Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • Case Studies // Jan 2015

    Five Myths of Do-It-Yourself: Disaster Recovery

    Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.

    Sponsored By IBM

  • Case Studies // Jan 2015

    Avoiding the pitfalls of outdated DR plans: Expectations and threats may require new approaches.

    Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Forrester Report : The Risks Of DIY Disaster Recovery

    Did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks of ‘Do It Yourself’ Disaster Recovery” to learn the critical components that make a disaster...

    Sponsored By IBM

  • White Papers // Nov 2014

    Operationalizing the Network with SDN

    The focus of SDN is on transforming the network to support applications and meet the expectations of users and businesses that rely on them. Scaling modern networks is challenging due to the explosive growth of compute, network, and application resources─combined with increased mobility of apps migrating to the cloud and...

    Sponsored By F5

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • eBooks // Nov 2014

    Analyzing the Neverquest Malware Threat

    Learn from the F5 Security Operations Center's analysis of the Neverquest malware threat. The team analyzes the programming techniques and methodologies used to develop malware in order to keep F5 security services up to date and effective against any threat. Read this summary report to better understand how it works...

    Sponsored By F5

  • Downloads // May 2014

    Find, Analyze & Resolve Your Toughest Performance Issues on SQL Server - FAST

    Slow SQL Server performance? Don't let yourself get tangled up in volumes of server health metrics. Get to the root cause of performance problems in just four clicks. Only SolarWinds Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint...

    Sponsored By SolarWinds

  • Downloads // Aug 2014

    Troubleshoot Poor VoIP Call Quality

    Troubleshooting poor VoIP call quality is relatively straightforward with the right monitoring and diagnostic tools to help you identify the cause. The most likely causes include: Jitter, Latency and Packet Loss Call Signaling and Routing Misconfigured VoIP Equipment With SolarWinds® VoIP & Network Quality Manager, you can quickly...

    Sponsored By SolarWinds

  • Downloads // Apr 2014

    Easy-to-Use & Affordable Remote IT Administration & Support Software

    DameWare® Remote Support (DRS) simplifies IT service management & support process by allowing IT admins to remotely connect to and troubleshoot end-user computers located both inside & outside the corporate firewall. Includes a built-in remote control tool for remote access to Windows®, Linux® & Mac OS® X computers Lets...

    Sponsored By SolarWinds

  • White Papers // Sep 2014

    A Manager's Guide to Unified Threat Management and Next-Gen Firewalls

    A lot of security vendors use the terms Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) interchangeably - so it's easy to get confused about which type of protection is right for you. This Manager's Guide helps you answer these questions: Is a UTM solution right for my organisation? What...

    Sponsored By Sophos

  • White Papers // Sep 2014

    Protecting Your Roaming Workforce With Cloud-Based Security

    Remote and roaming workers are constantly checking email, downloading data and staying productive. Results are their top priority - security is not. IT departments must mitigate the risks of BYOD (Bring Your Own Device).

    Sponsored By Sophos

  • White Papers // Feb 2014

    Making Sense of the Chaos: Measuring The Influence of Social Media

    Just as there are valuable marketing tools for monitoring social media and managing social marketing campaigns, there are also tools available to measure the effectiveness of those social campaigns. Read more for a better understanding of the true value of social marketing and the three pillars of social media.

    Sponsored By IBM

  • White Papers // Jan 2015

    Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By Solarwinds APAC

  • White Papers // Jan 2015

    Download a FREE Trial of the Network Performance Monitor from SolarWinds!

    Monitoring your network with SolarWinds Network Performance Monitor (NPM) will not only help you improve the performance of your network, but it can also have a direct impact on your organization’s bottom line. NPM will assist in: Simplifying detection, diagnosis, & resolution of network issues before outages occur Tracking response...

    Sponsored By Solarwinds APAC

  • White Papers // May 2014

    HP HAVEn: See the big picture in Big Data

    HP HAVEn is the industry’s first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data and need a trusted partner to help them. HP HAVEn has two primary components: a platform and an ecosystem. Together, the platform and the ecosystem provide the...

    Sponsored By HP US

  • White Papers // Jul 2014

    Pinpoint Security Risks with 100% Better Insights

    Security breaches can happen anywhere in an organization, and having the ability to analyze any form of data can give you the edge against fraud, theft, and infiltration by pinpointing abnormal behavior patterns. Understanding your security vulnerabilities requires rapid, deep analytics against business data, machine data, and unstructured human information....

    Sponsored By HP US

  • White Papers // Aug 2014

    Promise Healthcare Case Study

    Promise Healthcare improved security, achieve HIPAA compliance, and gained visibility into and control over network utilization by replacing its outdated firewalls with Dell SonicWALL NSA 6600 firewalls.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    NGFW Critical to SMB Network

    In today's sophisticated and rapidly changing threat landscape, traditional firewall could be increasing your security risks rather than alleviating them. Next-Generation Firewalls dramatically improve protection over traditional firewalls.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Business Insight: Enabling User Mobility with Enterprise Security Solutions

    Learn how to enable user mobility without compromising security. Savvy organizations have embraced the benefits of user mobility, including increased productivity, improved customer relationships and lower costs. See how to keep your data and resources secure.

    Sponsored By Dell Software

  • Analyst Briefings // Jun 2014

    The Economics of IT Risk and Reputation: What Business Continuity and IT Security Really Mean to Your Organization

    "For one of the largest global studies ever conducted of more than 2,000 business continuity and IT security professionals, IBM teamed up with the Ponemon institute to dig deeper into the true economic impact of business continuity and security failures. The groundbreaking study revealed key findings that you’ll want to...

    Sponsored By IBM

  • White Papers // Nov 2013

    Business Value of Managed Services

    Businesses around the world are looking for ways to innovate, improve customer relationships and drive down costs. But it can be challenging to find the right people and resources to support those corporate initiatives. Managed services from IBM can help

    Sponsored By IBM

  • White Papers // Oct 2014

    Saugatuck Technology - Optimized Sourcing in Hybrid IT Environments

    This research paper from Saugatuck Technology discusses the multi-sourced hybrid IT environment, including how to recognize the things that can increase costs and compromise operations, and how to optimize the environments for peak effectiveness.  

    Sponsored By IBM

  • White Papers // Jan 2014

    Avoiding the Pitfalls of Outdated Disaster Recovery Plans: Evolving Business Expectations and Threats May Require New Disaster Recovery Approaches

    Why do so many disaster recovery plans fail? Too often, organizations base their entire recovery strategies on outdated assumptions. Read "Avoiding the Pitfalls of Outdated Disaster Recovery Plans"

    Sponsored By IBM

  • White Papers // Oct 2014

    Server Managed Services - Integrated Managed Infrastructure

    This service profile provides an overview of Server Managed Services - Integrated managed infrastructure and explains what you can expect from implementation. The paper includes an overview, information on planning and implementation, service delivery, and detailed service descriptions.

    Sponsored By IBM

  • White Papers // Jan 2014

    Private Cloud Services from IBM. Flexible End-to-End Solutions for Transforming the Enterprise

    Private clouds can drive operational efficiencies and transformative business model change, but maximizing these benefits requires a carefully planned strategy and flexible, scalable services. IBM’s holistic approach and integrated portfolio of end-to-end services provides multiple pathways to private cloud. Success hinges on ensuring the infrastructure is cloud-ready, developing an actionable...

    Sponsored By IBM

  • White Papers // Jan 2014

    The Role of the Network in Cloud Computing

    For a network that better supports your cloud and brings the most value possible to your business, its design has to be considered in the early stages of cloud planning. Read the white paper "Networking for cloud computing" to discover specific networking considerations for public, private and hybrid clouds.

    Sponsored By IBM

  • White Papers // Apr 2014

    How IBM is Enhancing BCM to Help Address Changing Business Realities (Fondly referred to as the IBM story)

    When an organization’s business strategy undergoes significant changes, new risks can arise. Taking a smarter approach to your business continuity program so that it connects business resiliency directly to your business strategy helps address these risks before they can affect your business. IBM did just that with its own business...

    Sponsored By IBM

  • White Papers // Jan 2014

    The Business Value of Managed Services

    Research shows that today’s business goals are centered on reducing costs, strengthening customer relationships and improving financial management. The biggest challenges to achieving these goals are lack of skills and investment funds, and inadequate linkages between the IT environment and how business processes are managed. Read this analyst report to...

    Sponsored By IBM

  • Analyst Briefings // Apr 2014

    The Risks Of DIY Disaster Recovery (Forrester)

    Are you considering in-house disaster recovery management? In the last five years, many companies have. But did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks...

    Sponsored By IBM

  • Case Studies // Apr 2014

    A Broadband Company Streamlines its Recovery Processes with IBM Cloud

    Read the case study “A broadband company streamlines its recovery processes with IBM Cloud” to learn how IBM service teams used cloud-based technology to help the company develop an innovative and proven cloud computing solution for its backup and recovery environment. IBM’s turnkey solution helped the company improve protection, recovery,...

    Sponsored By IBM

  • White Papers // Apr 2014

    IBM Is A Leader Among Traditional Disaster Recovery Service Providers

    In a recent Forrester Wave report, IBM is identified as a “top dog” among traditional disaster recovery service providers, with a strong product offering and global presence. Read this specially commissioned IBM executive brief of the Wave report to find out how IBM’s disaster recovery services can help you meet...

    Sponsored By IBM

  • White Papers // Oct 2014

    2014 Selecting a Managed Security Services Provider: Top 10 Criteria

    A white paper discussing the benefits of outsourcing managed security services and outlining effective strategies, as well as 10 of the most important criteria to consider, when choosing a managed security services provider.

    Sponsored By IBM

  • White Papers // Jan 2014

    Surviving the Technical Security Crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

    Sponsored By IBM

  • Downloads // Sep 2014

    Code faster. Create faster code.

    Intel VTune Amplifier XE 2015 is the premier performance profiler for C, C++, C#, Fortran, Assembly, and Java. Get the data to meet a wide variety of tuning needs and the tools to mine the data and assess next steps. Powerful analysis lets you sort, filter, and visualize results on...

    Sponsored By Intel Software

  • White Papers // Jul 2014

    5 Reasons why Customers Deploy a Flash Strategy on EMC

    Customer are increasingly virtualizing their environment to maximise capacity and reduce costs. This EMC report provides details of a solution with unprecedented overall performance, optimizing for transactional performance and capacity effeciency with no tradeoffs. Read More.

    Sponsored By EMC

  • Tools & Templates // Feb 2010

    Server Deployment/Migration Checklist

    One configuration error or overlooked step can send your server deployment off a cliff. This simple checklist will help you complete the process efficiently and avoid costly mistakes.Visit our Network Administrator blog for more networking resources.

    Provided By Erik Eckel

  • White Papers // Oct 2010

    Key Methods for Managing Complex Database Environments

    A slow relational database can substantially impact the performance of the applications it supports. Discover the key methods for managing complex database environment, and ensure your database stack is operating at optimal levels of performance and availability. Download the white paper today.

    Provided By Dell Software

  • White Papers // May 2014

    5 Things You Didn’t Know About Cloud Backup

    IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. For example, did you know: That encryption doesn’t guarantee privacy? That you could lose data by choosing the wrong cloud? That cloud backup doesn't have to...

    Provided By Druva Software

  • eBooks // Jan 2013

    Cloud Services for Dummies eBook

    Cloud computing is becoming an integral part of many companies’ business and technology strategies. There are many different delivery models. But two foundational services are essential for cloud computing to become a strategic part of the overall computing infrastructure: Infrastructure as a Service (IaaS) for access to compute and storage...

    Provided By IBM

  • White Papers // Aug 2010

    Proactive Performance Management for Enterprise Databases

    Don't just react to performance issues in your database. Proactive database management can result in accelerated problem resolution, problem prevention, hardware resource maximization and risk reduction. How can you become more proactive in managing your enterprise database? Download the white paper to find out.

    Provided By Dell Software