare for passing the certification exam with flying colors. In this training course you’ll learn: Common Physical Components of a Network , Interpreting a Network Diagram and Impact of User Applications on the NetworkTest drive our Unlimited Online IT Training Library for FREE FOR 1 week!
Tags : 
k-alliance, cisco, cisco certification, it certification, interpreting a network diagram
    
K Alliance, LLC
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
    
Ecessa Corporation
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
For the IT personnel responsible for deploying, maintaining and supporting these networked applications, there is an increasing requirement to get the highest performance out of network equipment, while simplifying the complexity that causes excess overhead and unnecessary costs. However, there is hope. Download this white paper to learn how to achieve efficiencies and competitive advantages through affordable, yet feature-rich WAN optimization technologies.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
    
Ecessa Corporation
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
To achieve greater productivity, employees at headquarters, telecommuters, business partners and customers must all have unhindered access to critical applications. Any delay in delivering these applications can cause user productivity to suffer and adversely affect business profitability. WAN link controllers are an affordable solution for ensuring the optimum performance, reliable delivery and protection of applications. They optimize network bandwidth and ensure the delivery of critical applications. Download this white paper to learn how to achieve efficiencies and competitive advantages through the adoption of affordable, yet feature-rich WAN link controllers.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
    
Ecessa Corporation
Published By: SAS     Published Date: Apr 20, 2017
Hype and hope Big Data has generated a lot of both. Thanks to an abundance of enterprise information systems, networks, applications and devices that churn out huge volumes of information, government agencies are awash in Big Data. Add to this data growth the emerging trend of the Internet of Things (IoT) the network of people, data, things and processes that is increasingly linked through automated connections and sensors and the future of Big Data can seem quite daunting.
Tags : 
    
SAS
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.