traffic

Results 251 - 275 of 467Sort Results By: Published Date | Title | Company Name
Published By: Hubspot     Published Date: Apr 23, 2013
Whether you're just getting started with internet marketing or you want to brush up on the basics, this ebook can serve as your essential guide to setting up and implementing a successful internet marketing strategy, step by step.
Tags : 
online marketing, keyword strategy, website optimization, seo, search engine optimization, blogging, lead generation, social media, increase web traffic
    
Hubspot
Published By: Palo Alto Networks     Published Date: Dec 11, 2013
Legacy firewalls aren't designed to address today's complex network traffic consisting of applications, users, and threats. They rely on outdated technology. Read how a new modern security platform safely enables any technology and application. - Learn why yesterday's methods can't handle today's cyberthreats - Find out if your firewall has the ability to see and control traffic, and prevent APTs - Discover how you can deliver modern security without compromising performance - Read why bolt-on security is a costly approach to security
Tags : 
cybersecurity, firewalls, palo alto, technology, application, network traffic security, prevent atps
    
Palo Alto Networks
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
Software-Defined Wide Area Network (SD-WAN) is the application of software-based network technologies to WAN connections to more effectively route all network traffic between headquarters or data centers, remote and branch offices, and the cloud.
Tags : 
software-based networking, cloud data, sd-wan
    
VMware SD-WAN by VeloCloud
Published By: XO Communications     Published Date: Apr 13, 2015
Explore the optimization tools that give you the ability to see and control the performance and security of your WAN traffic, a vital component to your cloud success. Among other things, these tools help you counteract the effects of latency introduced by geographical WAN distances and allow you to alleviate network congestion that might results from sending a lot large files and retransmitting dropped packets.
Tags : 
    
XO Communications
Published By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.
Tags : 
shadow it, hybrid cloud management, visibility, network security, cloud traffic, wan
    
XO Communications
Published By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.
Tags : 
xo mpls ip-vpn, traffic bottlenecks, order processing, vpn
    
XO Communications
Published By: Xangati     Published Date: Sep 14, 2015
Efficiency is not about maxing out utilization, nor is it about achieving the highest possible MIPS, IOPS or any other standard metric. Technically, efficiency is about the ratio of useful work performed to the energy expended in doing that work. You want the greatest amount of output from your IT infrastructure for the lowest possible cost. It’s a bit like long-distance driving and working to achieve the highest possible miles per gallon through constant observation of time, speed and gas consumption in the face of varying traffic and weather conditions. Flooring the gas pedal is not always the best option. What can you do to optimize your converged infrastructure efficiency? While there are no 10-second, quick-fix answers, here are five strategies you can start implementing right now to bring your organization much closer to optimal efficiency and long-term cost savings.
Tags : 
infrastructure efficiency, optimal efficiency, long-term cost savings, utilization
    
Xangati
Published By: Nokia     Published Date: Aug 04, 2016
This paper outlines the key elements of an enterprise POL and explains why it is the best enterprise network option for tomorrow’s digital enterprise.
Tags : 
passive optical lan, enterprise networks, digital enterprise, traffic volume, enterprise lan
    
Nokia
Published By: IBM     Published Date: Mar 04, 2009
Celina Insurance case study that shows cost reduction and increased productivity - faster, better service to agents and their customers due to integrated systems and real-time collaboration; being “easy to do business with” secures agent loyalty; 50 percent reduction in phone calls and costs due to instant messaging option, and 40 percent reduction in head count while maintaining the same volume of business due to streamlined processes.
Tags : 
lotus software, ibm, celina insurance, lotus extranet, streamlined processes, reduction in intranet traffic, integrated systems, lotus notes, domino 8
    
IBM
Published By: NexGen     Published Date: Feb 09, 2015
Has your organization been dealing with storage latency and performance issues? With a population of nearly 10 million people, Los Angeles County is the most populous county in the United States. It's no surprise that with 1.5 million people taking public transportation every day to help ease some of LA County's infamous traffic, making sure passengers get where they're going is a monumental task. At the heart of it all is the organization's IT department. The LA Metro infrastructure consists of 600 servers, 500 of which are virtualized. When the city's IT team began receiving user complaints and experiencing performance issues with their Virtual Desktop Infrastructure (VDI) environment, they began looking for alternatives. Download the case study now and learn how replacing the city's existing storage solution helped solve a wide range of technical problems and eliminated unnecessary latency, ensuring all 1.5 million passengers got where they needed to be.
Tags : 
nexgen, flash, la metro, vdi, vmware, vdi
    
NexGen
Published By: BrightCove     Published Date: Dec 12, 2008
With the explosive growth of online video, many marketers are experimenting with a variety of distribution strategies. Discover how you can quickly, easily develop the right distribution strategy for your online video content. The right distribution strategy can increase traffic to your website, build a more widely known and influential brand, and tap into previously unreachable customer bases.
Tags : 
brightcove, online video, online video distribution, search engine optimization, viral, syndication, revenue sharing
    
BrightCove
Published By: Cisco     Published Date: Jan 28, 2009
A wireless network can help your employees stay productive as they move around your company. But to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users. Every device in a wireless network is important to security. Because a wireless LAN (WLAN) is a mobile network, you need a thorough, multilayered approach to safeguard traffic.
Tags : 
cisco, wireless lan, wlan, mobile network, wireless network, antivirus policy, identity policy, remote access policy, password policy, cisco asa 5500, secure vpn
    
Cisco
Published By: ESET     Published Date: Jan 21, 2010
The traffic lights are always at amber on the Internet, because there are always risks, so here are some tips for reducing your exposure to attacks from cybercriminals.
Tags : 
eset, security, cybercriminal, internet security, malware, back up and recovery, phishing
    
ESET
Published By: Savvis     Published Date: Jul 07, 2010
In addition to keeping the Hallmark.com site up during huge traffic spikes experienced during critical business periods, Savvis is helping Hallmark stay on the leading edge by supporting initiatives to expand upon its line of innovative new digital products and services.
Tags : 
savvis symphony, managed infrastructure, outsourcing
    
Savvis
Published By: SAS     Published Date: Jun 05, 2017
For many of us, the term “smart city” conjures up images of sensors collecting data about everything from traffic patterns to energy use. It’s common for government leaders to think, “That’s not for us. We’re not there yet.” But if your organization is collecting data of any kind, you are in a position to use that data to create a smarter city for your citizens.
Tags : 
    
SAS
Published By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper explains the epidemic threat of hackers injecting hidden malware into websites and the negative effect on the brand and traffic to the victim website when blacklisted by Google as a "harmful" website.
Tags : 
globalsign, hackalert, blacklisting, malware, drive by downloads, malware distribution, hacked websites, malware injection
    
Globalsign Inc.
Published By: BHC Rhodes     Published Date: Oct 06, 2011
Engineers at BHC RHODES in Overland Park, Kan., helped the city of Kansas City create and implement an effective system for tracking assets with RFID.
Tags : 
traffic, inventory, engineering, rfid
    
BHC Rhodes
Published By: Cisco     Published Date: Jan 20, 2012
In this whitepaper, Cisco provides recommendations on a building strategic network to address business needs for today and tomorrow.
Tags : 
ipv6, cisco, transition, communication, migration, security, performance, version 6, internet protocol, ipv4, ipv6, security, video traffic, cloud infrastructure, network performance
    
Cisco
Published By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : 
mobile devices, smart phones, cybercrime, mobile, policy, cisco, transition, communication, migration, security, performance, version 6, internet protocol, ipv4, ipv6, security, video traffic, cloud infrastructure, network performance
    
Cisco
Published By: IBM     Published Date: Jul 11, 2012
This paper discusses the challenges of managing applications in highly dynamic IT environments such as public and private Clouds. Modern enterprise applications are engineered for agility and are frequently deployed over flexible IT infrastructures.
Tags : 
modern applications, architectures, infrastructure, cloud, dynamic it, web traffic, scalability, reliability, flexibility, public cloud, private cloud, mission-critical applications, custom applications, service oriented architecture, soa, virtualization, addm, diagnostics, discovery, end-user monitoring
    
IBM
Published By: Limelight Networks     Published Date: Mar 02, 2018
In the increasingly competitive OTT market, competition for viewers is high. Providers must find ways to not just deliver compelling content, but to deliver compelling viewing experiences. In this whitepaper, you’ll learn about the critical challenges facing OTT providers today and how they can be overcome to provide the broadcast quality experiences viewers expect, regardless of the device in use or the viewers location in the world. Are you ready to keep your subscribers happy and away from your competition? Download this free white paper OTT 3.0: How to Build a Better Mousetrap and learn: Why personalized content discovery is so important to viewers – and to the success of your business How to avoid internet congestion by leveraging technologies like a CDN The importance of global network scale to meet spikes in consumer traffic The impact of advertising on viewer abandonment
Tags : 
    
Limelight Networks
Published By: McAfee     Published Date: Apr 14, 2014
Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks..
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw, ngips, next generation ips, next gen firewall, next gen ips
    
McAfee
Published By: SafeNet     Published Date: Jan 14, 2014
WAN optimization is a widely used technology that improves the efficiency of network data transmission. SafeNet Ethernet encryptors are Layer 2 (data link) appliances that secure traffic at wire speeds across wide area Ethernet services to provide protected information transmission. This paper discusses the scenario where both encryption and optimization are used across a WAN and the design considerations required.
Tags : 
wan optimization, wan, encryption, network data security, wan acceleration, safenet
    
SafeNet
Published By: VMTurbo     Published Date: Jul 08, 2015
This paper explores the benefits of incorporating network traffic to topology information in VM placement decisions, as well as the integration between VMTrubo and Arista Networks.
Tags : 
application assurance, application quality, integration, application management, virtualization, mobility, storage virtualization, application delivery
    
VMTurbo
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.