traffic management

Results 26 - 50 of 58Sort Results By: Published Date | Title | Company Name
Published By: Tripp Lite     Published Date: May 15, 2018
A Practical Guide to IDF/MDF Infrastructure Implementation Once relegated to early adopters and casual home users, VoIP (voice over Internet protocol) has matured. An essential element of any unified communications (UC) system, it is now the standard method of voice communication in business, education, government and healthcare. If your organization has not already migrated to VoIP, the question is not so much if it will, but when. Cost is the primary driver, since the data network performs double duty by carrying voice traffic as well. VoIP also offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, zoned security, intelligent call routing, disaster recovery, video, teleconferencing, status updates and other advanced features. The transition to VoIP presents a number of challenges, including assessing the ability of your network to handle not only additio
Tags : 
    
Tripp Lite
Published By: Brocade     Published Date: Nov 25, 2015
Improving traffic management can deliver big benefits, especially across a global infrastructure. Read this Brocade white paper to see how virtualizing traffic management helps you improve business continuity and transform the customer experience-without the cost and management overhead of additional hardware.
Tags : 
brocade, birtual, traffic manager, cloud, public cloud, san, data centers, it management
    
Brocade
Published By: Nemx Software Corporation     Published Date: Oct 23, 2007
Email compliance, security and content policy enforcement is a growing priority for all organizations.  Email content control solutions provide real-time scanning of email traffic and provide the foundation for proactive enforcement of regulatory and corporate policies.  However, the administrative burden associated with policy management imposed by most such products is significant.
Tags : 
email security, security management, policy administration, policy management, policy-based, policy based, email compliance, compliance, nemx
    
Nemx Software Corporation
Published By: Splunk     Published Date: Apr 16, 2012
Read how Splunk enabled WhitePages, the largest on-line directory of people and businesses, to protect the site's content and the brand by monitoring abusive site traffic and learn how Splunk's in-house search eliminated a data warehouse investment.
Tags : 
splunk, whitepages, traffic, warehouse, data warehouse, directory, investment, threats data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance, compliance
    
Splunk
Published By: Gomez IT     Published Date: May 23, 2011
Everyone wants more traffic to their web site, right? What happens if the investments you make to drive traffic to your site result in reduced revenue? Continue reading to learn more about how important web load testing is.
Tags : 
gomez, web performance testing, web load testing program, compuware, web application delivery, risk reduction, traffic management
    
Gomez IT
Published By: Astrocom     Published Date: Apr 23, 2008
Quality of Service (QoS) enables outbound network traffic to be identified and controlled to give priority to certain types of traffic. Network traffic may be categorized based on a variety of criteria including addressing information, protocol, port number (TCP and UDP), and packet length.
Tags : 
astrocom, networking, traffic, quality of service, traffic management, network management
    
Astrocom
Published By: IBM     Published Date: Oct 10, 2013
With 2.5 billion employee-owned mobile devices in the workplace today, enterprises are struggling to capture the business benefits while bracing their IT infrastructure against data breaches and a deluge of mobile traffic. A new study reveals that the most mobile-savvy organizations are employing specific best practices, including mobile planning, integration, optimization and management to achieve mobile infrastructure maturity.
Tags : 
mobiles, mobile technology, technology leaders, ibm, global it, it leaders, mobility, wireless, business benefits, mobile traffic, gaining traffic, employing practices, mobile infrastructure, infrastructure maturity, mobile devices, data breach, enterprises, it management, data management
    
IBM
Published By: iSpeakVideo     Published Date: Mar 27, 2009
Thinking of adding video to your site? Read this guide to learn why it is important to use online video to increase conversions on your site and practical suggestions on the best ways to accomplish your goal.
Tags : 
ispeakvideo, online video, internet tools, website tools, website usability, website development, conversion rates, video communication, roi, multi-sensory, video production, virtual spokespeople, crm, user experience, user’s target, ivideo headers, video presentations, traffic management, video banners
    
iSpeakVideo
Published By: InfusionSoft     Published Date: Apr 07, 2011
Infusionsoft, the Leader in Marketing Automation Software has created a simple Guidebook to help business owners navigate online growth.
Tags : 
internet marketing, infusionsoft, small business success, website effectiveness, traffic generation, list building, contact management, e-mail marketing
    
InfusionSoft
Published By: HP     Published Date: Aug 26, 2014
More and more enterprises are adopting “bring your own device” (BYOD) initiatives to let employees choose the device they use. The HP BYOD solution, based on the HP Intelligent Management Center (IMC), offers a single-pane-of-glass network and user management solution for your entire network. With an HP BYOD solution, you can efficiently manage your entire infrastructure, secure personally owned devices, and monitor BYOD traffic. HP IMC also goes beyond the unified BYOD essentials by delivering converged management across various networks—physical and virtual, wired and wireless, and Software-Defined Networking (SDN). Discover how.
Tags : 
byod, holistic, data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, guesswork, agility, cost-saving, software development
    
