Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • Research // Sep 2014

    Fixing the Disconnect Between Employer and Employee for BYOD

    The corporate workplace is changing. As employees increasingly use their own phones/tablets/laptops for work, corporate networks will be increasingly vulnerable to sophisticated viruses and malware - unless these devices are reined in with a BYOD enterprise program. Employees and employers often have vastly different attitudes regarding BYOD programs. To better...

    Sponsored By Webroot

  • Research // Sep 2014

    IT Service Provider Breaks Into Storage Services With Disaster Recovery as a Service for Hitachi Content Platform Owners

    In this fast-changing technology landscape, are you looking for cost-effective ways to expand the services your enterprise offers while retaining your share of the market? At first glance, branching out into cloud storage services might appear to be a risky proposition, considering the formidable competitors who occupy that space....

    Sponsored By Hitachi

  • Research // Sep 2014

    IDC Research - Redefining Enterprise Mobility and Increasing Success with Mobile Collaboration

    Adoption of enterprise mobility has surged in the Asia/Pacific region, but this context of mobility tends to be defined as the individual worker being “untethered” from the traditional workplace. While workers have mobile access, they still do not have all that they need to complete a task or project. Download...

    Sponsored By Cisco Systems

  • Research // Sep 2014

    International Mobile Security Survey Research and Considerations for Enterprise IT

    To better understand the rising security challenges associated with integrating mobile devices into business operations, Cisco recently conducted an international survey that explored the attitudes and experiences of end users worldwide. This survey provides insights on how best to approach providing your workers with productive, flexible, and secure network access...

    Sponsored By Cisco Systems

  • Research // Sep 2014

    Secrets of Effective Server Change Management - Japanese

    Take control of change. Only 23% of IT organizations have an acceptable change-related incident rate. Download HP’s new eBook and learn how to dramatically decrease the number of incidents caused by poor server change management.

    Sponsored By HP

  • Research // Aug 2014

    Overcoming 5 Roadblocks in your Ticketless IT Journey

    Get beyond the obstacles that limit your help desk efficiency and start your journey to ticketless IT.. Take your first step by viewing this eye-opening infographic.

    Sponsored By HP

  • Research // Aug 2014

    Gartner Malware Newsletter

    Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But endpoint defenses alone are not sufficient and Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond. Download this research report to learn how HP...

    Sponsored By HP

  • Research // Jul 2014

    The State of Support Services: 2014

    2014 has already proven to be an incredibly challenging and exciting year for customer support. With the backdrop of the changes TSIA identified in the new world of B4B, and all the traditional pressures faced by support services organizations, we are witnessing a pace of change that the majority of...

    Sponsored By LogMeIn

  • Research // Sep 2014

    IDC Server Innovation for Enterprise Datacenters

    With IT environments growing in size, scale, and complexity, CIOs and IT managers are supporting mission-critical business processes with demanding service-level agreements (SLAs) for internal and external customers. This IDC research examines the primary benefits of working with vendors investing in solutions that can process, support, and manage mission-critical...

    Provided By Dell and Intel®

  • Research // Sep 2014

    効果的なサーバー変更管理の秘けつ

    変更管理において主導権を握ることはきわめて重要です。許容できる変更関連インシデント発生率を達成しているのは、IT組織のうちわずか23%に過ぎません。 HPの新しい電子ブックでは、不適切なサーバー変更管理に起因するインシデント発生件数を大幅に削減する方法をご紹介しています。ぜひダウンロードしてご一読ください。

    Provided By HP

  • Research // Jul 2014

    Requirements-driven Quality ROI Calculator

    IBM Rational requirements-driven quality ROI calculator provides an estimated return on investment from implementing one or more of our quality and requirements definition and management solutions. See how these solutions help you achieve predictability in desired business outcomes, allowing you to: Reduce risk and rework by unifying stakeholders and...

    Provided By IBM

  • Research // Oct 2013

    BYOD: Snapshot of the emerging BYOD Landscape: Ready or Not, Here it Comes

    BYOD: Ready or Not, Here it Comes information on BYOD is on the Rise, Company vs Personal, End-users are Driving the Trend, What's Keeping You Awake? And When BYOD is Supported and Embraced GET READY.

    Provided By VMware

  • Research // Aug 2013

    Research: IaaS impact on data center design and staffing

    The importance of Infrastructure as a Service (IaaS) is evident in the growing number of companies either already implementing, or planning to implement. Underscoring the strength of IaaS is the responses gathered in each of the last two Tech Pro Research surveys on the topic. The first, in April, detailed...

    Provided By TechRepublic

  • Research // Feb 2013

    BlackBerry 10: A smartphone beginning or end?

    With a new operating system, two new phones and a rebranding, BlackBerry is starting 2013 afresh. The company formerly known as Research In Motion or RIM introduced its BlackBerry 10 platform, with chief executive Thorsten Heins marking the day as the “starting line” for a new wave of BlackBerry products....

    Provided By ZDNet

  • Research // Feb 2013

    Build A High-Performance Security Organization

    Companies must not only protect their organization from danger but must continue to compete in the marketplace. Companies that ignore security do so at their own risk. Read this Forrester Research Inc report to gain an understanding of what it takes to build a high performance security practice.

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    Holisitic risk management: perspectives from IT professionals

    This research report examines how the drive toward more holistic risk management is affecting the day-to-day work of business continuity planners, IT risk managers and security executives. It also outlines a number of strategies for leveraging their knowledge and working together with their business partners.

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Jan 2013

    System x Selection Tool

    Are old servers holding your business back? Maybe it's time to think about replacing them. The right server can reduce costs and complexity while improving business performance. Check out this simple IBM® System x® Selection Tool to find out which server solution, powered by the latest Intel® Xeon® processor...

    Provided By IBM

  • Research // Jan 2013

    How Mobility Is Changing the World

    Never before in the history of technology, has there been such strong development in three key areas: the power of devices; the plethora of back-end information; and the ability to integrate multiple sources of the latter to display on the former. As a result, these global deployments of mobile technology...

    Provided By SAP

  • Research // Nov 2012

    BYOD: Fueling Mobile Growth, Employee Innovation

    A recent Cisco survey shows that 89% of IT departments worldwide enable BYOD, proving it's a global trend for which IT must prepare. What are the security challenges? The benefits? Learn why the world is drawn to a more flexible network.

    Provided By Cisco

  • Research // Feb 2012

    ACTA: A guide to the treaty from ZDNet

    What is ACTA, the Anti-Counterfeiting Trade Agreement? The international legislation is an intensely contentious document. Drawn up mostly behind closed doors, its purpose is to harmonise intellectual-property enforcement around the world and cut down on counterfeiting and commercial-scale piracy. Why does it matter? Critics say its wording could be used...

    Provided By ZDNet

  • Research // Sep 2011

    ZDNet Tech Family Tree - The history of the iPhone

    Download ZDNet's Tech Family Tree as a PDF and explore the history of the iPhone. The iPhone Tech Family Tree is a wholly original insight into Apple's most famous product. Designed to look good and do good anywhere someone with an interest in technology might be, it's perfect for designers,...

    Provided By ZDNet

  • Research // Jul 2014

    The State of Support Services: 2014

    2014 has already proven to be an incredibly challenging and exciting year for customer support. With the backdrop of the changes TSIA identified in the new world of B4B, and all the traditional pressures faced by support services organizations, we are witnessing a pace of change that the majority of...

    Sponsored By LogMeIn

  • Research // Aug 2014

    Gartner Malware Newsletter

    Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But endpoint defenses alone are not sufficient and Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond. Download this research report to learn how HP...

    Sponsored By HP

  • Research // Sep 2014

    International Mobile Security Survey Research and Considerations for Enterprise IT

    To better understand the rising security challenges associated with integrating mobile devices into business operations, Cisco recently conducted an international survey that explored the attitudes and experiences of end users worldwide. This survey provides insights on how best to approach providing your workers with productive, flexible, and secure network access...

    Sponsored By Cisco Systems

  • Research // Aug 2014

    Overcoming 5 Roadblocks in your Ticketless IT Journey

    Get beyond the obstacles that limit your help desk efficiency and start your journey to ticketless IT.. Take your first step by viewing this eye-opening infographic.

    Sponsored By HP

  • Research // Sep 2014

    Secrets of Effective Server Change Management - Japanese

    Take control of change. Only 23% of IT organizations have an acceptable change-related incident rate. Download HP’s new eBook and learn how to dramatically decrease the number of incidents caused by poor server change management.

    Sponsored By HP

  • Research // Sep 2014

    IDC Research - Redefining Enterprise Mobility and Increasing Success with Mobile Collaboration

    Adoption of enterprise mobility has surged in the Asia/Pacific region, but this context of mobility tends to be defined as the individual worker being “untethered” from the traditional workplace. While workers have mobile access, they still do not have all that they need to complete a task or project. Download...

    Sponsored By Cisco Systems

  • Research // Sep 2014

    IT Service Provider Breaks Into Storage Services With Disaster Recovery as a Service for Hitachi Content Platform Owners

    In this fast-changing technology landscape, are you looking for cost-effective ways to expand the services your enterprise offers while retaining your share of the market? At first glance, branching out into cloud storage services might appear to be a risky proposition, considering the formidable competitors who occupy that space....

    Sponsored By Hitachi

  • Research // Sep 2014

    Fixing the Disconnect Between Employer and Employee for BYOD

    The corporate workplace is changing. As employees increasingly use their own phones/tablets/laptops for work, corporate networks will be increasingly vulnerable to sophisticated viruses and malware - unless these devices are reined in with a BYOD enterprise program. Employees and employers often have vastly different attitudes regarding BYOD programs. To better...

    Sponsored By Webroot

  • Research // Sep 2014

    IDC Server Innovation for Enterprise Datacenters

    With IT environments growing in size, scale, and complexity, CIOs and IT managers are supporting mission-critical business processes with demanding service-level agreements (SLAs) for internal and external customers. This IDC research examines the primary benefits of working with vendors investing in solutions that can process, support, and manage mission-critical...

    Provided By Dell and Intel®

  • Research // Jan 2013

    System x Selection Tool

    Are old servers holding your business back? Maybe it's time to think about replacing them. The right server can reduce costs and complexity while improving business performance. Check out this simple IBM® System x® Selection Tool to find out which server solution, powered by the latest Intel® Xeon® processor...

    Provided By IBM

  • Research // Feb 2013

    Build A High-Performance Security Organization

    Companies must not only protect their organization from danger but must continue to compete in the marketplace. Companies that ignore security do so at their own risk. Read this Forrester Research Inc report to gain an understanding of what it takes to build a high performance security practice.

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    Holisitic risk management: perspectives from IT professionals

    This research report examines how the drive toward more holistic risk management is affecting the day-to-day work of business continuity planners, IT risk managers and security executives. It also outlines a number of strategies for leveraging their knowledge and working together with their business partners.

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Oct 2013

    BYOD: Snapshot of the emerging BYOD Landscape: Ready or Not, Here it Comes

    BYOD: Ready or Not, Here it Comes information on BYOD is on the Rise, Company vs Personal, End-users are Driving the Trend, What's Keeping You Awake? And When BYOD is Supported and Embraced GET READY.

    Provided By VMware

  • Research // Jan 2013

    How Mobility Is Changing the World

    Never before in the history of technology, has there been such strong development in three key areas: the power of devices; the plethora of back-end information; and the ability to integrate multiple sources of the latter to display on the former. As a result, these global deployments of mobile technology...

    Provided By SAP

  • Research // Nov 2012

    BYOD: Fueling Mobile Growth, Employee Innovation

    A recent Cisco survey shows that 89% of IT departments worldwide enable BYOD, proving it's a global trend for which IT must prepare. What are the security challenges? The benefits? Learn why the world is drawn to a more flexible network.

    Provided By Cisco

  • Research // Aug 2013

    Research: IaaS impact on data center design and staffing

    The importance of Infrastructure as a Service (IaaS) is evident in the growing number of companies either already implementing, or planning to implement. Underscoring the strength of IaaS is the responses gathered in each of the last two Tech Pro Research surveys on the topic. The first, in April, detailed...

    Provided By TechRepublic

  • Research // Jul 2014

    Requirements-driven Quality ROI Calculator

    IBM Rational requirements-driven quality ROI calculator provides an estimated return on investment from implementing one or more of our quality and requirements definition and management solutions. See how these solutions help you achieve predictability in desired business outcomes, allowing you to: Reduce risk and rework by unifying stakeholders and...

    Provided By IBM

  • Research // Feb 2012

    ACTA: A guide to the treaty from ZDNet

    What is ACTA, the Anti-Counterfeiting Trade Agreement? The international legislation is an intensely contentious document. Drawn up mostly behind closed doors, its purpose is to harmonise intellectual-property enforcement around the world and cut down on counterfeiting and commercial-scale piracy. Why does it matter? Critics say its wording could be used...

    Provided By ZDNet

  • Research // Feb 2013

    BlackBerry 10: A smartphone beginning or end?

    With a new operating system, two new phones and a rebranding, BlackBerry is starting 2013 afresh. The company formerly known as Research In Motion or RIM introduced its BlackBerry 10 platform, with chief executive Thorsten Heins marking the day as the “starting line” for a new wave of BlackBerry products....

    Provided By ZDNet

  • Research // Sep 2014

    効果的なサーバー変更管理の秘けつ

    変更管理において主導権を握ることはきわめて重要です。許容できる変更関連インシデント発生率を達成しているのは、IT組織のうちわずか23%に過ぎません。 HPの新しい電子ブックでは、不適切なサーバー変更管理に起因するインシデント発生件数を大幅に削減する方法をご紹介しています。ぜひダウンロードしてご一読ください。

    Provided By HP

  • Research // Sep 2011

    ZDNet Tech Family Tree - The history of the iPhone

    Download ZDNet's Tech Family Tree as a PDF and explore the history of the iPhone. The iPhone Tech Family Tree is a wholly original insight into Apple's most famous product. Designed to look good and do good anywhere someone with an interest in technology might be, it's perfect for designers,...

    Provided By ZDNet