Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Apr 2014

    Guidelines for deploying Citrix BYOD solutions

    Read this white paper to learn how Citrix can help you design, implement, deploy, maintain and support a BYOD infrastructure that will enable your environment for BYOD transformation and success.

    Sponsored By Citrix

  • White Papers // Apr 2014

    Enterprise Mobility Management: Embracing BYOD Through Secure App & Data Delivery

    Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.

    Sponsored By Citrix

  • White Papers // Apr 2014

    The 10 Must Haves for Secure Enterprise Mobility Management

    While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.

    Sponsored By Citrix

  • White Papers // Apr 2014

    Taking Your Enterprise Mobile: An Executive Checklist

    According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise...

    Sponsored By Citrix

  • White Papers // Apr 2010

    77 Features for Windows 7 that Every IT Professional Should Know About

    Windows 7 builds on Windows Vista's positives and eliminates many of the negatives. It adds new functionality, is less resource-hungry, and starts and shuts down noticeably faster. Whether you're upgrading from Vista or moving up from Windows XP, these 77 tips and tricks, along with other new and enhanced features,...

    Provided By Global Knowledge

  • White Papers // Aug 2010

    Using Microsoft's Free Tools to Image and Deploy Windows 7

    Microsoft provides freely available and quite powerful tools that can help you image and deploy Windows 7. This white paper explores those components and their processes used during these deployments. It considers and explains every step of a Lite Touch installation, while also detailing the benefits of ImageX, the WIM...

    Provided By Global Knowledge

  • White Papers // Feb 2012

    Basics of IP Address Subnetting

    IP Address Subnetting is a complicated topic that can be confusing for many IT professionals. While you may be using one of the free subnet calculators available on the internet, knowing the reasons behind it and why it works the way it does is critical for true success. This white...

    Provided By Global Knowledge

  • Webcasts // Oct 2013

    On-demand Webcast: Protect your Microsoft server applications and data across physical, virtual, and cloud environments

    If you rely on Microsoft’s server applications – ranging from Exchange to SharePoint to SQL Server, and more – you know how mission-critical those applications are to your core business operations. A catastrophic loss of data or disaster hitting any one of these bottom-line systems could have devastating consequences that...

    Provided By Dell Software

  • eBooks // Jan 2014

    Advanced Evasion Techniques for Dummies

    This book provides an overview of network security in general and explains how cybercriminals can use hidden and mostly undetectable methods to penetrate network systems. You don't have to be a Security Expert to understand how Advanced Evasion Techniques will break the security protection model most businesses are using...

    Provided By McAfee

  • White Papers // Sep 2013

    Flash vs. Disk Video

    Ambuj Goyal and Larry Chiu discuss the importance of flash and how this technology outperforms disk in capacity, cost efficiency, energy consumption and speed to deployment.

    Provided By IBM

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Sep 2013

    Which Mobile Device Is the Most Secure?

    Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....

    Provided By Sophos

  • White Papers // Jan 2014

    Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Provided By IBM

  • Downloads // Feb 2005

    Create a site for e-commerce with PHP, MySQL, and PayPal

    This how-to article offers step-by-step instructions for adding e-commerce capabilities to your existing Web site using PHP, MySQL, and PayPal. The method outlined here lets you add e-business functionality to your corporate portal without a major allocation of scarce development resources.

    Provided By TechRepublic

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Jan 2011

    Speeding Up File Transfers in Windows 7

    File transfers in Windows involve many factors, any one of which can present problems. In a typical Windows network with a mix of clients and servers, file transfer performance can vary wildly. Because it's such a common operation, this white paper examines some of the reasons for the variations and...

    Provided By Global Knowledge

  • White Papers // Jul 2011

    Fundamentals of SCSI and iSCSI

    SCSI (Small Computer Systems Interface), which is present in all personal, defines an initiator/target client/server relationship that includes addresses, commands, and specified operations. The SCSI model has numerous interfaces, including TCP/IP, fibre channel, directly attached parallel bus, and firewire. Fibre Channel and iSCSI are the two major choices for building...

    Provided By Global Knowledge

  • White Papers // Apr 2012

    Windows 8 Reality

    Windows 8 is a Tablet OS first and foremost. Microsoft is designing Windows 8 to run on any type of form-factor, but its roots will be the slate or tablet style of interface. Personally, I know it will be hard for me to adapt at first, but it is time...

    Provided By Global Knowledge

  • White Papers // Jan 2014

    Surviving the technical security crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

    Provided By IBM

  • White Papers // Nov 2013

    Defending Against Denial of Service Attacks

    This whitepaper utilizes end-user interviews to better understand their DDoS defense plans where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and...

    Provided By F5 Networks

  • eBooks // Jan 2013

    Cloud Services for Dummies eBook

    Cloud computing is becoming an integral part of many companies’ business and technology strategies. There are many different delivery models. But two foundational services are essential for cloud computing to become a strategic part of the overall computing infrastructure: Infrastructure as a Service (IaaS) for access to compute and storage...

    Provided By IBM

  • White Papers // Jan 2014

    CryptoLocker - Your Money or Your Life

    CryptoLocker belongs to a family of malware called "ransomware", which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it's too late and the damage...

    Provided By Webroot Software

  • White Papers // Oct 2013

    Mitigating DDoS Attacks with F5 Technology

    Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains...

    Provided By F5 Networks

  • Webcasts // Oct 2013

    On-demand webcast: Top 20 cloud and virtualization do’s and don’ts for IT infrastructure

    There are two types of IT professionals in this world: those who use cloud services and those who provide cloud services for others to use. The lure of being a cloud service user is simple: all you have to do is pay-as-you-go and everything will be taken care of for...

    Provided By TechRepublic

  • White Papers // Oct 2013

    That Dreaded Day: Active Directory Disasters & Solutions for Preventing Them

    While Active Directory's built-in features will keep it running after some failures, there are others from which it cannot bounce back. This paper presents five AD disaster case studies and how they might have been prevented or repaired faster with proper planning and tools. Read the White Paper.

    Provided By Dell Software

  • White Papers // Oct 2010

    WLAN Channel Access: How WiFi Networks Talk and How You Can Make Them Talk More Clearly

    Stations and APs that share a wireless channel can rely on two carrier sense mechanisms to identify when a channel is busy. In crowded WiFi environments, like the one created at the unveiling of the iPhone? 4 to the press, these two carriers are crucial for ensuring network function. This...

    Provided By Global Knowledge

  • White Papers // Apr 2013

    Foundational Focus: OSI Model - Breaking Down the 7 Layers

    The OSI model is a conceptual tool used to discuss and describe network functions. The use of a standard reference model is essential to communicate ideas as well as create new technologies. It is a good idea to be familiar with the OSI model, the features assigned to each layer,...

    Provided By Global Knowledge

  • White Papers // Jan 2014

    IT Infrastructure: From Silos to Optimised Infrastructure Management

    InfoWorld have released the latest results from their IT Monitoring study, evaluating the complexities of managing siloed performance views and the need for a unified IT monitoring approach. This whitepaper provides key insights for IT teams managing traditional and newer technologies across social, cloud and mobile platforms and discusses the...

    Provided By CA Technologies

  • White Papers // Oct 2013

    Internet of Things: Energy Use Case

    An estimated 70% of the energy grid is more than 30 years old, making it prone to stress and failure.

    Provided By Wind River

  • White Papers // Oct 2013

    Security in the Internet of Things White Paper

    The transition to the Internet of Things (IoT) from closed networks is accelerating at a rapid pace—and justly raising alarms about security.

    Provided By Wind River

  • Downloads // Nov 2006

    Use this template to configure QoS on your Cisco router

    Using quality of service (QoS) on Cisco network devices helps provide both bandwidth and priority to certain types of network traffic. Configuring QoS on your Cisco router can be tricky, but this template can help. As a companion download to David Davis' article, "Configure QoS on your Cisco...

    Provided By David Davis

  • White Papers // Jan 2014

    Delivering on the promise of virtualization: Cisco Unified Computing Systems

    This document describes Cisco UCS by looking at how its three main components—unified fabric, unified management, and powerful servers with intelligent Intel® Xeon® processors—solve the problems that virtualization creates. Sponsored by Cisco and Intel® Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or...

    Provided By Cisco

  • White Papers // Oct 2013

    Building Tomorrow's Data Center Network - Today

    Learn how you can build the data center of tomorrow and enjoy its benefits today with an innovative network architecture that provides convergence-ready fabrics, increases application mobility, and provides unified management for network, compute, and storage.

    Provided By Brocade

  • White Papers // Jan 2014

    Avoiding the pitfalls of outdated disaster recovery plans: Evolving business expectations and threats may require new disaster recovery approaches

    IBM has identified seven outdated assumptions on which many organizations base their disaster recovery plans. This white paper lists them and discusses how to modernize disaster recovery operations.

    Provided By IBM

  • Analyst Briefings // Nov 2013

    Analytics Trends 2013: The IT Perspective by Aberdeen Group

    The results of Aberdeen Group's 2013 Business Analytics surveys examine the shifting challenges IT professionals face as they harness an ever-deepening pool of data for analysis. It will also explore current trends in IT's role in successful BI solutions.

    Provided By IBM

  • White Papers // Oct 2013

    The DDoS Threat Spectrum

    Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging...

    Provided By F5 Networks

  • White Papers // Nov 2013

    Operational Analytics from A to Z

    As the market demands faster and more accurate responses to opportunities and threats, operational analytics is becoming the foundation for real-time decision making. The paper outlines the business value and technological foundations of operational analytics.

    Provided By IBM

  • White Papers // May 2012

    Smarter Planet Leadership Series: Air Canada

    Perfecting the art of self service. How self service helped an airline transform their brand.

    Provided By IBM

  • White Papers // Aug 2013

    The 12 Essential Tasks of Active Directory Domain Services

    Did you know there are 12 major tasks in Active Directory (AD) Domain Services management? Delegation of these tasks is key to keeping your AD environment performing a peak levels. But which ones require more time and effort? Which increase workload to the breaking point? And is there a better...

    Provided By Dell

  • White Papers // Apr 2013

    Active Directory Recovery: Be More Prepared

    Active Directory's Recycle Bin won't restore improperly changed attributes, nor recover external objects. To ensure AD integrity, you'll need to plan for multiple scenarios and include broader recovery capabilities. Read the White Paper!

    Provided By Dell Software