Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Jul 2014

    SDN and Cloud Computing

    After a review of Software-Defined Networking (SDN) and its close cousin Network Functions Virtualization (NFV), this white paper addresses three main deployment scenarios: SDN without deploying cloud computing, cloud computing without deploying SDN, and deploying cloud computing in conjunction with SDN. We'll look at use cases, when the approach makes...

    Sponsored By Global Knowledge

  • White Papers // Jul 2014

    Mobility is moving fast: Seven Questions that Prepare you for BYOD

    Are you ready for BYOD? For successful BYOD operations, organizations must address issues they may not have considered yet, but that can have significant consequences for business and IT operations. Here are seven questions you should answer as you roll out new mobile capabilities

    Sponsored By IBM

  • White Papers // Jul 2014

    Whitepaper: What Your Peers Are Doing to Prime Their  Human Resources and Financial Systems

    Businesses facing growth and change require systems that evolve with them. The fact is, traditional software is simply too rigid to keep pace. Your savvy peers are transforming their systems to run in the cloud. Read the whitepaper to learn how you can, too, and benefit long into the future.

    Sponsored By Workday

  • White Papers // Jul 2014

    Ultra high efficiency cooling modules for large data centers

    Of the various economizer (free cooling) modes for data centers, using fresh air is often viewed as the most energy efficient approach. However, this paper shows how indirect air economizer-based cooling produces similar or better energy savings while eliminating risks posed when outside fresh air is allowed directly into the...

    Sponsored By APC by Schneider Electric

  • White Papers // Jul 2014

    Magic Quadrant for Enterprise Mobility Management Suites

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. Check this Gartner Report Now!

    Sponsored By IBM

  • White Papers // Jul 2014

    Reducing Expenses Starts with the Programming Skills of Operations Groups

    Tools available today make it possible to significantly reduce the daily tasks that consume the time of IT operations groups like automation. And with today’s new cloud and SDN architectures being deployed or just on the horizon, automation is no longer just optional. No matter what we call it the...

    Sponsored By F5

  • Research // Jul 2014

    The State of Support Services: 2014

    2014 has already proven to be an incredibly challenging and exciting year for customer support. With the backdrop of the changes TSIA identified in the new world of B4B, and all the traditional pressures faced by support services organizations, we are witnessing a pace of change that the majority of...

    Sponsored By LogMeIn

  • White Papers // Jul 2014

    Workday Integration Cloud Connect - Datasheet

    Companies need to integrate multiple third-party systems and applications to satisfy key business functions and processes. This document outlines the key benefits of Workday Integration Cloud Connect and the portfolio of integration products. Download this report to understand how Workday Cloud Connect provides pre-built connections to third-party applications and services....

    Sponsored By Workday

  • White Papers // Jul 2014

    Workday Integration Cloud Connect Datasheet

    Companies need to integrate multiple third-party systems and applications to satisfy key business functions and processes. This document outlines the key benefits of Workday Integration Cloud Connect and the portfolio of integration products. Download this report to understand how Workday Cloud Connect provides pre-built connections to third-party applications and services....

    Sponsored By Workday

  • White Papers // Jul 2014

    Nucleus Research Note - Increasing Profitability with Analytics in Midsize Companies

    Business analytics can empower your business managers to make more fact-based, data-driven decisions that improve operating results. Learn more in a report from Nucleus Research.

    Sponsored By IBM

  • White Papers // Jul 2014

    Top Ten Compensation Mistakes Made by Small Businesses

    We know it is easy for small businesses to fall into the trap of treating compensation performance as ""something to worry about when we get bigger."" The fact is, organizations of all sizes need to attract, retain and motivate employees, and compensation is a critical element in any strong talent...

    Sponsored By IBM

  • White Papers // Jul 2014

    Using Encryption and Access Control for HIPAA Compliance

    Since 1997 Fortrex Technologies, Inc. has been providing IT Governance, Risk, and Compliance advisory services and solutions. In this white paper Fortrex explores how encryption, access control and file access audit logs from Vormetric can Contributes to HIPAA compliance and exempt from notification requirements of HITECH.

    Sponsored By Vormetric

  • White Papers // Jul 2014

    2014 Insider Threat Report

    The 2014 Vormetric Insider Threat Report - European Edition represents the result of analysis of interviews with 537 IT and Security managers in major European enterprises around the question of insider threats. Insider threats have expanded from the traditional insiders to privileged users of systems and the compromise of internal...

    Sponsored By Vormetric

  • White Papers // Jul 2014

    2014 Survey Report - Remote Collaboration Challenges & Strategies to Overcome

    In late 2013, Polycom surveyed 5,000 business professionals from all job levels around the world that focused on collaboration challenges to support a mobile and flexible working environment. Download this survey to learn what these Senior IT professionals say are their biggest remote collaboration challenges and discover the strategies...

    Sponsored By Polycom, Inc.

  • White Papers // Jul 2014

    Pinpoint Security Risks with 100% Better Insights

    Security breaches can happen anywhere in an organization, and having the ability to analyze any form of data can give you the edge against fraud, theft, and infiltration by pinpointing abnormal behavior patterns. Understanding your security vulnerabilities requires rapid, deep analytics against business data, machine data, and unstructured human information....

    Sponsored By HP US

  • White Papers // Jun 2014

    The Seven Essential Practices For Effective Business Continuity Management

    Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. The key to successfully protecting your organization’s business operations and reputation is to take a...

    Sponsored By IBM

  • Analyst Briefings // Jun 2014

    The Economics of IT Risk and Reputation: What Business Continuity and IT Security Really Mean to Your Organization

    "For one of the largest global studies ever conducted of more than 2,000 business continuity and IT security professionals, IBM teamed up with the Ponemon institute to dig deeper into the true economic impact of business continuity and security failures. The groundbreaking study revealed key findings that you’ll want to...

    Sponsored By IBM

  • White Papers // Jun 2014

    7 Essentials Whitepaper

    Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation...

    Sponsored By IBM

  • White Papers // Jun 2014

    2014 Ponemon Cost of Data Breach Study

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in United States

    Sponsored By IBM

  • Analyst Briefings // Jun 2014

    IBM X-Force Threat Intelligence Quarterly - Q1 2014

    Understand more about the latest IT security threats. This report is an analysis of the security landscape, designed to help organizations better understand the latest security risks. Download this comprehensive report and learn how: Security incidents have been steadily rising in 2013. Cyber-criminals use malicious code to infiltrate companies. Public...

    Sponsored By IBM

  • White Papers // Jun 2014

    How Can I Obtain Identity and Access Management as a Cloud Service?

    CA CloudMinder™ provides identity and access management capabilities as a hosted cloud service. Quickly obtain security capabilities without deploying or managing a large IT infrastructure typically associated with enterprise security deployments.

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    How CA Technologies Safeguards Competitive Advantage with Proactive Cloud and Web Application Monitoring

    Find out how CA Application Performance Management Cloud Monitor enables the IT team to replicate customer transactions from over 60 global locations to identify potential problems thus ensuring a consistent user experience and quickly resolving any performance problems.

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    SDN: How It Will Affect You and Why You Should Care

    You may have heard about software-defined networking (SDN) and its cousin network functions virtualization (NFV). These emerging technologies are likely to revolutionize the IT industry as well as your job. This white paper introduces you to SDN and NFV, examines their impact on you as well as the industry, and...

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    Understanding AIX Logical Volume Management

    Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    Windows 8.1 Client to Microsoft's Cloud Services

    Over the past several years, Microsoft has reinvented its enterprise technologies in its push toward the cloud. Windows 8 is a key part of making Microsoft customers and devices cloud-ready for the next generation of technology. With Microsoft cloud services such as Office 365, Office Web Apps, and SkyDrive, Windows...

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    Department of Defence Australia secured by CA and BST Tech

    Business: BSTTech Consulting provides security and information processing solutions to a global customer base, specialising in the defence sector. Headquartered in Australia, it prides itself on being recognised as a thought-leader in security and information sharing. Challenge: When the Department of Defence (DoD) enlisted its help, BSTTech Consulting needed to...

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    TechViews Podcast: The Security Reality in 2014

    IT security is a brave new world for enterprise companies. As threats increase in frequency and variation, IT security teams must also allow more access to corporate assets and data than ever before. New trends like BYOID challenge traditional security measures, but enable ease of use for consumers. Striking a...

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    Discover CA Nimsoft Monitor

    Across the complete spectrum of IT infrastructure, from data centers to cloud environments, CA Nimsoft Monitor provides an unparalleled array of capabilities that speed deployment, unify management, and maximize performance and uptime.

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    Enabling and Protecting the Open Enterprise

    A decade or so ago, security wasn’t nearly as challenging as it is today. Users, data and applications were all centralized in data centers that, in effect, kept them contained within a network perimeter. This eBook outlines how the open enterprise has changed the role of security.

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    Thomas Duryea expands service offering to enter new markets with help from CA Nimsoft Monitor

    Business: Thomas Duryea Consulting is a trusted, privately owned supplier to companies across the Asia Pacific region. They design, plan, implement and manage innovative, world-class IT infrastructure solutions. Challenge:In the process of migrating a traditional product and services model to a cloud plus services model, Thomas...

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    CA Technologies Automation Platform Enables Tesco to Reach Previously Unattainable Milestones

    Business: Global Fortune 50 retailer Tesco is the third largest merchant in the world; it operates over 3,700 stores internationally and is rapidly expanding its online presence, dominating markets as diverse as motor insurance, home electrical appliances and clothing. Challenge: Tesco needed to accelerate time-to-market, increase efficiency and reduce errors...

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes PCI DSS Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet PCI DSS guidelines today and tomorrow. Download...

    Sponsored By Dell Software

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes HIPAA Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet HIPAA guidelines today and tomorrow. Download your copy.

    Sponsored By Dell Software

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes FISMA Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet FISMA guidelines today and tomorrow. Download your copy.

    Sponsored By Dell Software

  • White Papers // Jun 2014

    Enterprise encryption architecture

    This white paper Enterprise Encryption Architecture explores data security threats and provides some encryption strategies in order to protect private and confidential information.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Secure sensitive data encryption tech guide

    This report surveys the various encryption approaches for securing data at rest to understand what the technology does along with where each provides an optimal fit. After comparing the various encryption technologies, this paper explains why file level transparent data encryption provides the optimal balance of data type coverage, security,...

    Sponsored By Vormetric

  • White Papers // Jun 2014

    VMware AlwaysOn Workplace Solution for Financial Services

    Exceptional customer interactions result in satisfied customers and long-term engagements. Yet meeting customer expectations can prove difficult—and costly—if frontline employees cannot access critical client data or financial services applications because the data center or their desktop is down. As financial services firms look for ways to increase both customer and...

    Sponsored By VMware

  • Webcasts // Jun 2014

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Sponsored By VMware

  • White Papers // Jun 2014

    The Use of Ceiling-Ducted Air Containment in Data Centers

    Ducting hot IT-equipment exhaust to a drop ceiling can be an effective air management strategy, improving the reliability and energy efficiency of a data center. Typical approaches include ducting either individual racks or entire hot aisles and may be passive (ducting only) or active (include fans). This paper examines available...

    Sponsored By APC by Schneider Electric