> Research Library
 

Find Research


Add Research

Get your company's research in the hands of targeted business professionals.

network performance

Results 226 - 250 of 462Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems     Published Date: Feb 10, 2016
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
    
Citrix Systems
Published By: Riverbed     Published Date: Nov 12, 2012
Employees at Waltons, the only national office products supplier in Southern Africa, were experiencing delays when accessing applications over the WAN. The solution: WAN optimization from Riverbed, which resulted in a 2-3x improvement.
Tags : 
case study, application performance, wan, wan optimization, wide area network, wide area network optimization, it performance, enterprise applications
    
Riverbed
Published By: Heroix     Published Date: Jan 23, 2013
An application and network performance monitoring tool can be the means to meet larger corporate goals of reduced costs, operational efficiency, and time savings for IT and other staff.
Tags : 
it performance monitoring, sla, service level agreement, network, consolidation, bandwidth management, application integration, application performance management
    
Heroix
Published By: CDW     Published Date: Nov 13, 2012
WAN optimization techniques tweak bandwidth for better network performance and more.
Tags : 
cdw, wan, wan optimizers, data compression, information caching, bandwidth
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
An ambitious mobile strategy built around tablets is helping Hyatt Hotels reach new levels of customer service.
Tags : 
mobile strategy, case study, wireless strategy, customer service, modernizing hospitality, apple, ipad, technology for businesses
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Pairing a BYOD program with MDM technology, a California law firm serves up a mobile strategy that lets its lawyers work where and when needed — securely.
Tags : 
consumerization, mdm, mobile device management, manage devices, attorneys work, airwatch, cloudbased, ios
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
CDW’s Mobile Expense Management solution enables organizations to view, integrate and manage mobile communications costs across the entire organization in order to make more informed strategic decisions.
Tags : 
mobility management, mobile expense management, total mobility, cdw, expense management, mobile expense, historical invoice audit, invoice process
    
CDW
Published By: Viavi Solutions     Published Date: Apr 14, 2017
NPMD solutions are typically not directly involved in the actual card cardholder transaction. However, given that many can potentially capture and transmit cardholder data they must be viewed as an integral part of a business’ PCI DSS compliance strategy, especially when investigating data breaches for the purposes of reporting or remediation. Therefore, beyond satisfying your service delivery monitoring and troubleshooting requirements, be sure to verify your NPMD solution protects cardholder data and aids your efforts in PCI DSS compliance.
Tags : 
network security, account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network. This white paper guides you through the essentials of VoIP troubleshooting, including common problems and the metrics you should employ to fix and prevent them. You’ll learn how these metrics relate to one another and to overall VoIP health. You’ll also learn the best practices for keeping your VoIP network flowing smoothly, your time-to-resolution low, and end users happy.
Tags : 
sensitive information, data protection, network security, asset protection, network performance, network analysis, troubleshooting solutions
    
Viavi Solutions
Published By: Aruba Networks     Published Date: Jul 03, 2013
The next-generation workplace is all about mobility. It has to be. By the end of 2013, there will be more Internet-connected mobile devices than people. Networking for the next-generation workplace must ensure that each device and business application has reliable service tailored to its performance needs. And that the network is right sized for mobility. Download this white paper to access the key characteristics of the network for the next-gen workplace…
Tags : 
802.11ac, mobile technology, migration, 5ghz
    
Aruba Networks
Published By: Dell     Published Date: Sep 12, 2013
With the arrival of Dell 12th generation servers (12G) and Microsoft Windows Server 2012, your organization can now significantly simplify Windows Server deployment. Window Server 2012 delivers a number of new enhancements and features over your current Windows Server 2003 or Windows Server 2008 infrastructure. With Windows Server 2012, your organization can benefit from improved virtualization, identity and access control management, graphical interface, storage and networking, and Web and application hosting. Dell 12G servers provide a powerful platform for Windows Server 2012 and its advanced features, giving your organization better performance, reliability and management, all of which improve return on investment (ROI) and your bottom line. For more information on powering Dell servers with Windows Server 2012, see www.dell.com/ws2012.
Tags : 
dell poweredge, 12g servers, windows servers, performance, reliability, control management, graphical interface, storage
    
