Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Apr 2014

    Building a Business Case for Continuity and Resiliency

    Based on findings from the largest study of its kind—the IBM Global Study on the Economic Impact of IT Risk—which surveyed 2,136 IT professionals around the world, 1,069 of them business continuity professionals looks at the cost data you need to build a business case for continuity and resiliency. Uncover...

    Sponsored By IBM

  • White Papers // Apr 2014

    An Executive Guide to Analytics Infrastructure:Imperatives for Advanced Analytics

    Infrastructure Imperatives for Advanced Analytics.Get the most information from your data. Business has never been faster and is increasingly dependent on the timely analysis of large volumes of data for strategic and operational decisions. As executives come to rely on advanced analytics, the importance of a robust IT infrastructure cannot...

    Sponsored By IBM

  • White Papers // Apr 2014

    IBM: Surviving the Technical Security Skills Crisis

    As new threats emerge every day, the need for qualified security staff is growing - but there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security...

    Sponsored By IBM

  • White Papers // Apr 2014

    Where is the ROI for UC?

    What’s the business case for unified communications? The majority of companies (82%) that implement a UC solution earn a positive ROI. Yet, it can be challenging to get key decision makers on board. Learn how to build a business case for UC by evaluating hard- and soft-dollar savings opportunities, exploring...

    Sponsored By Windstream Communications

  • White Papers // Apr 2014

    CloudAccess.net brings high performance to the cloud Case Study

    CloudAccess.net is using an all-flash storage array to support top performance at a competitive cost for its Joomla! Virtual Private Memory Cloud – the world’s fastest Joomla cloud hosting system.

    Sponsored By IBM

  • eBooks // Nov 2013

    Do more with your data.

    IBM’s innovative portfolio of data management software and systems helps clients do more with less – and use data as a secret weapon in the competitive battle.

    Sponsored By IBM

  • eBooks // Nov 2013

    The MDM advantage: Creating insight from big data

    To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM)...

    Sponsored By IBM

  • White Papers // Jun 2011

    The Evolution of Business Resiliency Management

    A white paper details IBM’s approach to planning, managing and executing business resilience and continuity across six defined layers of resilience. It also covers recent trends and best practices used in today’s evolving business resiliency management programs, as well as IBM’s portfolio of business continuity and resiliency services....

    Sponsored By IBM

  • White Papers // Mar 2014

    IBM - Giant Leap Forward in Data Services

    As an IT professional, you’ve already dreamt it: a future where you can quickly deploy high availability transactional database systems without the hassle of purchasing, installing, configuring, tuning and testing everything yourself. That day has arrived! The IBM PureData System for Transactions is a pre-integrated database platform that helps you...

    Sponsored By IBM

  • White Papers // Jan 2014

    High Efficiency Indirect Air Economizer-based Cooling for Data Centers

    Of the various economizer (free cooling) modes for data centers, using fresh air is often viewed as the most energy efficient approach. However, this paper shows how indirect air economizer-based cooling produces similar or better energy savings while eliminating risks posed when outside fresh air is allowed directly into the...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    Types of Prefabricated Modular Data Centers

    Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    Forrester Total Economic Impact Report- Cloud Infrastructure with Clustered Data ONTAP

    This Forrester study was commissioned by NetApp and highlights the costs and benefits of deploying a cloud infrastructure using Data ONTAP across the enterprise. The results of this study can be used as a guide for enterprises to determine the appropriate benefits for their particular environment. Read on to learn...

    Sponsored By NetApp

  • White Papers // Mar 2014

    40/100 Gigabit Ethernet: The Foundation of Virtualized Data Center and Campus Networks

    The trend toward virtualization is clear and consistent, rooted in the needs of cost and performance efficiencies, business agility and IT productivity. It’s a trend that is too compelling to ignore. However, to take full benefit and advantage of the possibilities offered by virtualized environments, certain factors must be considered...