HP
Published By: VisiStat     Published Date: Mar 22, 2007
This report outlines five important "insider" secrets for measuring the effectiveness of your Website, along with tips on how to turn it into a lead generation machine.
Tags : 
website traffic, visitor tracking, web analytics, web metrics, site analysis, online marketing, site management, increase sales, advertising, marketing campaign, ad tracking, generate leads, sales leads, online sales, sales tool, small business, ecommerce, search engine ranking, seo, keywords
    
VisiStat
Published By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : 
web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag, web logs, log files, server logs, server log files, log-file analysis, web metrics, on demand reporting, real time data, real-time reporting, data collection, statistics analysis, business metrics
    
VisiStat
Published By: iDirect     Published Date: Aug 21, 2009
Secure communications is a necessity for many organizations to protect corporate data. Some highly secure organizations mandate the use of third-party encryption devices or external end to end security protocols. The iDirect Network Accelerator is an external appliance that maximizes the speed of encrypted traffic over a satellite network.
Tags : 
network security, encryption, secure communications, idirect, network accelerator, traffic management, cots, ipsec
    
iDirect
Published By: iDirect     Published Date: Aug 21, 2009
The Internet boom continues to grow as more and more businesses, residential and SOHO clients start using the Internet. As service providers begin to scale their networks to accommodate this tripledigit growth, traffic engineering and scalability of the network has been of utmost importance.
Tags : 
soho, soho security, service providers, network scalability, traffic management, network expansion, idirect
    
iDirect
Published By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : 
ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security, secure computing, securecomputing
    
Secure Computing
Published By: Quocirca     Published Date: Jul 11, 2007
Wide areas networks (WANs) are essential to the majority of businesses, connecting remote locations and individuals back to centralized IT resources. But as the network is expected to handle more bandwidth intensive applications such as voice and video it is essential to ensure the WAN usage is well managed – eliminating unwanted traffic and accelerating business content.
Tags : 
wan, wans, wide area network, wan acceleration, remote workers, bandwidth management, traffic management, quocirca
    
Quocirca
Published By: Neterion     Published Date: Dec 05, 2006
The relentless growth of data and network-intensive applications such as digital imaging, multimedia content, and broadcast/video continues to drive volumes of enterprise data and network traffic. As growth continues, IT managers are challenged with implementing solutions without interrupting critical business processes.
Tags : 
network infrastructure, traffic management, bandwidth management, bandwidth, network management, neterion, networking
    
Neterion
Published By: AT&T     Published Date: Jun 25, 2008
Class of Service (CoS) functionality can help optimize network performance. For a successful deployment, network designers should identify all applications, understand requirements associated with each application, designate appropriate mapping for groups of applications and provide mechanisms in the underlying network to deliver CoS. CoS mapping and deployment are important; adhering to tested strategies and avoiding common misconceptions helps IT managers advance optimization across the wide area network.
Tags : 
class of service, service management, traffic management, bandwidth, at&t, att, network performance management
    
AT&T
Published By: Visualware     Published Date: Sep 21, 2007
It is important to measure the actual data flow of a connection to get a meaningful picture of connection throughput. See how MySpeed measures and reports data transfers, and helps identify performance impacted by network congestion and traffic control.
Tags : 
network traffic, traffic, traffic management, network management, network performance, congestion, network congestion, visual ware, visualware, voip, voice over ip, ip telephony, broadband phone, vonage, networking
    
Visualware
Published By: Visualware     Published Date: Sep 21, 2007
Connection Speed versus Connection Quality is a crucial issue for measuring bandwidth performance. A fast connection speed by itself can render more application deliver problems (such as VoIP), than a slower connection with consistent throughput.
Tags : 
network traffic, traffic, traffic management, network management, network performance, congestion, network congestion, visual ware, connection, voip, voice over ip, ip telephony, broadband phone, vonage, connection quality, network quality, visualware, networking
    
Visualware
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Download this white paper to learn how SMEs are able to achieve efficiencies and competitive advantages through the adoption of affordable, yet feature-rich WAN optimization technologies.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
This paper describes how organizations can use advanced, yet affordable WAN link optimization solutions to leverage the benefits of multiple sites, while maintaining high-performance and reliability for applications delivered across all sites. You will discover how to use WAN link controllers to manage, automatically load balance and failover of multiple WAN and ISP links to ensure site–to-site connectivity, and deliver applications reliably.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
There are many difficult issues related to WAN complexity, cost, and performance. However, many of these issues can be solved through device consolidation. Download this white paper to learn how to achieve efficiencies and competitive advantages through affordable, yet feature-rich WAN optimization technologies.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Download this white paper to learn how to avoid network failures and evaluate the options available to ensure high-availability, network uptime and optimal network performance. It also shows you solutions that are affordable, and when deployed, are operationally cost-effective.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Start   Previous    1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee