Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Aug 2010

    Proactive Performance Management for Enterprise Databases

    Don't just react to performance issues in your database. Proactive database management can result in accelerated problem resolution, problem prevention, hardware resource maximization and risk reduction. How can you become more proactive in managing your enterprise database? Download the white paper to find out.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Foglight Solutions for Cross-Platform Database Performance Management

    Achieving consistent service levels for cross-platform database environments is next to impossible using each platform’s native tools. Foglight database monitoring software simplifies database monitoring and management, enabling you to consolidate and standardize database performance across multiple platforms. Download the white paper to learn how.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Maintaining Oracle Database Performance in a Perfect Storm

    The cloud, big data and mobility are three of the most disruptive technologies Oracle DBAs face today. Are you prepared for the perfect storm of increased application complexity and dynamism, as well as explosive growth in database size and data velocity? Download the white paper and discover how Foglight for...

    Sponsored By Dell Software

  • White Papers // Jul 2014

    Workday Integration Cloud Connect Datasheet

    Companies need to integrate multiple third-party systems and applications to satisfy key business functions and processes. This document outlines the key benefits of Workday Integration Cloud Connect and the portfolio of integration products. Download this report to understand how Workday Cloud Connect provides pre-built connections to third-party applications and services....

    Sponsored By Workday

  • White Papers // Jun 2014

    Transforming Customer Experience in the New Digital World

    In today’s world, new digital communications channels are being continuously introduced. Customers are quickly adopting these new channels – including web, social and mobile – and want to use them to contact the companies with whom they do business. This white paper will show you how taking a holistic...

    Sponsored By Genesys Telecommunications Laboratories

  • White Papers // Aug 2014

    Case Study: Kogan.com centralises IT Infrastructure with Google Apps

    Read how Kogan.com, an online retailer of consumer electronics and lifestyle goods, increased mobility and learn how Google Apps streamlined their IT Infrastructure. Find out more-by reading our report.

    Sponsored By Google Apps for Business

  • White Papers // Oct 2012

    SAP and Sybase: A Marriage Made in Database Heaven (IDC)

    Examine information about SAP and Sybase, a year after their merger, provided at analyst briefings in May, 2011. These briefings were held at the SAPPHIRE NOW conference in Orlando, FL, and the Sybase Analyst Summit in New York.

    Sponsored By SAP

  • White Papers // Jun 2014

    2014 Ponemon Cost of Data Breach Study

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in United States

    Sponsored By IBM

  • Analyst Briefings // Jun 2014

    IBM X-Force Threat Intelligence Quarterly - Q1 2014

    Understand more about the latest IT security threats. This report is an analysis of the security landscape, designed to help organizations better understand the latest security risks. Download this comprehensive report and learn how: Security incidents have been steadily rising in 2013. Cyber-criminals use malicious code...

    Sponsored By IBM

  • White Papers // Jul 2014

    Nucleus Research Note - Increasing Profitability with Analytics in Midsize Companies

    Business analytics can empower your business managers to make more fact-based, data-driven decisions that improve operating results. Learn more in a report from Nucleus Research.

    Sponsored By IBM

  • Downloads // Aug 2014

    Easy-to-Use and Affordable Remote IT Administration and Support Software

    DameWare® Remote Support (DRS) simplifies IT service management & support process by allowing IT admins to remotely connect to and troubleshoot end-user computers located both inside & outside the corporate firewall. Includes a built-in remote control tool for remote access to Windows®, Linux® & Mac OS® X computers Lets...

    Sponsored By SolarWinds

  • White Papers // Jul 2012

    Bring Your Own Device Policy Guidebook

    Since 2008, Aberdeen research has been tracking a radical transformation taking place in the enterprise: more and more organizations are permitting, even encouraging employees to bring their own mobile devices into the workplace to be used for work purposes. While at first appearing to radically lower the cost of enterprise...

    Sponsored By SAP

  • Live Event // Mar 2014

    Live Weekly Webinar - Unified IT Monitoring for Infrastructure and Applications with up.time®

    up.time is enterprise-level IT monitoring that’s up to 50% more cost effective than traditional “Big 4” monitoring tools. Get the comprehensive features, deep reporting, and proactive monitoring you need for a unified view of IT performance, availability, and capacity. up.time monitors across platforms, including all infrastructure (servers, VMs, network devices)...

    Sponsored By Uptime Software

  • White Papers // Jul 2014

    Simplifying cloud management and data center automation

    This white paper explores the value of standardizing and automating cloud services with a flexible platform, such as IBM Cloud Orchestrator. Learn how to orchestrate the development, deployment and management of cloud services - helping to reduce IT costs and accelerate service delivery.

    Sponsored By IBM

  • White Papers // Aug 2014

    Enterprise Security: Avoiding Insider Threats

    IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling...

    Sponsored By IBM

  • White Papers // Aug 2014

    Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Aug 2014

    Enterprise Security in Transition - An Opportunity for IBM

    Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

    Sponsored By IBM

  • White Papers // Aug 2014

    Identity Management in an interconnected world: When Millions need access

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • White Papers // Aug 2014

    Buyer's Guide: Identity and Access Management

    This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking down silos of protection - Integrated approach to managing application security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • Case Studies // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Sponsored By IBM

  • White Papers // Aug 2014

    Today's Biggest IT Risks : Defending Against Malware -A Holistic Approach

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection. Download this...

    Sponsored By IBM

  • White Papers // Aug 2014

    Three Reasons to Choose Box, Now

    The benefits of eliminating on-premise file share for cloud-based collaboration are clear and quantifiable. This white paper demonstrates why businesses choose Box to unify their storage and collaboration and avoid the upfront and ongoing costs of storage, data center infrastructure and LAN optimization. With independent analysis supported by ESG, the...

    Sponsored By Box

  • Case Studies // Aug 2014

    Top 10 Ways Businesses Rely on Box

    Box is a cloud platform that helps you securely store, share and manage all your company's files. Whether you need to secure confidential business information, develop a custom mobile application or are trying to simplify paper-based office processes, here are the top 10 ways enterprises rely on Box.

    Sponsored By Box

  • White Papers // Jan 2014

    Empowering Your Mobile Workers White Paper

    A modern mobile IT strategy is no longer an option, it is an absolute business necessity. Today’s most productive employees are not tied to a desk, an office, or a location. They are mobile. And your company’s IT strategy has to be ready to support them with easy, reliable,...

    Sponsored By Box

  • White Papers // Jul 2013

    File Sharing: Risk or Remedy?

    Ever-increasing file sizes. Document-centric, complex collaboration needs. Two big reasons organizations are turning to cloud file sharing (CFS) as a lightweight but effective solution. Read this complimentary report and learn more about: Document-centric collaboration and how to complement your existing ECM ecosystem with CFM applications Feature...

    Sponsored By Box

  • White Papers // Aug 2014

    HP Networking Portfolio: Delivering ROI and Value from Edge to Core

    IDC is observing a once-in-a-generation shift in computing and technology that we refer to as the rise of the “3rd Platform.” The 1st Platform was the rise of computing in general. The 2nd Platform was ushered in by the PC and client/server paradigm, enabling greater personalization of computing and networked...

    Sponsored By HP

  • Tools & Templates // Feb 2010

    Server Deployment/Migration Checklist

    One configuration error or overlooked step can send your server deployment off a cliff. This simple checklist will help you complete the process efficiently and avoid costly mistakes.Visit our Network Administrator blog for more networking resources.

    Provided By Erik Eckel

  • White Papers // Jan 2014

    Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Provided By IBM

  • eBooks // Jan 2013

    Cloud Services for Dummies eBook

    Cloud computing is becoming an integral part of many companies’ business and technology strategies. There are many different delivery models. But two foundational services are essential for cloud computing to become a strategic part of the overall computing infrastructure: Infrastructure as a Service (IaaS) for access to compute and storage...

    Provided By IBM

  • Downloads // Jun 2006

    IP subnetting made easy

    IP subnetting is a fundamental subject that's critical for any IP network engineer to understand, yet students have traditionally had a difficult time grasping it. After years of watching confused students struggle through school and in practice when dealing with subnetting, TechRepublic's George Ou created a simple, graphical approach that...

    Provided By George Ou

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Jul 2014

    Preparing for IEEE 802.11ac

    This business white paper discusses the history that led to the IEEE 802.11ac standard and the considerations you need to weigh before you decide to deploy it. This new WLAN technology is being introduced in the market in two waves. Topics that will be addressed in this paper are: ...

    Provided By HP US

  • Downloads // Nov 2006

    Use this template to configure QoS on your Cisco router

    Using quality of service (QoS) on Cisco network devices helps provide both bandwidth and priority to certain types of network traffic. Configuring QoS on your Cisco router can be tricky, but this template can help. As a companion download to David Davis' article, "Configure QoS on your Cisco...

    Provided By David Davis

  • White Papers // Feb 2014

    FTP vs MFT: Why it’s time to make the change

    Get the facts you need to make the case for managed file transfer. Read the report to get head-to-head comparisons of cost, reliability, visibility, security & management and get the information you need to make a compelling case for moving to MFT.

    Provided By IBM

  • White Papers // Jul 2013

    2013 Gartner Magic Quadrant for SIEM

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Provided By IBM

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Jan 2014

    Sophisticated attacks WP

    We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you...

    Provided By IBM

  • Downloads // May 2002

    Network Administrator skills assessment test

    This series of tests can help IT managers gauge how a job candidate for a net admin position will handle typical IT situations. The tests can also help you determine the skills sets each applicant brings to the table.

    Provided By TechRepublic

  • White Papers // May 2014

    5 Things You Didn’t Know About Cloud Backup

    IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. For example, did you know: That encryption doesn’t guarantee privacy? That you could lose data by choosing the wrong cloud? That cloud backup doesn't have to be slow? Learn...

    Provided By Druva