business network

Results 1 - 25 of 700Sort Results By: Published Date | Title | Company Name
Published By: 8x8 Inc.     Published Date: Jun 16, 2017
Some companies opt to deploy UC solutions on-premises, but the cloudbased model is gaining popularity. Cloud-based UC solutions are ideal for businesses that have limited IT staff, a distributed workforce and/or a desire for pay-as-you-go flexibility. By enabling diverse communication media to be carried over a common IP network, UC solutions make it possible to manage a full suite of capabilities from a single point—and use them with common devices. But what’s the best way to maximize UC capabilities for your specific workplace? Spiceworks surveyed IT decision makers to get their insights on identifying and deploying collaboration and communication solutions across their organizations. This white paper explores the survey results, including key concerns, pain points, and roadmaps around driving UC strategies.
Tags : 
technology solutions, mobile workforce, interface optimization, 8x8, desk phones, internal collaboration, remote employees, cost reduction
    
8x8 Inc.
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Government and public sector agencies are just beginning to realize how social networks can improve business results. With access to real-time communication, collaboration, and social networking platforms, agencies can improve internal process efficiencies that help them provide better services to their constituents. But first, these agencies have to consider regulatory requirements like the Freedom of Information Act (FOIA) which require compliant use of these networks and the content people create on them. Read this paper to gain an understanding of: What the regulatory landscape of the public sector looks like What concerns you should be aware of from a legal perspective
Tags : 
electronic communications, public sector, social networking platforms, compliance, real-time communication, it management, enterprise applications
    
Actiance, Inc.
Published By: Aerohive     Published Date: Feb 06, 2008
Yesterday’s fat access points and legacy wireless LANs typically can’t handle mission-critical, real-time applications, nor do they have a migration path to 802.11n. Aerohive Networks has developed a new controller-less architecture that provides an innovative way to handle tomorrow’s wireless challenges – like voice over WLAN and migrating to 802.11n – without costing you a fortune. This paper discusses the benefits of this approach and the key underlying technologies of cooperative control, including best path forwarding and policy enforcement at the edge.
Tags : 
business, roi, tco, wireless lan, enterprise wireless, economics, cooperative control, aerohive, aerohive networks, networking, wireless
    
Aerohive
Published By: Aerohive     Published Date: Feb 06, 2008
Are you looking to reduce the operational cost of your existing wireless LAN, and to make it support mission-critical, real-time applications and 802.11n? At the same time, are you challenged with the cost and complexity associated with most next-generation wireless LAN architectures? Check out the enterprise-class, cost-effective new cooperative control architecture from Aerohive Networks. In this real-world case study, you’ll see how Aerohive Networks' cooperative control architecture combines the linear cost modeling of autonomous APs and the operational advantages of controller-based approaches.
Tags : 
business, roi, tco, wireless lan, enterprise wireless, economics, cooperative control, aerohive, aerohive networks, wireless
    
Aerohive
Published By: Aerohive     Published Date: May 13, 2015
A paper on enabling cloud networking to lower IT costs & boost IT productivity.
Tags : 
benefits of cloud networking, advantages of cloud networking, cloud, networking, cloud networking, aerohive networks, hivemanager, cloud computing
    
Aerohive
Published By: AI Business     Published Date: Mar 11, 2019
LOOK TO RELEVANT USE CASES FOR YOUR BUSINESS. While use cases vary across industries, the most common ones fall into these categories and are usually associated with the listed neural network: • Image classification or object detection: convolutional neural network (CNN) • Time-series predictions: long short-term memory (LSTM) • Natural language processing: recurrent neural network (RNN) • Unlabeled data classification and data labeling: autoencoder (AE) • Anomaly detection: autoencoder (AE) • Recommender systems: multilayer perceptron (MLP) Work with your deep learning talent or consultants to identify which use cases best match your organization and desired solutions. Then recreate a successful, already proven method.
Tags : 
    
AI Business
Published By: Akamai Technologies     Published Date: Sep 12, 2017
Online images used to be simple. In the past, they weren’t the focal point of a page — there were only a handful of images on a given page and all users were viewing online images on a desktop with dial-up. That has all changed. Today’s web pages are dynamic, filled with images and viewed by end users on different devices with varying connectivity. As audience expectations for rich web experiences have grown, so has the requirement to deliver increasingly image-heavy web applications. The problem? The cost and complexity of creating, storing, and delivering web images tailored for every device poses a significant challenge for businesses, but failing to address the increasing diversity across devices and networks will lead to a poor and inconsistent user experience. Current solutions don’t solve this problem completely.
Tags : 
cloud image management, online images, web applications, devices, web experience
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
    
Akamai Technologies
Published By: ALE     Published Date: Dec 05, 2018
A hospital’s network is the foundation for the critical applications that run on it, where most of those applications are related to the hospitals core businesses. The return on the investments made in EMR (electronic medical records), PACS (picture archiving and communication system), clinical imaging systems and workstations on wheels, can only be truly realized if those assets are always available to the people in need in a reliable, secure and highly optimized way, at a fixed location, or while mobile. Find out how to simplify network management and enhance application and service visibility with Smart Analytics and PALM by downloading this whitepaper today.
Tags : 
    
ALE
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
This whitepaper provides an overview of how Craigs International leveraged Alibaba Cloud’s technology solutions, including Cloud Enterprise Network (CEN), Virtual Private Network (VPN) Gateway, and Smart Access Gateway (SAG), to build a global enterprise network. Alibaba Cloud’s solutions helped them improve business operations, increase efficiency, maximize profitability, and reduce OPEX and CAPEX costs. Craigs International wants to move to the cloud to build a global hybrid enterprise network by partnering with a technology player that has such solid experience within Mainland China.
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Apstra     Published Date: Feb 21, 2019
The enterprise data center has undergone several major shifts since the introduction of computing as a business resource. Data centers have evolved from mainframes to client/server to virtual servers, and then to being “software defned,” and fnally to their current state of disaggregation. Today, we sit on the precipice of the next major data center transition—the evolution to an intent-based data center (IBDC) (Exhibit 1). Each transition saw the cost of computing decrease and the importance of the network increase, and each enabled organizations to boost the efciency of their data center operations and improve asset utilization—ultimately leading to a better experience for users
Tags : 
ibn, ibdc, data center infrastructure
    
Apstra
Published By: Arbor Networks     Published Date: Jan 31, 2013
This paper will look at DDoS attacks in detail. It will illustrate the attack vectors being used and describe why the threat to organizations is greater than ever before
Tags : 
anti-ddos, products, services, critical, business environment, ips devices, firewall, arbor network, security, knowledge management, data management, business technology, data center
    
Arbor Networks
Published By: ArborNetworks     Published Date: Feb 12, 2016
The modern enterprise is dependent upon connectivity at every level. Every business initiative, whether driven by sales, marketing, manufacturing, finance, R&D or HR, is dependent upon reliable network availability and continuity. Disrupting that continuity is what Distributed Denial of Service (DDoS) attacks are all about.
Tags : 
arbor network, ddos, enterprise, attack, network, business technology
    
ArborNetworks
Published By: Aruba Networks     Published Date: Jul 03, 2013
The next-generation workplace is all about mobility. It has to be. By the end of 2013, there will be more Internet-connected mobile devices than people. Networking for the next-generation workplace must ensure that each device and business application has reliable service tailored to its performance needs. And that the network is right sized for mobility. Download this white paper to access the key characteristics of the network for the next-gen workplace…
Tags : 
802.11ac, mobile technology, migration, 5ghz
    
Aruba Networks
Published By: Asentria Corporation     Published Date: Sep 04, 2007
One of the greatest challenges to any advanced wireless operation is the maintenance of continuous and economical service. Today’s networks have evolved into business-critical services that organizations rely upon every day. However, unplanned remote site downtime due to equipment and power failure, and adverse environmental conditions can severely impair network service.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
As a provider of cable television, telephone, and high-speed Internet for the City of Burlington, Vermont, Burlington Telecom (BT) offers communication services to more than 16,000 homes. By the end of 2008, BT’s communications infrastructure will allow every home and business in the city to have access to its fiber optic network.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Budgets are tight in today's business environment. You may be asked to do more with less. Take a look through your equipment room. You may have several devices that work just fine, but they are not visible via your network management system (NMS).
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Astaro     Published Date: Jan 19, 2011
Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.
Tags : 
astaro, cloud computing, botnets, network, security
    
Astaro
Published By: Astrocom     Published Date: Dec 13, 2007
Enterprises with mission critical applications are exploring the benefits of disaster recovery sites for their data centers to ensure business continuity. Special network technology is needed to ensure that site failover and failback occurs reliably and predictably. An ideal solution should provide reliable network connections, manage inbound and outbound traffic over multiple WAN links, failover to a secondary data center if all links at the primary data center are down, and eliminate deployment barriers and costs of multi-homing with BGP (Border Gateway Protocol).
Tags : 
data center, datacenter, data centers, business continuity, disaster recovery, backup, recovery, failover, redundancy, high availability, astrocom
    
Astrocom
Published By: Avaya     Published Date: Dec 18, 2013
It is a business maxim that the more a company knows about its customers and what they want, the better its chances of providing them a positive, fulfilling experience. With today’s ubiquitous, convenient communications methods, particularly the use of mobile devices and networks, opportunities for rich customer interactions are flourishing. Whether their interest is pricing, store locations or product support, people increasingly expect information to be available wherever, whenever and however they want it.
Tags : 
avaya, cem, customer experience management, contact center, mobile, mobile devices, customer interactions, it management, data center
    
Avaya
Published By: Avaya     Published Date: Jun 23, 2011
Watch this recorded event where you'll hear how Buddy Valastro's "Think Big" philosophy is a key ingredient to his success and how technology is helping his business work faster to serve customers better.
Tags : 
think big, avaya, customer service, business growth, crm, collaboration, ip networks, small office, smb networks, smb, software
    
Avaya
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee