Networking

As cloud computing grows, how will it impact the network and communications technologies and management?

  • White Papers // Dec 2014

    Infographic - Accelerating 40G Adoption

    An Infographic from Cisco looking at accelerating 40G adoption. It explores the trends driving the 40G upgrades as well as what it means for you Data Center. Download this Infographic to learn more.

    Sponsored By Cisco

  • White Papers // Dec 2014

    2014 ZDNet Report - Reducing Infrastructure Cost and Complexity Through Colocation

    The growing complexity of managing datacentres is forcing organisations to take a hard look at co-location as a viable alternative to maintaining their in-house datacentre needs. Co-location will allow organisations to have the facilities they need, with provided space, power, cooling, and physical security for the server, storage, and networking...

    Sponsored By M1

  • White Papers // Nov 2014

    IDC Report - Business Value of Managed Services

    Research shows that today's business goals are centered on reducing costs, strengthening customer relationships and improving financial management. The biggest challenges to achieving these goals are lack of skills and investment funds, and inadequate linkages between the IT environment and how business processes are managed. Read this IDC analyst...

    Sponsored By IBM

  • White Papers // Nov 2014

    Why the Nexus 9000 Switching Series Offers the Highest Availability and Reliability Measured in MTBF?

    With 2014 and 2015 being the years of open networking pilots and deployments, respectively, much focus was on the upcoming announcements of high-density 40GbE spine switches from Cisco’s Nexus 9000 series, Arista’s 7500E and HP’s 11900/12900. The new generation of hybrid switching leverages the forwarding and power efficiency gains afforded...

    Sponsored By Cisco

  • Downloads // Nov 2014

    Microsoft Azure: One Month Free Trial

    Windows Azure is Microsoft’s cloud platform. It has been ranked by Gartner as an industry leader for both infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS). This powerful combination of managed and unmanaged services lets you build, deploy, and manage applications any way you like for unmatched productivity. Download the Azure free one...

    Sponsored By Microsoft

  • White Papers // Nov 2014

    Networking for a Smarter Data Centre: Getting it right

    This paper explores how a holistic management approach to networks, servers, storage and applications can aid in the evolution to a smarter data centre and drive optimal value for the organisation. Download this whitepaper now and learn how your organisation can leverage virtualisation for deploying services efficiently and responding to...

    Sponsored By IBM

  • White Papers // Nov 2014

    Redefining networks for cloud, analytics, mobile, social and security - New technologies are pushing networks to the breaking point

    Much has been written about cloud, big data, mobile, social, and IT security as significant forces that are transforming information technology and business. Much less has been said about the impact of these forces on networking—or about the role that networks play when business initiatives are based on them. Download...

    Sponsored By IBM

  • White Papers // Nov 2014

    Operationalizing the Network with SDN

    The focus of SDN is on transforming the network to support applications and meet the expectations of users and businesses that rely on them. Scaling modern networks is challenging due to the explosive growth of compute, network, and application resources─combined with increased mobility of apps migrating to the cloud and...

    Sponsored By F5

  • eBooks // Nov 2014

    Analyzing the Neverquest Malware Threat

    Learn from the F5 Security Operations Center's analysis of the Neverquest malware threat. The team analyzes the programming techniques and methodologies used to develop malware in order to keep F5 security services up to date and effective against any threat. Read this summary report to better understand how it works...

    Sponsored By F5

  • White Papers // Nov 2014

    The 9 Levels of Enterprise Work Hell eBook

    Does arriving at work feel like walking through the very gates of Hell into an office full of unproductive and frustrated people? Read this eBook to learn how your organization can escape the 9 levels of work hell. Get the eBook now.

    Sponsored By AtTask, Inc.

  • White Papers // Nov 2014

    Preparing for Future Attacks: Implementing the Right Security Strategy Now

    Recent malware incidents have shown how costly and damaging cyber attacks can be. Such attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Unleashing IT ACI Special Edition Article

    Virtualization, cloud, and mobility are opening new avenues in the IT world and could require infrastructure changes. The new Cisco® Application Centric Infrastructure (Cisco ACI™) is the future of networking with a holistic architecture, centralized automation, and policy-driven application profiles. Featured customers weigh in on their decision to implement Cisco...

