Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Jan 2014

    Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks ®

    Cybersecurity has become a leading topic both within and beyond the corporate boardroom. What enterprises need to stop the escalation of cyberattacks is a network security approach that is designed from the outset to enable the safe use of the applications and technologies required to support a thriving business.

    Sponsored By Palo Alto Networks

  • White Papers // Jan 2014

    Big Data, Big Risks

    The cloud computing landscape continues to realize explosive growth. This white paper outlines what IT and security professionals need to know about the significant security risks of big data, including critical security vulnerabilities, risks, and challenges, key business and technical issues such as controls, privacy, and compliance and effective and...

    Sponsored By Vormetric

  • Case Studies // Jan 2014

    MageMojo Boosts Security and Ensures Availability Using F5 Solution

    Magento e-commerce hosting provider MageMojo needed to improve security after a series of distributed denial-of-service (DDoS) attacks that took its site offline at the worst possible time: Cyber Monday. Consolidating its DDoS mitigation and firewall needs in a high-performance F5 solution, MageMojo strengthened both its security posture and its business.

    Sponsored By F5

  • White Papers // Jan 2014

    Driving Enterprise Transformation with Box and Office 365

    Today, there is a gap growing between the expectations of end-users for simple, effortless apps in the workplace and the requirements of IT to protect content with enterprise-grade security. To cope with these conflicting trends, many organizations are now investing in an ecosystem of cloud applications and services. This is...

    Sponsored By Box

  • Webcasts // Jan 2014

    Webcast: The Next Frontier to the Mobile Enterprise

    Did you know that more than 1.5Bn mobile devices will be shipped in 2016? These devices are more powerful than ever, empowering users to access, share, and collaborate on information in new ways that we never thought possible. Join Box to learn more about the current trends in enterprise mobility...

    Sponsored By Box

  • White Papers // Jan 2014

    Empowering Your Mobile Workers White Paper

    A modern mobile IT strategy is no longer an option, it is an absolute business necessity. Today’s most productive employees are not tied to a desk, an office, or a location. They are mobile. And your company’s IT strategy has to be ready to support them with easy, reliable,...

    Sponsored By Box

  • White Papers // Dec 2013

    Cloud Resource Management the Right Way

    Find out how Red Hat® CloudForms gives IT administrators and managers a comprehensive solution to optimize their virtual, private cloud, and hybrid cloud infrastructures with advanced capacity planning and sophisticated resource management capabilities.

    Sponsored By Red Hat

  • White Papers // Dec 2013

    Lenovo Recommends: 15 Steps to Reducing Security Risks In Enterprise Mobility

    This checklist is designed to help you identify key steps to take to minimize the potential for security breaches and loss of data associated with mobile devices. Although every enterprise is unique, these 15 points will provide you with a strong foundation for assessing your current mobile security plans and...

    Sponsored By Lenovo

  • White Papers // Dec 2013

    Determining Enterprise Readiness to Support Employee-Owned Devices

    The use of employee-owned devices (EODs) within the enterprise has exploded in just two short years. In a number of cases, the use has preceded the implementation of processes and structures to fully support them. As a result, organizations must quickly catch up. Enterprises need a cohesive plan that addresses...

    Sponsored By Lenovo

  • White Papers // Dec 2013

    The Compelling Case for Touch-Enabled Notebooks, Now!

    One of the most important changes to IT infrastructure resulting from the rapid rise of BYOD and mobility is the move to touch- or gesture-based interfaces. Most consumer apps and many versions of business applications are now touch-enabled and many more will be in the next 12 months. End...

    Sponsored By Lenovo

  • White Papers // Dec 2013

    3 ways clinicians can leverage a patient portal to craft a healthcare community

    You probably have several goals for your patient portal of choice. Is “community” one of them? With a bevy of vendors offering portal solutions, it can be challenging for a hospital to know where to start. Fortunately, YourCareCommunity helps ease the decision-making process.

    Sponsored By Healthtech Holdings

  • White Papers // Dec 2013

    Patient Portals: A Platform for Connecting Communities of Care

    Connecting patient health data across the care continuum is essential to achieve improved care, increased access to personal health records and lowered costs. A successful approach rests in having the hospital serve as the connectivity hub for bringing patients, care givers and healthcare professionals together in a secure, online environment....

    Sponsored By Healthtech Holdings

  • Analyst Briefings // Dec 2013

    NSS Labs Network Intrusion Prevention System Product Analysis- IBM GX7800

    Learn how IBM performed in the latest NSS Labs testing, exploring the security effectiveness and performance characteristics of the GX7800 intrusion prevention appliance. This analyst paper covers: How IBM achieved an exploit block rate of 95.7% Ratings for stability/reliability and evasion Performance ratings based on "real-world" "scenarios"

    Sponsored By IBM

  • Analyst Briefings // Dec 2013

    The Benefits of an Integrated Approach to Security in the Cloud

    As cloud computing gains more traction, more businesses are beginning to align their security strategy to better manage the privacy and compliance challenges of this new deployment model. Indeed, cloud models are being used not only to add compute and storage resources, they are also becoming an imperative for data...

    Sponsored By IBM

  • Webcasts // Dec 2013

    On-demand Webcast: Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and mobile

    Dropbox for Business lets you collaborate with ease, making storing and sharing files both intuitive and secure. More than 4 million businesses use Dropbox everyday to work smarter. Centrify and Dropbox have partnered to give Dropbox for Business users single sign-on and provide IT with centralized management and security using...

    Sponsored By Centrify

  • White Papers // Nov 2013

    An Overview of Samsung KNOX Active Directory and Group Policy Features

    Samsung KNOX is a set of business focused enhancements to the Android mobile environment for selected Samsung mobile devices. One of the most important new enterprise features provided with KNOX is the ability for KNOX devices to be joined, secured and managed by a Microsoft Active Directory infrastructure. An important...

    Sponsored By Centrify

  • eBooks // Nov 2013

    Do more with your data.

    IBM’s innovative portfolio of data management software and systems helps clients do more with less – and use data as a secret weapon in the competitive battle.

    Sponsored By IBM

  • Downloads // Nov 2013

    IBM Security AppScan

    IBM® Security AppScan® enables organizations to assess the security of their applications and achieve regulatory compliance by identifying vulnerabilities and generating reports with intelligent fix recommendations to ease remediation.

    Sponsored By IBM

  • Downloads // Nov 2013

    IBM Rational Application Developer for WebSphere trial download

    IBM® Rational® Application Developer for WebSphere® Software accelerates the development and deployment of Java™, Java EE, Web 2.0, mobile, OSGi, portal and service-oriented architecture (SOA) applications. Both expert and novice developers can increase productivity and efficiency by using its many integrated capabilities for easier development, testing, analysis, and delivery of...

    Sponsored By IBM

  • eBooks // Nov 2013

    Transform Your Data Centers - HP ProLiant Gen8 - the World's Most Intelligent Servers

    From core to cloud HP ProLiant Gen8 servers are transforming data center expectations and economics with the world's most intelligent servers. Learn how they deliver maximum performance and reliability while simplifying day-to-day management. Sponsored by HP and Intel® Xeon® Processor : Intel,...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Nov 2013

    We’re no.1 for a Reason

    Alaska Communications is proud to be recognized as a world leader in Ethernet, and the first and only carrier in Alaska with Carrier Ethernet 2.0 Certified services. Our Business Ethernet is designed to provide the best performing and most reliable network for even the most demanding and complex network environments....

    Sponsored By Alaska Communications

  • eBooks // Nov 2013

    The MDM advantage: Creating insight from big data

    To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM)...

    Sponsored By IBM

  • White Papers // Nov 2013

    Build a business case: Developing custom Apps

    Custom applications deliver significant value and they provide the opportunity to automate unstructured work processes to make the business far more innovative, efficient and competitive.

    Sponsored By ServiceNow

  • White Papers // Nov 2013

    Consolidation: The foundation for IT business transformation

    This white paper explores how to consolidate legacy, redundant IT services and shows how consolidation can accelerate growth while cutting costs and reducing complexities and enhance competitiveness.

    Sponsored By ServiceNow

  • Webcasts // Nov 2013

    Product Preview: Enterprise Cloud for HR and Finance

    Workday provides a suite of global enterprise applications—from HR to Finance—all delivered in the cloud. This video shows how Workday allows businesses to operate with a complete picture of their company, align people and financial performance, keep the workforce engaged and supported, and embrace change across the enterprise.

    Sponsored By Workday

  • Webcasts // Nov 2013

    Time Tracking

    Want to reduce labor costs, minimize compliance risks, and increase worker productivity? Workday Time Tracking makes all this and more possible. Watch the product preview to learn why Workday is a good fit for your organization.

