Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // May 2014

    Whitepaper: Total Cost of Ownership

    In today′s difficult business climate, every company is looking to drive cost out of its business and impact the bottom line. This whitepaper presents the tools you need to build a business case to assess—and eventually lower—the total cost of ownership of your HR technology footprint.

    Sponsored By Workday

  • White Papers // May 2014

    SAP Enterprise Mobility: Bringing a Cohesive Approach to a Complex Market

    Social, mobile, big data, and cloud technologies are creating complexity for the enterprise, but embracing the changes associated with this third "wave" of IT can lead to more productive mobile workers as well as better communications with employees, partners, and customers. The trends in the enterprise mobility landscape drive a...

    Sponsored By SAP

  • White Papers // May 2014

    Whitepaper: Global at the Core

    Global business can’t be served by legacy applications. That’s why Workday designed SaaS solutions that are global at the core. This whitepaper explains how Workday has built modern, global enterprise application solutions that effectively transform enterprise business by providing superior information, agility, control, and economics.

    Sponsored By Workday

  • White Papers // May 2014

    Driving Business Innovation with a New Generation

    Every industry that is dependent on information technology (IT) is in the midst of a major transition brought about by the combination of four primary forces. These four forces make up the 3rd Platform for business applications, succeeding client/server (2nd Platform) and mainframes (1st Platform). The 3rd Platform takes applications...

    Sponsored By SAP

  • White Papers // Jan 2014

    Big Data, Big Risks

    The cloud computing landscape continues to realize explosive growth. This white paper outlines what IT and security professionals need to know about the significant security risks of big data, including critical security vulnerabilities, risks, and challenges, key business and technical issues such as controls, privacy, and compliance and effective and...

    Sponsored By Vormetric

  • White Papers // Feb 2014

    Managing Risk in an Active Directory Integrated Virtualized Environment

    Explore the interdependent and combined security issues of Active Directory (AD) and virtualization, as well as how to identify and manage these risks. Gain insight into the native audit capabilities of these technologies and learn how they provide centralized visibility into your IT environment.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Enterprise Best Practices for Real Time Auditing and Event Archival

    With data being generated at a record-setting pace, it’s never been more critical for your organization to properly manage it. Learn how the insights in this white paper can help transform your IT organization and help them intelligently collect, organize and store data.

    Sponsored By Dell Software

  • Videos // May 2014

    Product Preview: Workforce Alignment

    Alignment is more than just cascading goals—people, and the work they are doing, must be aligned with individual and organizational initiatives. In this product preview, you will learn how Workday helps businesses understand this alignment and identify which workers are contributing most to their organization's strategic goals and success.

    Sponsored By Workday

  • Videos // May 2014

    Video: Workday Time Tracking (Epipheo)

    Time tracking is painful. But it doesn't have to be. You just need a better system. And with Workday Time Tracking, you can have one. Watch the video to learn about this cutting-edge time and attendance application that allows you to process payroll and do workforce analysis in minutes.

    Sponsored By Workday

  • White Papers // Feb 2014

    The Right Way to Prove Identity and Establish Trust

    Right now, one of your employees is accessing network resources. Do you know who it is? See how to verify user identities and protect your company’s critical information. Read this technical brief.

    Sponsored By Dell Software

  • White Papers // Jul 2014

    Using Encryption and Access Control for HIPAA Compliance

    Since 1997 Fortrex Technologies, Inc. has been providing IT Governance, Risk, and Compliance advisory services and solutions. In this white paper Fortrex explores how encryption, access control and file access audit logs from Vormetric can Contributes to HIPAA compliance and exempt from notification requirements of HITECH.

    Sponsored By Vormetric

  • White Papers // May 2013

    Top five questions you should ask before purchasing a two-factor authentication solution

    Two-factor authentication is critical for safeguarding your company’s critical information. In this technical brief, discover five things to know before purchasing a two-factor authentication solution, and which solution is the best fit for your business.

    Sponsored By Dell Software

  • White Papers // Jun 2014

    The Use of Ceiling-Ducted Air Containment in Data Centers

    Ducting hot IT-equipment exhaust to a drop ceiling can be an effective air management strategy, improving the reliability and energy efficiency of a data center. Typical approaches include ducting either individual racks or entire hot aisles and may be passive (ducting only) or active (include fans). This paper examines available...

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes FISMA Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet FISMA guidelines today and tomorrow. Download your copy.

    Sponsored By Dell Software

  • White Papers // Mar 2014

    Security in the Cloud for SAP HANA

    High-speed data analytics is changing the way companies compete, enabling them to generate real-time insights to support their most important business processes. Cloud computing offers a complementary technology that also provides game-changing capabilities for business computing. Yet many companies have been reluctant to deploy mission-critical applications, such as SAP HANA,...

    Sponsored By Vormetric

  • White Papers // May 2014

    Nightmare on Delegation Street with Native AD Tools

    Delegating Active Directory (AD) permissions – and managing and reporting on those delegations – is a nightmare. If you’re using native tools, that is. With the right tools, the job is easy. Learn how to put your AD delegation nightmares to rest – forever.

    Sponsored By Dell Software

  • White Papers // May 2014

    Are You Spending More than You Realize on AD Management?

    Learn about the six key essential Active Directory (AD) management tasks, estimate the costs a company incurs each year in each category and explore how investing in the right tools can make managing AD easier and more cost-effective.

    Sponsored By Dell Software

  • White Papers // May 2014

    Best-In-Class Steps to Successfully Manage the Buyer's Journey

    Delighting customers is no easy task for today’s organizations. The constant growth of information on numerous products and services empower customers with crucial intelligence that inuences their purchase decisions. Achieving success in keeping in-tune with customers’ rapidly changing needs requires businesses to streamline their customer data management activities to personalize...

    Sponsored By SAP

  • White Papers // Aug 2013

    The Wild World of Malware: Keeping your Company Safe Inside

    As the level of cyber-crimes continues to grow, it’s important for IT to understand the latest types of malware and how they work. This is especially true for small- and medium-sized businesses that don’t have the resources to concentrate on network security. Find out how to protect your...

    Sponsored By Dell Software

  • White Papers // Jul 2014

    2014 Insider Threat Report

    The 2014 Vormetric Insider Threat Report - European Edition represents the result of analysis of interviews with 537 IT and Security managers in major European enterprises around the question of insider threats. Insider threats have expanded from the traditional insiders to privileged users of systems and the compromise of internal...

    Sponsored By Vormetric

  • White Papers // May 2014

    Whitepaper: HR in the Cloud

    The human resources function is undergoing a fundamental transformation. The old ways of doing business won't work in the new modern global economy. Read the whitepaper to explore the five business trends driving the rapid adoption of SaaS business solutions and discover why businesses like yours are moving to SaaS.

    Sponsored By Workday

  • White Papers // May 2014

    Whitepaper: Workday: A Whole New Approach to the HRMS Marketplace

    Josh Bersin, principal analyst at Bersin and Associates, talked with three of Workday’s customers and is now convinced that there are transformational benefits to adopting its unique and powerful approach to human resource management systems (HRMS). This whitepaper summarizes the discussion and highlights the benefits of Workday for other organizations....

    Sponsored By Workday

  • White Papers // Nov 2013

    Consolidation: The Foundation for IT Business Transformation

    This white paper explores how to consolidate legacy, redundant IT services and shows how consolidation can accelerate growth while cutting costs and reducing complexities and enhance competitiveness.

    Sponsored By ServiceNow

  • White Papers // Jul 2014

    How Monitoring Systems Reduce Human Error in Distributed Server Rooms & Remote Wiring Closets

    Surprise incidences of downtime in server rooms and remote wiring closets lead to sleepless nights for many IT managers. Most can recount horror stories about how bad luck, human error, or just simple incompetence brought their server rooms down. This paper analyses several of these incidents and makes recommendations...

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    Forrester report: Service Virtualisation and Testing Solutions

    In this Forrester report: Service Virtualisation and Testing Solutions evaluates the benefits of continuous test applications in complex environments, simplify and speed up the testing. Find out more-by reading our report.

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    Mobilising Your Infrastructure: The Fast Lane to Success

    Nowadays, cloud applications and services let mobile users overcome the memory capacity and processing power limitations of mobile devices. Learn more how growth of mobility impacts monitoring network and application performance, user behaviour and user expectations-by reading our report.

    Sponsored By CA Technologies

  • White Papers // Apr 2014

    IBM: The Evolution of Business Reliliency Management

    A white paper details IBM’s approach to planning, managing and executing business resilience and continuity across six defined layers of resilience. It also covers recent trends and best practices used in today’s evolving business resiliency management programs, as well as IBM’s portfolio of business continuity and resiliency services....

    Sponsored By IBM

  • White Papers // Apr 2014

    IBM: Surviving the Technical Security Skills Crisis

    As new threats emerge every day, the need for qualified security staff is growing - but there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security...

    Sponsored By IBM

  • Live Event // Mar 2014

    Live Weekly Webinar - Unified IT Monitoring for Infrastructure and Applications with up.time®

    up.time is enterprise-level IT monitoring that’s up to 50% more cost effective than traditional “Big 4” monitoring tools. Get the comprehensive features, deep reporting, and proactive monitoring you need for a unified view of IT performance, availability, and capacity. up.time monitors across platforms, including all infrastructure (servers, VMs, network devices)...

    Sponsored By Uptime Software

  • Downloads // Mar 2014

    Free Trial - Unified IT Monitoring for Infrastructure and Applications with up.time®

    up.time is enterprise-level IT monitoring that’s up to 50% more cost effective than traditional “Big 4” monitoring tools. Get the comprehensive features, deep reporting, and proactive monitoring you need for a unified view of IT performance, availability, and capacity. up.time monitors across platforms, including all infrastructure (servers, VMs, network devices)...

    Sponsored By Uptime Software

  • White Papers // Apr 2014

    The Modern Office and You: 5 Ways to Capitalise on Cloud Opportunities

    Many technology providers are nervous about the Cloud and what it means for their business. Rather than look at the Cloud with fear, embrace it and take advantage of the opportunities it brings for new revenue. In this eBook, you’ll learn 5 ways to capitalize on the future of the...

    Sponsored By ConnectWise

  • White Papers // Jul 2014

    Ensuring the Availability of Your IBM Tivoli Monitoring Infrastructure

    This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.

    Sponsored By Global Knowledge

  • White Papers // Jul 2014

    SDN and Cloud Computing

    After a review of Software-Defined Networking (SDN) and its close cousin Network Functions Virtualization (NFV), this white paper addresses three main deployment scenarios: SDN without deploying cloud computing, cloud computing without deploying SDN, and deploying cloud computing in conjunction with SDN. We'll look at use cases, when the approach makes...

    Sponsored By Global Knowledge

  • White Papers // Jul 2014

    Mobility is moving fast: Seven Questions that Prepare you for BYOD

    Are you ready for BYOD? For successful BYOD operations, organizations must address issues they may not have considered yet, but that can have significant consequences for business and IT operations. Here are seven questions you should answer as you roll out new mobile capabilities

    Sponsored By IBM

  • White Papers // Jun 2014

    Transforming Customer Experience in the New Digital World

    In today’s world, new digital communications channels are being continuously introduced. Customers are quickly adopting these new channels – including web, social and mobile – and want to use them to contact the companies with whom they do business. This white paper will show you how taking a holistic...

    Sponsored By Genesys Telecommunications Laboratories

  • White Papers // Jul 2014

    Simplifying cloud management and data center automation

    This white paper explores the value of standardizing and automating cloud services with a flexible platform, such as IBM Cloud Orchestrator. Learn how to orchestrate the development, deployment and management of cloud services - helping to reduce IT costs and accelerate service delivery.

    Sponsored By IBM

  • White Papers // Jul 2014

    Optimize workloads to achieve success with cloud and big data

    IBM Workload Automation is a sophisticated, cloud-enabled solution that unifies disparate applications and business processes to help organizations achieve superior efficiency and availability while leveraging the flexibility and scalability of cloud computing.

    Sponsored By IBM

  • Research // Jul 2014

    Requirements-driven Quality ROI Calculator

    IBM Rational requirements-driven quality ROI calculator provides an estimated return on investment from implementing one or more of our quality and requirements definition and management solutions. See how these solutions help you achieve predictability in desired business outcomes, allowing you to: Reduce risk and rework by unifying stakeholders and...

    Sponsored By IBM

  • White Papers // Jul 2014

    Top 5 Reasons why Customers Deploy a Flash Strategy on EMC

    Customer are increasingly virtualizing their environment to maximise capacity and reduce costs. This EMC report provides details of a solution with unprecedented overall performance, optimizing for transactional performance and capacity effeciency with no trade offs. Read More.

    Sponsored By EMC

  • White Papers // Jul 2014

    Managed Services: Your 10-Week Guide to Becoming an MSP

    Managed services is one of the fastest-growing segments in IT services and the growth is expected to continue. Making the transition to managed services requires a systematic plan with well-thought out steps that range from sizing up the market to retooling your staff. If you're considering becoming a managed service...

    Sponsored By LabTech Software