Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Dec 2013

    3 ways clinicians can leverage a patient portal to craft a healthcare community

    You probably have several goals for your patient portal of choice. Is “community” one of them? With a bevy of vendors offering portal solutions, it can be challenging for a hospital to know where to start. Fortunately, YourCareCommunity helps ease the decision-making process.

    Sponsored By Healthtech Holdings

  • White Papers // Oct 2013

    AppAssure 5: The next generation of backup, replication and recovery software

    IT environments are increasingly complex, with virtual and physical machines spread across local, offsite and—increasingly—cloud resources. AppAssure 5 alleviates these concerns with fast backup and even faster replication and recovery. As a key data protection element of Dell’s Fluid DataTM Architecture, AppAssure 5 controls cost, optimizes performance and enhances protection...

    Sponsored By Dell

  • eBooks // Mar 2014

    Understanding the Real Impact of Social Media Monitoring on the Value Chain eBook

    This document will detail the form, extent, and impact of social media monitoring and analytics on supply chain processes and e-commerce initiatives.

    Sponsored By IBM

  • White Papers // Oct 2013

    IT Security. Fighting the Silent Threat

    Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks, such as: ...

    Sponsored By Kaspersky Lab

  • White Papers // Feb 2014

    FTP Risk Advisor Tool

    By answering 12 questions, this online tool will provide you with a customized report with recommendations to remediate your FTP risk.

    Sponsored By IBM

  • White Papers // Apr 2013

    The future of email and application is social.

    This white paper examines the state of collaboration in today's enterprise and provides an IBM point of view on how collaboration will evolve, along with how Notes and Domino software will fit into the new collaboration equation.

    Sponsored By IBM

  • Webcasts // Mar 2014

    On-demand Webcast: Enterprise-proofing the Apple ecosystem with Centrify and Aqua Connect

    Here's something new. Most IT folks are familiar with terminal services on Windows Server, but did you know you can provide remote, secure terminal services with OS X? It's not only possible; it's a technology that allows you to provide the entire Macintosh experience to neglected corporate and enterprise users...

    Sponsored By Centrify

  • eBooks // May 2011

    The Modern Office and You: 5 Ways to Capitalize on Cloud Opportunities

    Many technology providers are nervous about the Cloud and what it means for their business. Rather than look at the Cloud with fear, embrace it and take advantage of the opportunities it brings for new revenue. In this eBook, you’ll learn 5 ways to capitalize on the future of the...

    Sponsored By ConnectWise

  • White Papers // Apr 2013

    Getting the Most Out of Your Next-Generation Firewall

    Network administrators are encountering the highest levels of change in history as they attempt to balance security with productivity. Rapidly evolving business trends are challenging them to provide widespread but safe Internet access, allowing employees to use legitimate business applications while using their device of choice. Applications have evolved to...

    Sponsored By Cisco

  • White Papers // Jan 2014

    Download Lippis’ “Top 6 Recommendations for Selecting an Ethernet Fabric”

    Deploying the correct Ethernet fabric is integral to any organization, but selecting it can be daunting. Fortunately, the Lippis guide Top 6 Recommendations for Selecting an Ethernet Fabric reports the findings from a recent study of several types of Ethernet fabric and provides recommendations based on the results.

    Sponsored By Brocade

  • Downloads // Oct 2013

    Intel® Parallel Studio XE 2013 SP1

    Efficiently boost application performance. This development suite offers industry-leading compilers, along with highly tuned performance libraries for math, crypto, imaging, compression, and others. Harness performance from the latest processors simply by recompiling your code. Scale for multicore and many-core architectures with Intel® Threading Building Blocks and Intel® Cilk Plus™ parallel...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Intel® Inspector XE 2013

    Intel® Inspector XE finds memory leaks, corruption, deadlocks, data races, and more in C, C++, C#, F#, Fortran, and MPI applications. Use a normal build: no special compiler or recompiles are required. Heap growth analysis and debugger breakpoints simplify diagnosis of difficult bugs early in the development cycle―when they are...

    Sponsored By Intel Software

  • Case Studies // Mar 2014

    Cisco Annual Security Report 2014 (CASR)

    You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the...

    Sponsored By Sourcefire, Inc.

  • White Papers // Dec 2013

    Patient Portals: A Platform for Connecting Communities of Care

    Connecting patient health data across the care continuum is essential to achieve improved care, increased access to personal health records and lowered costs. A successful approach rests in having the hospital serve as the connectivity hub for bringing patients, care givers and healthcare professionals together in a secure, online environment....

    Sponsored By Healthtech Holdings

  • eBooks // Feb 2014

    eGuide to Data Movement and Governance

    The purpose of this eGuide is to help you grasp the measures that can keep your organization on track to meet objectives and in line with regulations. What’s more, it’s your chance to become more effective in your job and build the confidence to bring valuable suggestions to your security...

    Sponsored By IBM

  • White Papers // Feb 2014

    3 Key Guidelines To Help Increase Energy Efficiency In The Data Center

    Nobody needs to tell you that energy efficiency is at the top of the data center’s to-do list. Every data center is looking to cut power consumption while maintaining the highest level of service. But achieving real energy efficiency is easier said than done. Sprawling and convoluted infrastructures make it...

    Sponsored By Emerson Network Power

  • White Papers // Jul 2013

    2013 Gartner Magic Quadrant for SIEM

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Sponsored By IBM

  • White Papers // Feb 2014

    Manage Identity and Access for Continuous Compliance and Reduced Risk.

    As organizations strive to securely deliver high-quality, high-availability services to their user communities, they grapple with cost control and ever-changing user populations, access points,and applications. But that is only part of a larger challenge related to identity and access management (IAM). Services must be delivered solely to the right people,...

    Sponsored By IBM

  • White Papers // Jan 2013

    Types of Electrical Meters in Data Centers

    There are several different types of meters that can be designed into a data center, ranging from high precision power quality meters to embedded meters (i.e. in a UPS or PDU). Each has different core functions and applications. This white paper provides guidance on the types of meters that might...

    Sponsored By APC by Schneider Electric

  • Case Studies // Mar 2014

    IDC Analyst Report: Distributed Denial of Service Attacks - Time for a New Defense

    Executives and managers of information security need to take a proactive approach to DDoS defense because the impact can extend well beyond lost revenue and threaten a company's brand equity. All enterprises need to have mitigation solutions in place. Featured in this Report: How DDoS has become a...

    Sponsored By Arbor Networks

  • eBooks // Oct 2013

    5 Technology Trends you Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • Case Studies // Apr 2014

    Forrester Report: Surviving the Technical Security Crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren't enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

    Sponsored By IBM

  • White Papers // Apr 2014

    APM Mobility Case Study

    Most of the organisations wanted to have an effective and efficient communications to their clients. This study gives you an idea on how to simplify smartphone integration and capitalise on Shoretel Unified Communications features and cost-saving call capabilities. Read this case study today to learn how Shoretel gives you...

    Sponsored By ShoreTel

  • White Papers // Feb 2014

    Transforming change into a competitive advantage

    This paper provides an overview of new approaches, tools and solutions for global collaboration throughout the development lifecycle can help you effectively manage change and complexity in the development of smarter products.

    Sponsored By IBM

  • White Papers // Mar 2014

    Using Anomalies in Crash Reports to Detect Unknown Threats

    One of the biggest challenges organizations face when protecting their intellectual property and other sensitive data is detecting, inspecting, and stopping attacks that are capable of bypassing their cyber defenses. This white paper examines the “risk indicators” that can be observed in the anomalous activity taking place across a network....

    Sponsored By Websense

  • White Papers // Jan 2014

    Bring ROI to Your BYOD - Forrester Documents Benefits of Managed Mobility

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program. In this study, you’ll learn how to improve workplace flexibility, reduce overhead and admin costs and increase productivity.

    Sponsored By IBM

  • White Papers // Dec 2013

    Cloud Resource Management the Right Way

    Find out how Red Hat® CloudForms gives IT administrators and managers a comprehensive solution to optimize their virtual, private cloud, and hybrid cloud infrastructures with advanced capacity planning and sophisticated resource management capabilities.

    Sponsored By Red Hat

  • White Papers // May 2013

    Top five questions you should ask before purchasing a two-factor authentication solution

    Two-factor authentication is critical for safeguarding your company’s critical information. In this technical brief, discover five things to know before purchasing a two-factor authentication solution, and which solution is the best fit for your business.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.