    Sponsored By CommScope

  • White Papers // Mar 2014

    Category 8 Cabling Standards Update

    At the TIA TR42 plenary meeting on June 12, 2013 in Portland, Oregon, the TR42.7 formulating sub-committee approved the formation of a task group to study the concept of adding ISO/IEC TR 11801-99-1 Class II limits to the draft ANSI/TIA-568-C.2-1 Category 8 cabling standard. The study group is expected to...

    Sponsored By CommScope

  • White Papers // Mar 2014

    NGBASE-T Cabling Requirements

    NGBASE-T stands for Next Generation BASE-T, an Ethernet application beyond 10 Gb/s over twisted pair or balanced cabling. The Institute of Electrical and Electronics Engineers (IEEE) 802.3 NGBASE-T Call-for-Interest (CFI) was announced in July 2012, which led to the formation of a Study Group to investigate and possibly develop this...

    Sponsored By CommScope

  • White Papers // Mar 2014

    Innovative Data Center Lighting Solutions

    Data center managers are under more pressure than ever to improve energy efficiency and lower total cost. One promising opportunity is in the choice of lighting. Although it accounts for just 5% of a data center’s typical energy budget, lighting offers a key advantage in that it is not part...

    Sponsored By CommScope

  • White Papers // Feb 2014

    Data Center Encryption Survey - Securing the Path to Consolidation in Today's Data Center

    Many want to make data center consolidation happen, but few have actually done so. While cloud offerings and virtualization have opened up a path for realizing the benefits of consolidation, many organizations are encountering significant hurdles in this journey. A SafeNet survey of more than 580 IT and security professionals...

    Sponsored By SafeNet

  • White Papers // Feb 2014

    Enhancing Business Value with HP Wireless Networking Solutions

    The mobile device revolution is transforming the enterprise. One of the four major pillars supporting the 3rd Platform of computing — along with cloud, Big Data, and social technologies — mobile technology is helping organizations realize new sources of competitive advantage and making employees more productive by enabling them to...

    Sponsored By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    The Manager of Managers Approach to Running Your IT Environment Virtual Event

    Do you have a single console to view, control, and manage your IT environment? Is automation built into your monitoring strategy? As IT environments become more dynamic, your operations teams need a unified view for management and monitoring. Automatic detection, and automated monitoring setup and configuration are two ways to...

    Sponsored By Hewlett-Packard (HP)

  • Webcasts // Jan 2014

    The shift from servers to services: Charting your future in the cloud era webcast

    The cloud is not only changing how you source and deliver technology. It’s also leading IT organizations to be more service-centric. This shift impacts IT on many levels. It refocuses IT organizations and changes how they operate and provide services. Find out why shifting from servers to services will help...

    Sponsored By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    Thinking ahead: Pragmatic steps for successful cloud transformations virtual event

    Public, private, or hybrid, the cloud is creating an array of opportunities for business and IT. And it’s reshaping IT as we know it. But incorporating cloud technology and services into the data center can entail multi-year transformations. The key to successful cloud transformations is developing a pragmatic strategy and...

    Sponsored By Hewlett-Packard (HP)

  • Case Studies // Feb 2014

    Vodafone Ireland implements world-class service excellence with HP BSM

    Learn how business service management helped Vodafone Ireland transform from a reactive to a proactive IT Operations function. Read how BSM solutions enabled the Vodafone IT Operations group to align priorities to match the business and drive business value, delivering 300% ROI in one year. HP is the sponsor...

    Sponsored By Hewlett-Packard (HP)

  • Podcasts // Feb 2014

    T-Mobile Podcast

    Learn how wireless services provider T-Mobile US, Inc. improved cloud- and data-access services delivery to its enterprise customers. Listen to the podcast featuring Daniel Spurling, Director of IT Infrastructure at T-Mobile US, Inc and understand now T-Mobile moved from manual cloud provisioning services to a centralized service portal to better...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Feb 2014

    Creating a Mobile-Centric Organization

    As the pace of change quickens, you want to keep your staff engaged and responsive regardless of where they are. Wireless network access is moving beyond conference rooms and building lobbies to have a pervasive presence in every work environment. People simply want and need to stay connected- everywhere and...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Feb 2014

    Manage WLANs with Ease

    With the explosion of mobile devices and the irreversible phenomenon of bring-your-own-decide (BYOD), users now expect seamless wireless connectivity. As you expand your wireless LAN (WLAN) to support more people, devices, and applications, you will need to optimize coverage, troubleshoot problems, and plan for growth. This whitepaper highlights seven common...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Feb 2014

    Put wireless security worry to rest

    As your wireless needs grow, so too does your exposure to wireless security threats. WLANs are subject to many of the same threats as wired networks, as well as some specific attacks that take advantage of the radio frequency (RF) medium. Attackers often try to compromise the WLAN first, and...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Feb 2014

    HP Unified Access: Unify wired and wireless access at your own pace

    This white paper explores the changing requirements for campus networks, driven by mobility and the bring your own device (BYOD) movement, as well as the increasing adoption of rich‑media applications balanced against ongoing IT resource constraints. Like many other IT organizations, you may be faced with the new urgency to...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Feb 2014

    The Right Way to Prove Identity and Establish Trust

    Right now, one of your employees is accessing network resources. Do you know who it is? See how to verify user identities and protect your company’s critical information. Read this technical brief.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    NSA Series data sheet

    In this data sheet, see how your organization can be both secure and productive without compromising network performance thanks to Dell’s SonicWALL™ NSA Series next-generation firewalls.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Mobile Connect

    Find out how to give your employees safe, easy access to the data and resources they need to be productive from a range of devices (including iOS, Android™ and Windows 8.1) while protecting your network from mobile security threats.

    Sponsored By Dell Software

  • eBooks // Feb 2014

    Achieve Deeper Network Security and Application Control (ebook)

    Next-generation firewalls have revolutionized network security. Traditional firewalls that focus on stateful packet inspection and access control rules are ineffective. Learn how to protect your organization from ever-evolving threats with a firewall that delivers a deeper level of network security.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Achieve Deeper Network Security and Application Control (white paper)

    Next-generation firewalls have revolutionized network security. Traditional firewalls that focus on stateful packet inspection and access control rules are ineffective. Learn how to protect your organization from ever-evolving threats with a firewall that delivers a deeper level of network security.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Business Insight: Enabling User Mobility with Enterprise Security Solutions

    The belief that “work is something you do, not somewhere you are,” is taking hold for much of the corporate work force. Savvy business leaders have embraced the benefits of user mobility, including: Increased productivity Improved customer relationships (through increased face time) Greater resilience in the face of...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    What to Look for When Evaluating Next-Generation Firewalls

    This paper summarizes the results of three independent tests conducted by Network World, ICSA Labs and NSS Labs comparing next-generation firewall performance, cost and functionality. See why not all next-generation firewalls offer the same level of protection – get your copy now.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    SuperMassive Series data sheet

    The Dell™ SonicWALL™ SuperMassive™ Next-Generation Firewall (NGFW) platform is built to meet the needs of enterprise, government, university and service provider deployments and gives you uncompromising, high-performance firewall protection. Learn how to protect against today’s emerging threats in this SuperMassive NGFW datasheet.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    RocketSpace case study

    In this case study, see how RocketSpace got both high security and high performance with Dell™ SonicWALL™ E-Class Network Security Appliance (NSA) E5500 Next-Generation Firewall with application intelligence, control and visualization.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Quantifying the Impact of Network-Based Attacks

    This document gives you some guidelines on how to assess the impact of network-based attacks and suggests techniques for creating your own economic model. Get your copy today.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    A new set of network security challenges

    In this e-book, IDG discusses a new set of network security challenges as companies try to balance productivity and security. Download your copy today.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    How traditional firewalls fail

    Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren’t effective in today’s world. This e-book explains where traditional firewalls fall short – and what you can do about it.

    Sponsored By Dell Software