    Sponsored By Cisco

  • White Papers // Nov 2014

    Transform your business by adopting Cisco Application Centric Infrastructure

    The new Cisco® Application Centric Infrastructure (ACI) fabric architecture brings a revolutionary policy-based approach to data center networks with the introduction of the Cisco Nexus® 9000 Series Switches and the Cisco Application Policy Infrastructure Controller (APIC). Enhancements introduced in the Cisco Nexus 9000 Series facilitate programmability of the fabric according...

    Sponsored By Cisco

  • White Papers // Nov 2014

    IDC Whitepaper - Next Gen Virtualization & Hybrid Cloud with ACI (Application Centric Infrastructure)

    The pace of change in IT systems is accelerating as new applications, particularly from cloud and mobile environments, become key business enablers. Organizations are constantly seeking to simplify and optimize their IT infrastructure to make it more adaptable and innovative to get a competitive advantage. IDC has quantified the network-related...

    Sponsored By Cisco

  • White Papers // Nov 2014

    Infographic - Why Choose Application Centric Infrastructure (ACI)

    An infographic explaining application deployment at the speed of business. Application Centric Infrastructure (ACI) is application aware, enables dynamic application instantiation and removal, and is capable of supporting physical, virtual, and cloud integration with full management visibility. Download this infographic to understand how ACI can boost the efficiency of your...

    Sponsored By Cisco

  • Case Studies // Nov 2014

    Case Study - Accelerating Productivity with Cisco ACI

    Learn how Infrastructure-as-a-Service company simplified its data center using Cisco's Application Centric Infrastructure (ACI) approach. Adopting Cisco's ACI, NetApp experienced: • Improvements in the density of throughput and cost per port • Increased productivity of the infrastructure • Integrated visibility and intelligence • Agility enablement of the entire application infrastructure...

    Sponsored By Cisco

  • Research // Nov 2014

    Cisco Application Centric Infrastructure Overview

    Cisco® Application Centric Infrastructure (ACI) is an innovative architecture that radically simplifies, optimizes, and accelerates the entire application deployment lifecycle. This report provides a brief overview of Cisco ACI along with, • Infrastructure problems addressed • Main ACI Components • Benefits of ACI • ACI Services Download this report to learn more.

    Sponsored By Cisco

  • White Papers // Oct 2014

    Eight Must-Have Features for Ultimate Network Security Resource Optimization

    The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations. That doesn’t mean you have to scale down your growth or skimp on key IT security areas, but it does mean you need to optimize your resources, starting with your...

    Sponsored By McAfee

  • White Papers // Oct 2014

    Saugatuck Technology - Optimized Sourcing in Hybrid IT Environments

    This research paper from Saugatuck Technology discusses the multi-sourced hybrid IT environment, including how to recognize the things that can increase costs and compromise operations, and how to optimize the environments for peak effectiveness.  

    Sponsored By IBM

  • White Papers // Oct 2014

    The Next-Generation Data Center: A Software Defined Environment Where Service Optimization Provides the Path

    This white paper explores IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there.

    Sponsored By IBM

  • White Papers // Oct 2014

    2014 Selecting a Managed Security Services Provider: Top 10 Criteria

    A white paper discussing the benefits of outsourcing managed security services and outlining effective strategies, as well as 10 of the most important criteria to consider, when choosing a managed security services provider.

    Sponsored By IBM

  • White Papers // Oct 2014

    Server Managed Services - Integrated Managed Infrastructure

    This service profile provides an overview of Server Managed Services - Integrated managed infrastructure and explains what you can expect from implementation. The paper includes an overview, information on planning and implementation, service delivery, and detailed service descriptions.

    Sponsored By IBM

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • White Papers // Oct 2014

    Firewall Buyers Guide 2014

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: • The fundamentals of modern firewall technology • The ten critical business requirements your next firewall needs to address • Information on how to create a vendor request for proposal...

    Sponsored By Palo Alto Networks

  • Downloads // Oct 2014

    Find the Root Cause of Your Toughest SQL Server Performance Issues in 4 Clicks!

    Slow SQL Server performance? Don't let yourself get tangled up in volumes of server health metrics. Get to the root cause of performance problems in just four clicks. Only SolarWinds Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint...

    Sponsored By SolarWinds

  • White Papers // Sep 2014

    Zero Trust Approach to Network Security

    Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. This paper discusses the need for a Zero Trust approach to network security, how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on...

    Sponsored By Palo Alto Networks

  • Research // Sep 2014

    Fixing the Disconnect Between Employer and Employee for BYOD

    The corporate workplace is changing. As employees increasingly use their own phones/tablets/laptops for work, corporate networks will be increasingly vulnerable to sophisticated viruses and malware - unless these devices are reined in with a BYOD enterprise program. Employees and employers often have vastly different attitudes regarding BYOD programs. To better...

    Sponsored By Webroot

  • Research // Sep 2014

    IT Service Provider Breaks Into Storage Services With Disaster Recovery as a Service

    In this fast-changing technology landscape, are you looking for cost-effective ways to expand the services your enterprise offers while retaining your share of the market? At first glance, branching out into cloud storage services might appear to be a risky proposition, considering the formidable competitors who occupy that space....

    Sponsored By Hitachi

  • White Papers // Sep 2014

    Checklist for Cloud Mobility Readiness

    Are you trying to determine the readiness of your enterprise’s content mobility solution? Today’s mobile worker want real-time, remote and secure access to your enterprise’s fast-growing information. To ensure the right data is in the right place at the right time, your organization needs a solution that provides your workforce...

    Sponsored By Hitachi

  • White Papers // Sep 2014

    Workforce Mobility Comparison Guide

    Are you challenged to find a mobile solution that enables employees to safely create and share content without compromising your enterprise’s security? With the rise of BYOD in the workplace, IT decision makers are faced with finding ways to securely deliver file synchronizations capabilities. The limitations of traditional file...

    Sponsored By Hitachi

  • Research // Sep 2014

    IDC Research - Redefining Enterprise Mobility and Increasing Success with Mobile Collaboration

    Adoption of enterprise mobility has surged in the Asia/Pacific region, but this context of mobility tends to be defined as the individual worker being “untethered” from the traditional workplace. While workers have mobile access, they still do not have all that they need to complete a task or project. Download...

    Sponsored By Cisco Systems

  • Research // Sep 2014

    International Mobile Security Survey Research and Considerations for Enterprise IT

    To better understand the rising security challenges associated with integrating mobile devices into business operations, Cisco recently conducted an international survey that explored the attitudes and experiences of end users worldwide. This survey provides insights on how best to approach providing your workers with productive, flexible, and secure network access...

    Sponsored By Cisco Systems

  • White Papers // Sep 2014

    An Automated, Application-Aware Foundation for the Modern Enterprise

    Enterprises have seen massive change over the last decade, but one thing has remained consistent: the Enterprise Network. This article provides insight on an adaptable and programmable network platform to stay ahead of enterprise trends such as BYOD, Cloud Adoption and Xaas

    Sponsored By Cisco Systems

  • White Papers // Sep 2014

    Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft

    IT Managers and administrators constantly seek strategies on how to holistically manage and orchestrate server and networking infrastructure and the software stack. Download this Information guide on best practices to optimally manage the data center using systems management tools from Cisco and Microsoft.

    Sponsored By Cisco Systems

  • White Papers // Sep 2014

    The Cisco ONE Enterprise Networks Architecture Enables Business Transformation

    Every C-level executive is focused on transforming the business, and IT leaders are tasked with providing them with the evolving network infrastructure and support. Download this whitepaper to learn how Cisco ONE enterprise networks architecture enables business transformation and provides the necessary levels of application intelligence, contextual information, visibility and...

    Sponsored By Cisco Systems

  • White Papers // Aug 2014

    The Business Benefits of Unified Storage

    Data storage in the corporate environment has become increasingly complex. IT leaders face significant challenges in effectively storing and managing data. This report takes a detailed look into the challenges of data storage and examines how NetApp offers the capabilities that can benefit businesses and maximize efficiency. Find out more..

    Sponsored By NetApp/AVNet

  • White Papers // Aug 2014

    2014 Gartner Magic Quadrant for Security Intelligence & Event Management

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Sponsored By IBM

  • White Papers // Aug 2014

    Enterprise Security in Transition - An Opportunity for IBM

    Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

    Sponsored By IBM

  • White Papers // Aug 2014

    Today's Biggest IT Risks : Defending Against Malware -A Holistic Approach

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection. Download this...

    Sponsored By IBM

  • White Papers // Aug 2014

    Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM