Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • Webcasts // Feb 2009

    Automatically Identify the Root Cause and Business Impact Within VMware Infrastructures

    EMC Server Manager detects VMware failures in real time, pinpoints the root cause, and helps to understand how the impacted entities will affect business operations. With EMC Server Manager, organization's IT group can address VMware-related issues before they occur, minimize the time spent reacting to alerts, and quickly remediate affected...

    Provided By EMC

  • Webcasts // Jan 2009

    Enhancing Business Continuity in Virtualized Enterprise Environments With EMC SRDF

    Disaster recovery planning is a significant challenge for most organizations. To reduce business risk, plans must be reliable, downtime costs must be minimized, and restart must be smooth. The EMC Symmetrix Remote Data Facility (SRDF) family of remote replication solutions enables organizations to replicate mission-critical data in EMC Symmetrix environments...

    Provided By EMC

  • Webcasts // Nov 2008

    Managing the Server and Network Change and Configuration Lifecycle

    Now the organization can unify the management of its entire IT environment - across networks, applications, and servers, in physical and virtual infrastructures. Automatically remediate configuration and compliance problems, analyze key performance indicators and harness more power from other EMC solutions with integrated visibility across the infrastructure. The attendee will...

    Provided By EMC

  • White Papers // Mar 2009

    Disaster Recovery for Windows Using EMC RecoverPoint/Cluster Enabler

    EMCR RecoverPointCluster Enabler software integrates with Microsoft Failover Cluster software that uses Node Majority and Node and File Share Majority quorum modes to allow geographically dispersed cluster nodes to replicate their data using RecoverPointJSE and RecoverPoint continuous remote replication. EMC RecoverPointiCE addresses common cost bottlenecks in implementing a disaster recovery...

    Provided By EMC

  • White Papers // Feb 2009

    EMC CLARiiON Best Practices for Performance and Availability: Release 28.5 Firmware Update - Applied Best Practices

    This paper presents best practices for achieving high performance and availability with EMC R CLARiiON CX4 series storage systems. It outlines factors affecting the performance and availability of CLARiiON CX4 series block-level storage. The components in the system that affect performance and availability are addressed in succession - from the...

    Provided By EMC

  • White Papers // Apr 2009

    EMC CLARiiON Best Practices for Navisphere Performance in Large Configurations

    This white paper provides best practices for managing large configurations using Navisphere Manager. It discusses performance issues one might encounter when managing large configurations, and provides recommendations for improving Navisphere Manager's performance with large configurations. This paper also includes an overview release 28. It also says about two primary keys...

    Provided By EMC

  • White Papers // Apr 2009

    EMC CLARiiON Storage System Fundamentals for Performance and Availability - Applied Best Practices

    To get the highest performance, one needs to understand a storage system's workload. This includes knowledge of the host applications. One should understand how applications are generating 110. The workload may be simple, coming from a single application: it might also be complex, meaning it is generated by more than...

    Provided By EMC

  • White Papers // Jan 2010

    Advanced Security Management in Metro Ethernet Networks

    With the rapid increase in bandwidth and the introduction of advanced IP services including voice, high-speed internet access, and video/IPTV, consumers are more vulnerable to malicious users than ever. In recent years, providing safe and sound networks and services have been the zenith priority for service providers and network carriers...

    Provided By Cisco Systems

  • White Papers // Jul 2008

    Basic Network Design

    The main function of the manufacturing zone is to isolate critical services and applications that are important for the proper functioning of the production floor control systems from the enterprise network. This separation is usually achieved by a Demilitarized Zone (DMZ). The focus of this paper is only on the...

    Provided By Cisco Systems

  • Case Studies // May 2009

    University of Wyoming Built a State-of-the-Art Data Center Using Nexus and Catalyst, Switches

    The University of Wyoming offers undergraduate and graduate education, research, and outreach services. The University wanted to accommodate more data center users, applications and also wanted to provide future 10 Gigabit Ethernet access to a remote supercomputer center by creating a platform for the future. To master these challenges the...

    Provided By Cisco Systems

  • White Papers // Jul 2009

    Cisco Prisma D-PON: Your DOCSIS-Based Fiber-to-the Home Solution

    Today consumers live in a brave new world of media technology. They channel surf program guides, not channels; they pause, rewind, and fast forward live television; they digitally record their favorite shows to view at their leisure. Today consumers not only download their favorite songs, they download on-demand programming and...

    Provided By Cisco Systems

  • Case Studies // Jan 2010

    Intel Technologies Deliver a Sunny Outcome

    The RENCI faces the challenges to with its High-Performance Computing (HPC) systems showing their age, RENCI needed a platform that could better meet scientists' needs for high performance and scalability. RENCI's researchers tackle pressing problems in areas from bioscience and public health to the humanities and social sciences, so a...

    Provided By Intel

  • Case Studies // Nov 2010

    IBM eX5 Systems Help Acxiom Transform IT

    Acxiom is a leader in marketing services and technology, supporting successful marketing campaigns worldwide. IT issues and increasing costs prompted Acxiom to expand its cloud computing environment. Acxiom implemented the IBM System x3850 X5 Enterprise System with Intel Xeon processor 7500 series, exploiting the platform's advanced virtualization workload capabilities. Acxiom...

    Provided By Intel

  • Case Studies // Aug 2010

    Extreme Speed, Extreme Throughput

    Thesys Technologies delivers a highly optimized, end-to-end trading solution that helps its clients turn their trading ideas and strategies into profits. Millions of messages, microseconds of performance. The technology infrastructure must analyze market data that floods in at peak rates of millions of messages per second, and respond to market...

    Provided By Intel

  • Case Studies // Aug 2009

    PC Maintenance Goes Remote

    The Microblue faces the challenges to Increase business productivity. Existing desktop PCs were aging and suffer from frequent downtime, affecting staff productivity and work efficiencies. Reduce operating costs of PC fleet. Company has no in-house technician, and frequent support visits, repairs and maintenance were increasing operating costs for Microblue. The...

    Provided By Intel

  • Case Studies // Feb 2011

    Delivering Scalable Performance

    The SIMULIA needs to provide steady increases in HPC performance and scalability so customers can tackle more complex design challenges and improve engineering productivity. Replicate customers' larger clusters to support them effectively. Put innovative products in end users' hands quickly. The SIMULIA deployed to worked with Intel and HP to...

    Provided By Intel

  • Resource Center // Nov 2011

    Strong authentication helps to beat advanced threats

    Abstract: With today's advanced threats and the increased value of the information that is created, shared and stored, systems that rely on static passwords alone are vulnerable and at risk of being breached. But beyond reducing your risk, you may be bound by regulations that actually require strong multi-factor authentication....

    Provided By EMC

  • White Papers // Jun 2012

    Top 10 Reasons Why Customers Deploy Virtualized Microsoft Applications on EMC VNX

    Virtualized Apps: Simplify Complex Tasks and Adapt Easily to Unforeseen Changes This 1-page white paper outlines the top 10 reasons why customers deploy virtualized Microsoft applications on EMC VNX, including: Run SAN and NAS together all in one box Shrink backup windows from hours to minutes...

    Provided By EMC

  • Case Studies // Nov 2010

    Media Company Grows Revenue From Internet Streaming

    Mediapro is one of the biggest and fastest growing media and broadcast companies in Spain, and a leading player in the European audiovisual market. They faces the challenge to grow audiences and revenues by tapping into fast-growing Internet streaming market with maximize service profitability by eliminating need to subcontract content...

    Provided By Cisco Systems

  • Case Studies // Feb 2011

    Arena Provides Great Guest Experience and Maximizes Revenues

    The Minnesota Wild is a professional ice hockey team faced challenge to Maximize sales revenues during events which provide excellent guest experience with simplify IT. They switched to Cisco Unified Computing System with VMware and Microsoft Hyper-V Server 2008 R2, Cisco MDS 9124 Multilayer Fabric Switches connecting to Compellent Storage...

    Provided By Cisco Systems

  • Case Studies // May 2010

    Online Consumer Media Company Optimizes Broadband Video

    PureVideo Networks, faced business challenge to respond to fast-paced and changing business needs to reduce Operational Expense (OPEX) associated with application costs which provide a superior user experience that encourages repeat visits to sites and need to protect resources from unwanted internet traffic. They deployed to Cisco Application Networking platform...

    Provided By Cisco Systems

  • Webcasts // Aug 2008

    Optimize the Network to Get the Most Out of Your Virtual Infrastructure

    A virtual infrastructure can pay huge dividends. Virtualization deployments, with their new demands on network performance, provisioning, and monitoring, require that one rethink his/her current network architecture - a crucial component in any organization's comprehensive, enterprise-wide virtualization strategy. The attendee will learn how to maximize the VMware environment using the...

    Provided By EMC

  • Webcasts // Oct 2008

    Automatically Identify Network Vulnerabilities and Reduce Business Risk

    When the DNS vulnerability was identified, did the management system automatically identify network infrastructure devices at risk? EMC Voyence Network Advisor did. Instead of dedicating IT personnel to identifying liable devices and fixing the vulnerabilities and exploits - a time-consuming, expensive, piecemeal, and error-prone operation - the organization can now...

    Provided By EMC

  • Webcasts // Oct 2008

    New File Share Services Delivers Simplified Access to Enterprise Content

    EMC Documentum File Share Services (FSS) enables users organization-wide to easily access repository information via drag and drop and desktop-based browsing, and open and save files directly from within applications. The result? They can more easily find, create, manage, track, and secure documents. The attendee will learn how File Share...

    Provided By EMC

  • White Papers // Mar 2009

    Implementing Oracle E-Business Suite R12 on the EMC Celerra Unified Storage Platform: Applied Technology

    A highly scalable and available architecture for Oracle E-Business Suite R12 environments can be deployed using the Celerra Unified Storage Platform and common Intel x86 servers with the Linux operating system. Celerra local replication features provide even greater management speed and efficiency with greater operating efficiency and a faster return...

    Provided By EMC

  • White Papers // Jan 2009

    Continuous Availability Databases With IBM DB2 Version 9.5 and EMC SRDF

    Today's highly competitive business marketplace leaves little room for error in terms of availability, continuous operations, or recovery in the event of an unplanned outage. In today's connected world, an event that makes business data unavailable, even for relatively short periods of time, has the potential to be of major...

    Provided By EMC

  • eBooks // Jan 2013

    System z: Making Great Security Even Better

    IBM System z is already recognized as a secure platform (EAL 5 rated), but its security is improved even further, and made proactive and provably compliant, with complementary software solutions from IBM’s InfoSphere® Platform. With InfoSphere® Discovery’s ability to comprehensively catalog your enterprise information assets, InfoSphere® Guardium’s real-time monitoring and...

    Provided By IBM

  • White Papers // Jan 2013

    Reduce costs and improve manageability with an IBM System x NAS solution

    IBM® System x® servers offer the efficiency, simplicity and performance that will fit both your needs and your budget. Read this solution brief to discover how System x servers, preloaded with Microsoft Windows Storage Server, offer a complete solution that is easy to manage, that reduce risk and give you...

    Provided By IBM

  • White Papers // Jan 2013

    Resource Guide: Top 10 Benefits of a Server Refresh

    Even with the increased demands and pressures of today’s business environment, how do you know if it’s really worth the expense to convert your aging server fleet? Read this resource guide to learn the top five tech benefits and top five business benefits to be found by replacing outdated servers...

    Provided By IBM

  • White Papers // Jan 2013

    IBM x86 Servers in the Cloud: Serving the Cloud

    An analysis and perspective from leading IT Industry analysts Technology Business Research (TBR) on how x86 servers and the implementation of private clouds offer a secure and cost-effective means for midsize businesses to reduce costs and provide flexible computing capacity. IBM x86 servers, including the new System x3650 M4 and...

    Provided By IBM

  • Research // Jan 2013

    System x Selection Tool

    Are old servers holding your business back? Maybe it's time to think about replacing them. The right server can reduce costs and complexity while improving business performance. Check out this simple IBM® System x® Selection Tool to find out which server solution, powered by the latest Intel® Xeon® processor...

    Provided By IBM

  • Webcasts // Feb 2013

    IPS: Evolving to Remain Relevant

    With constantly changing threats, a shifting network perimeter, and increasingly sophisticated attackers, organizations must adapt both their processes and technologies to keep up. Join guest speaker John Grady, Research Manager, Security Products and Services at IDC and Paul Kaspian, Senior Product Marketing Manager for IBM Security Systems to find out...

    Provided By IBM

  • White Papers // Feb 2013

    Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.

    Provided By IBM

  • Webcasts // Feb 2013

    The new frontier. Securing mobile apps

    Smartphones, tablets, and other app-enabled devices are overtaking PCs as the dominant collaboration devices in enterprises. Many organizations are struggling with understanding the implications of developing and deploying apps to new mobile platforms such as iOS and Android. Which risks should app developers be concerned with? What are the new...

    Provided By IBM

  • White Papers // Jan 2013

    IBM Cloud Services: How IBM is shortening the gap between customers and development value

    It’s a fine line to walk - trying to balance between the costs and the benefits of procuring development and test IT assets. Read this white paper to learn about the challenges that CIOs, IT managers and application development managers face as they attempt to select a cloud computing vendor...

    Provided By IBM

  • eBooks // Jan 2013

    The future of software delivery is cloudy: Leveraging the cloud transform development and test

    Cloud technology is a terrific platform for a vast array of workloads. But what about cloud computing can actually help you transform your business? Read this ebook to learn the real-world potential benefits of using the cloud as a platform for more effective software delivery.

    Provided By IBM

  • Research // Feb 2013

    Build A High-Performance Security Organization

    Companies must not only protect their organization from danger but must continue to compete in the marketplace. Companies that ignore security do so at their own risk. Read this Forrester Research Inc report to gain an understanding of what it takes to build a high performance security practice.

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • White Papers // Feb 2013

    Selecting a Managed Security Services Provider: The 10 most important criteria to consider

    Online attackers can impact business operations and workforce productivity, damage infrastructure and create security breaches that can harm a company's reputation. Read this paper to see how outsourcing security operations to a managed services provider can help you enhance the security of your enterprise without making a large investment in...

    Provided By IBM

  • White Papers // Feb 2013

    Source Your Security Services

    Interest in outsourcing security services is on the rise. Read this report from Forrester Research, Inc. for insight into sourcing strategies and Forrester’s decision support solution for security and risk executives working to build a high-performance security program and organization.

    Provided By IBM