Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • eBooks // Nov 2013

    Transform Your Data Centers - HP ProLiant Gen8 - the World's Most Intelligent Servers

    From core to cloud HP ProLiant Gen8 servers are transforming data center expectations and economics with the world's most intelligent servers. Learn how they deliver maximum performance and reliability while simplifying day-to-day management. Sponsored by HP and Intel® Xeon® Processor : Intel,...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Nov 2013

    We’re no.1 for a Reason

    Alaska Communications is proud to be recognized as a world leader in Ethernet, and the first and only carrier in Alaska with Carrier Ethernet 2.0 Certified services. Our Business Ethernet is designed to provide the best performing and most reliable network for even the most demanding and complex network environments....

    Sponsored By Alaska Communications

  • eBooks // Nov 2013

    The MDM advantage: Creating insight from big data

    To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM)...

    Sponsored By IBM

  • White Papers // Nov 2013

    Transforming your voice, video and collaboration infrastructure - The IBM journey toward unified communications for mobile and social collaboration

    A recent IDG survey of CIOs revealed that those using virtual desktops now say the biggest benefits are increased simplicity and a more productive and mobile workforce. Find out how other companies are using virtual desktops to: Drastically cut IT investment costs Simplify management across multiple platforms...

    Sponsored By IBM

  • Analyst Briefings // Nov 2013

    Maximizing Your Virtual Environment for the Latest Business Initiatives

    Virtualization is one of the most highly demanded of all IT projects this decade because it enables enterprises to reduce capex and opex costs and at the same time increase business efficiency and agility. However, implementing, supporting, and managing virtualization can often be difficult tasks, especially as deployments increase in...

    Sponsored By IBM

  • White Papers // Oct 2013

    AppAssure 5: The next generation of backup, replication and recovery software

    IT environments are increasingly complex, with virtual and physical machines spread across local, offsite and—increasingly—cloud resources. AppAssure 5 alleviates these concerns with fast backup and even faster replication and recovery. As a key data protection element of Dell’s Fluid DataTM Architecture, AppAssure 5 controls cost, optimizes performance and enhances protection...

    Sponsored By Dell

  • White Papers // Oct 2013

    Best Practices for Selecting a Vulnerability Management (VM) Solution

    With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find...

    Sponsored By Qualys

  • White Papers // Oct 2013

    Intelligent performance for a growing business: HP ProLiant Gen8 e-Series servers

    Learn more how HP ProLiant Gen8 e-Series servers are simple, reliable, affordable solutions that let a growing business boost performance as well as productivity. The HP ProLiant name ensures reliability. And that reliability is an especially wise investment for businesses with limited information technology (IT) budgets. Sponsored by HP...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Oct 2013

    Strategy Guide to Converged Infrastructure in Government

    With HP's Converged Infrastructure, state and local governments build a foundation that can meet the demand for new services - from drivers wanting to renew their licenses via mobile phones to police officers requiring instant views from remote video surveillance. By offering three different converged infrastructure reference solutions, HP enables...

    Sponsored By Hewlett-Packard & Intel®

  • White Papers // Oct 2013

    HP ProLiant DL360p & DL380p Gen8 Servers: Power, Flexibility and Serviceability

    Explore the Power, Flexibility and Serviceability HP ProLiant DL360p and DL380p Gen8 Servers The DL360p and DL380p deliver innovative advances in performance, serviceability and lifecycle automation to address the pressing demands of today’s data-intensive and virtualized IT environments. Based on the HP ProActive Insight architecture, these intelligent servers can...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Oct 2013

    Evolving Your IT Services Offering in a Modern Mobile World

    To stay competitive, IT solution providers must evolve their IT services offering and embrace the modern needs of mobility through service-oriented and mobile safeguard technology. Get enabled to answer the IT service calls of clients wanting to get connected to their data, stay connected to their data and ensure they...

    Sponsored By LabTech Software

  • White Papers // Oct 2013

    Success in the Cloud: How to find it?

    Over the past few years, the cloud market has grown by leaps and bounds while becoming an integral part of IT operations. Cloud computing is a great way for businesses of all sizes to create collaborative environments with little investment, and it’s a profitable way for IT service providers to...

    Sponsored By LabTech Software

  • eBooks // Oct 2013

    5 Technology Trends you Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Sponsored By Symantec

  • Downloads // Oct 2013

    Intel® Composer XE 2013

    Now it’s simpler to recompile for greater improvements by using pre-optimized, pre-threaded performance libraries. This performance-oriented developer tool includes Intel C++ and Fortran compilers, and threading and math, multimedia, and signal processing performance libraries. It’s compatible with leading development environments and compilers on Windows, Linux, and Mac OS X and...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Intel Parallel Studio XE 2013

    Efficiently boost application performance. This development suite offers industry-leading compilers, along with highly tuned performance libraries for math, crypto, imaging, compression, and others. Harness performance from the latest processors simply by recompiling your code. Scale for multicore and many-core architectures with Intel® Threading Building Blocks and Intel® Cilk Plus™ parallel...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Intel® Inspector XE 2013

    Intel® Inspector XE finds memory leaks, corruption, deadlocks, data races, and more in C, C++, C#, F#, Fortran, and MPI applications. Use a normal build: no special compiler or recompiles are required. Heap growth analysis and debugger breakpoints simplify diagnosis of difficult bugs early in the development cycle―when they are...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By SolarWinds

  • White Papers // Oct 2013

    IT Security. Fighting the Silent Threat

    Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks, such as: ...