    Sponsored By Dell Software

  • White Papers // Jun 2013

    Why Complexity Is IT Security’s Worst Enemy

    Organizations across the world continue to strive for greater agility, efficiency and innovation. But they also need to cut costs, improve productivity and become more competitive. While this is nothing new, the fact remains that IT is arguably the key department tasked with supporting these needs and ultimately making this...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data under Siege: Protection in the Age of BYODs

    You would be hard pressed to find a single employee who comes to the office without a personal mobile device. Most probably use those devices outside the office to send work-related email messages. BYOD is a reality in today's business world. Is your IT department a roadblock that employees go...

    Sponsored By Kaspersky Lab

  • White Papers // Oct 2012

    Big Data: Trends, Strategies, and SAP Technology

    The intelligent economy has arrived. The convergence of intelligent devices, social networking, pervasive broadband communications, and analytics is redefining relationships among producers, distributors, and consumers of goods and services. The growth in volume, variety, and velocity of data has created new challenges and opportunities.

    Sponsored By SAP

  • White Papers // Jan 2014

    Adding Zero-Day Offense to Vulnerability Management

    This paper describes why your organization is vulnerable to zero day attacks and what you can do to add a zero-day offense to existing vulnerability management processes. It also describes how the Qualys Zero-Day Risk Analyzer enhances capabilities of the QualysGuard Cloud Platform with targeted intelligence and workflow to...

    Sponsored By Qualys

  • White Papers // Jul 2012

    Bring Your Own Device Policy Guidebook

    Since 2008, Aberdeen research has been tracking a radical transformation taking place in the enterprise: more and more organizations are permitting, even encouraging employees to bring their own mobile devices into the workplace to be used for work purposes. While at first appearing to radically lower the cost of enterprise...

    Sponsored By SAP

  • White Papers // Jan 2014

    How Monitoring Systems Reduce Human Error in Distributed Server Rooms and Remote Wiring Closets

    Surprise incidences of downtime in server rooms and remote wiring closets lead to sleepless nights for many IT managers. Most can recount horror stories about how bad luck, human error, or just simple incompetence brought their server rooms down. This paper analyzes several of these incidents and makes recommendations for...

    Sponsored By Schneider Electric

  • White Papers // Jan 2014

    BYOD and the seamless Integration of Macs in a Windows Based Environment:

    As Macs continue to permeate the enterprise Windows servers network environment, IT must be ready and able to support these devices— especially as employees are already, and will continue to, access the corporate network from their personal devices. Is your network equipped to handle seamless Mac/Windows integration? Read our recent...

    Sponsored By Acronis

  • White Papers // Feb 2014

    Advancing Business Value through Virtualization : Quantitative and Qualitative Insights (ESG)

    To realize the performance, availability, and agility benefits that virtualization can provide, your data center infrastructure must be able to support the initiative. This informative paper evaluates the prevalence and efficacy of data center virtualization deployments, and the hardware that supports them, so that you can determine what adjustments your...

    Sponsored By Hewlett-Packard & Intel®

  • White Papers // Feb 2014

    IT Trends: 8 ways to stay ahead of the IT evolution

    The HP Technology Consulting efforts have created an informative guide to help separate the misguided hype from the stone cold facts, helping you avoid many obstacles that get in the way of building a better IT infrastructure. Sponsored by HP and Intel®: ...

    Sponsored By Hewlett-Packard & Intel®

  • White Papers // Jan 2014

    Improving Engagement with Multi-Channel Service

    Abstract: Best-in-Class organizations execute on a strategy that supports the multi-channel nature of customer requests. These leading organizations do not just open up their service infrastructures to accommodate new channels, but also empower their teams to deliver an effective and consistent experience regardless of the channel selected by the customer....

    Sponsored By LogMeIn

  • White Papers // Nov 2013

    Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls

    Mobility has brought down the wall between business and personal, spiking corporate productivity and putting work/life balance within reach. The bring-your-own-device (BYOD) phenomenon is a way to be constantly connected for work, family, and play. Companies that do not adapt and allow people to work where, when, and how they...

    Sponsored By Cisco