    Sponsored By Workday

  • White Papers // Nov 2013

    Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls

    Mobility has brought down the wall between business and personal, spiking corporate productivity and putting work/life balance within reach. The bring-your-own-device (BYOD) phenomenon is a way to be constantly connected for work, family, and play. Companies that do not adapt and allow people to work where, when, and how they...

    Sponsored By Cisco

  • White Papers // Nov 2013

    Samsung KNOX: An Overview for Business Customers

    Samsung, the mobile device market leader, has introduced Samsung KNOX™ for its Android-based mobile platforms to satisfy the device management and security needs of business and government customers. This document provides a more detailed overview of the enterprise integration and management features in Samsung KNOX with a focus on its...

    Sponsored By Centrify

  • White Papers // Nov 2013

    Enterprise Identity Where You Want It

    Gartner ranked Cloud-based Identity and Access Management as the largest market segment in this year's $2 billion cloud-based security services market. Gartner raised some concerns about cloud identity with a focus on where identity is stored. Tom Kemp, CEO of Centrify, explores this issue in more detail and correlates this...

    Sponsored By Centrify

  • White Papers // Oct 2013

    AppAssure 5: The next generation of backup, replication and recovery software

    IT environments are increasingly complex, with virtual and physical machines spread across local, offsite and—increasingly—cloud resources. AppAssure 5 alleviates these concerns with fast backup and even faster replication and recovery. As a key data protection element of Dell’s Fluid DataTM Architecture, AppAssure 5 controls cost, optimizes performance and enhances protection...

    Sponsored By Dell

  • White Papers // Oct 2013

    Strategy Guide to Converged Infrastructure in Government

    With HP's Converged Infrastructure, state and local governments build a foundation that can meet the demand for new services - from drivers wanting to renew their licenses via mobile phones to police officers requiring instant views from remote video surveillance. By offering three different converged infrastructure reference solutions, HP enables...

    Sponsored By Hewlett-Packard & Intel®

  • White Papers // Oct 2013

    Intelligent performance for a growing business: HP ProLiant Gen8 e-Series servers

    Learn more how HP ProLiant Gen8 e-Series servers are simple, reliable, affordable solutions that let a growing business boost performance as well as productivity. The HP ProLiant name ensures reliability. And that reliability is an especially wise investment for businesses with limited information technology (IT) budgets. Sponsored by HP...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Oct 2013

    HP ProLiant DL360p & DL380p Gen8 Servers: Power, Flexibility and Serviceability

    Explore the Power, Flexibility and Serviceability HP ProLiant DL360p and DL380p Gen8 Servers The DL360p and DL380p deliver innovative advances in performance, serviceability and lifecycle automation to address the pressing demands of today’s data-intensive and virtualized IT environments. Based on the HP ProActive Insight architecture, these intelligent servers can...

    Sponsored By HP & Intel® Xeon® Processor

  • eBooks // Oct 2013

    5 Technology Trends you Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • White Papers // Oct 2013

    IDC paper - Extending PC Life-Cycle Management and Client Virtualization with VMware Horizon Mirage

    PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than...

    Sponsored By VMware

  • Videos // Oct 2013

    Tech Tips: Deployment of VMware Horizon View Virtual Desktop Infrastructure

    Organizations worldwide are using virtual desktop infrastructure (VDI) to run virtual desktops in the datacenter and deliver these to employees as a managed service. End users gain a familiar, personalized environment they can access anywhere from any device, while administrators gain control and security. With VMware® Horizon View™ (formerly VMware...

    Sponsored By VMware

  • Downloads // Oct 2013

    Intel® Parallel Studio XE 2013 SP1

    Efficiently boost application performance. This development suite offers industry-leading compilers, along with highly tuned performance libraries for math, crypto, imaging, compression, and others. Harness performance from the latest processors simply by recompiling your code. Scale for multicore and many-core architectures with Intel® Threading Building Blocks and Intel® Cilk Plus™ parallel...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Intel® Inspector XE 2013

    Intel® Inspector XE finds memory leaks, corruption, deadlocks, data races, and more in C, C++, C#, F#, Fortran, and MPI applications. Use a normal build: no special compiler or recompiles are required. Heap growth analysis and debugger breakpoints simplify diagnosis of difficult bugs early in the development cycle―when they are...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Intel® Composer XE 2013

    Now it’s simpler to recompile for greater improvements by using pre-optimized, pre-threaded performance libraries. This performance-oriented developer tool includes Intel C++ and Fortran compilers, and threading and math, multimedia, and signal processing performance libraries. It’s compatible with leading development environments and compilers on Windows, Linux, and Mac OS X and...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By SolarWinds