    Sponsored By Kaspersky Lab

  • White Papers // Oct 2013

    What’s best for connecting your business?

    Did you know that most cable companies charge you for internet speeds that you’re not actually getting? Or place low limits on the amount of data your business is allowed to use, and then charge you huge overage fees— or even force you to buy a more expensive plan than...

    Sponsored By Alaska Communications

  • Research // Aug 2013

    Research: IaaS impact on data center design and staffing

    The importance of Infrastructure as a Service (IaaS) is evident in the growing number of companies either already implementing, or planning to implement. Underscoring the strength of IaaS is the responses gathered in each of the last two Tech Pro Research surveys on the topic. The first, in April, detailed...

    Sponsored By TechRepublic

  • White Papers // Aug 2013

    Creating a Video Collaboration Strategy: Four Mistakes Mid-Market Companies Make and How to Avoid Them

    Mobile, desktop, dedicated, telepresence – there are more video collaboration options than ever before. With this abundance of choice comes a higher degree of complexity. To put your organization on the path to success, learn the four most common and costly mistakes mid-market companies make when planning their video collaboration...

    Sponsored By AVI-SPL

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Business Insight: Enabling User Mobility with Enterprise Security Solutions

    The belief that “work is something you do, not somewhere you are,” is taking hold for much of the corporate work force. Savvy business leaders have embraced the benefits of user mobility, including: Increased productivity Improved customer relationships (through increased face time) Greater resilience in the face of...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.

    Sponsored By Dell Software

  • White Papers // Jul 2013

    Buyer's Guide: Identity and Access Management

    This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

    Sponsored By IBM

  • White Papers // Jul 2013

    Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Jun 2013

    Why Complexity Is IT Security’s Worst Enemy

    Organizations across the world continue to strive for greater agility, efficiency and innovation. But they also need to cut costs, improve productivity and become more competitive. While this is nothing new, the fact remains that IT is arguably the key department tasked with supporting these needs and ultimately making this...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data under Siege: Protection in the Age of BYODs

    You would be hard pressed to find a single employee who comes to the office without a personal mobile device. Most probably use those devices outside the office to send work-related email messages. BYOD is a reality in today's business world. Is your IT department a roadblock that employees go...

    Sponsored By Kaspersky Lab

  • White Papers // May 2013

    Develop an intelligent disaster recovery solution with cloud technologies

    If you're unhappy with the state of your current disaster recovery operations, IBM is offering a must-read Q and A. In this interview, IBM cloud experts share their insights on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps...

    Sponsored By IBM

  • White Papers // Apr 2013

    Enterprise Security in Transition - An Opportunity for IBM

    Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

    Sponsored By IBM

  • eBooks // Apr 2013

    7 Steps to Next-Gen IT Managed Services

    Managed service providers are expanding their service offerings and adopting a more active role in the management and planning of their clients’ IT infrastructures. How can your business stay up-to-date with the most recent industry trends? This eBook presents seven steps to creating a next-generation IT managed services business. Learn...

    Sponsored By LabTech Software

  • White Papers // Feb 2013

    Family Guide – Eight Steps to Building a BladeSystem

    With an unprecedented set of smart innovations, HP BladeSystem - including the new HP ProLiant Gen8 server family - provides the foundation of a self-aware and intelligent converged infrastructure. We’re talking about a cloud-ready infrastructure that can support all your applications on a single platform, with both ProLiant and Integrity...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Feb 2013

    Building a Business Case for HP Blades Servers

    If your organization is deploying a new server farm or cluster for any reason - a newly virtualized application or a growing business initiative, perhaps - this is the time to consider blade servers as a cost-effective alternative to traditional rack servers. In most use cases, you will find blade...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Feb 2013

    Top 10 Reasons to Move to HP Blade Servers

    Enterprise and midsize businesses are increasingly turning to blade servers as the platform of choice to deliver the next generation of virtualized applications. Blade servers can yield significant cost efficiencies over rack servers - while taking up a smaller footprint, consuming less power and providing significant advantages in terms of...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Feb 2013

    Beyond the Next Generation - Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Feb 2013

    Virtualizing disaster recovery using cloud computing

    Given the demands of an around-the-clock world, organizations need to start thinking in terms of application continuity rather than infrequent disasters. With faster recovery time and reduced costs, cloud-based business resilience can provide an attractive alternative to traditional disaster recovery. Read this paper to learn how organizations can use cloud...

    Sponsored By IBM

  • eBooks // Jan 2013

    Cloud Services for Dummies eBook

    Cloud computing is becoming an integral part of many companies’ business and technology strategies. There are many different delivery models. But two foundational services are essential for cloud computing to become a strategic part of the overall computing infrastructure: Infrastructure as a Service (IaaS) for access to compute and storage...

    Sponsored By IBM

  • White Papers // Nov 2012

    BYOD: Device freedom without compromising the IT network

    To understand the challenges Bring Your Own Device (BYOD) poses, it is helpful to understand the business trends that are driving BYOD adoption. BYOD has become one of the most influential trends that has or will touch each and every IT organization. The BYOD trend means much more than...

    Sponsored By Cisco

  • White Papers // Nov 2012

    BYOD Smart Solution

    Today's CIO must deliver innovative business solutions and give employees more freedom to work the way they want - all while reducing IT complexity. Consumer devices have proven to be a cost effective and attractive way to keep employees engaged and productive, but many organizations struggle with securely introducing these...

    Sponsored By Cisco