Dell
Published By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
The network of yesterday is not the network that can take businesses into the future. As mission critical enterprise applications move to the cloud, wide area network (WAN) must adapt to become agile, flexible, and scale rapidly. Leading IT trends such as Internet of Things (IoT), Software as a Service (SaaS), cloud storage, enterprise mobility, emerging transport alternatives, and globalization increase the importance of how network assets are leveraged and how the network is conceptualized. The advantages of public and private data centers and cloud-based applications are significantly diminished if the network is slow, inflexible, and unpredictable. Erratic network performance with high latency, jitter and packet loss can significantly impact user adoption, satisfaction, and overall corporate productivity. As connectivity options continue to emerge, end users are no longer tethered to the office or to the localized applications and services that were trademarks of a primary or branc
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. Over the years, organizations consolidated many regional data centers into a few highly available data center locations which meant that remote locations had to connect to centralized applications over WANs and all internet traffic went through these data centers as well. This introduced bandwidth constraints and latency issues. The development in WAN optimization provided incremental and measurable improvement in WAN performance and provided some bandwidth cost containment. However, that technology typically was only deployed at the most problematic sites that struggled to achieve acceptable levels of performance and user experience. It did not solve all the issues with WAN connectivity. WAN infrastructure planning was limited to increases in capacity that were met by provisioning additional carrier MPLS (multiprotocol label switching)
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Dell EMC     Published Date: Mar 18, 2016
Over the past few years, new IT infrastructure options for enterprise transactional applications have arisen thanks to numerous improvements in storage processing power and the robustness of networking protocols. SAN protocols are no longer the only option for IT storage administrations. VMware, Hyper-V, SQL, and even SAP and Oracle deployments have taken advantage of the benefits offered by NFS, and more recently SMB 3, network-attached storage (NAS) protocols. However, support for NAS protocols alone is not enough. EMC and Brocade understand that supporting enterprise applications requires delivering enterprise storage and networking capabilities to maximize resiliency and performance.
Tags : 
emc, vnx, connectrix, transactional nas, enterprise workloads, infrastructure
    
Dell EMC
Published By: AWS     Published Date: Oct 30, 2018
Businesses that want to drive new value from critical SAP workloads are looking at Amazon Web Services (AWS) due to its breadth and depth of services and rapid pace of innovation. As they pursue this initiative, organizations commonly seek an experienced partner to reliably migrate critical SAP workloads and integrate them with AWS services to take full advantage of the potential cost and operational efficiencies. Linke, an AWS Partner Network (APN) Premier Consulting Partner focused on running SAP on AWS, can help you achieve these initiatives. Transform your SAP landscapes with streamlined migration practices and technology proven to accelerate the deployment of new SAP landscapes by 80% and reduce operational costs 70% compared to on-premises. Register for our upcoming webinar to learn how Linke helped Ávoris, a leading tourism business in Spain, migrate their SAP landscape to AWS in just three months, enabling drastic improvements to performance, reliability, and scale."
Tags : 
sap, performance, aws, linke, avoris
    
AWS
Published By: Citrix Systems     Published Date: Feb 14, 2019
"If you're moving to multi-, hybrid-, or cloud-based infrastructures, your networking solution could be the key to a streamlined transition. In our e-book, ""How your network can take on the cloud — and win,"" you'll learn how the right network solution will simplify app delivery and protect your entire infrastructure, so that you can navigate your journey to the cloud with confidence. Download our e-book and find out how: - Reduce risks with secure contextualized access - Ensure reliability and performance - Make informed decisions using intelligent insights and visibility"
Tags : 
    
Citrix Systems
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
You’ve been having trouble sleeping because of the SSL visibility problem with all the fancy security tools that don’t do decryption. Put down that ambien, because this Lightboard Lesson solves it. In episode, David Holmes diagrams the Right Way (tm) to decrypt and orchestrate outbound SSL traffic, improving SSL visibility, decreasing failures and improving network performance.
Tags : 
ssl, outbound visibility
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
You’ve been having trouble sleeping because of the SSL visibility problem with all the fancy security tools that don’t do decryption. Put down that ambien, because this Lightboard Lesson solves it. In episode, David Holmes diagrams the Right Way (tm) to decrypt and orchestrate outbound SSL traffic, improving SSL visibility, decreasing failures and improving network performance.
Tags : 
ssl, outbound visibility
    
F5 Networks Singapore Pte Ltd
Published By: SafeNet     Published Date: Oct 06, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : 
safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management
    
SafeNet
Published By: Cisco     Published Date: Jun 12, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth
Tags : 
cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security
    
Cisco
Published By: F5 Networks Inc     Published Date: Aug 16, 2016
Together, VMware and F5 enable global IT leaders to empower the Anywhere Enterprise to deliver enterprise applications across all devices and clouds built on SDDC principles. Today VMware and F5 offer the most sophisticated, end-to-end solutions for mobility, application delivery and network security to help CTOs and CIOs: - Ensure unprecedented application agility with a software-defined infrastructure and application services platform; - Automate application delivery while ensuring performance, availability, scalability, efficiency and security; - Achieve simplified end-to-end networking through an application-centric approach.
Tags : 
anywhere enterprise, vmware, enterprise it, application agility, software-defined infrastructure, it infrastructure, networking, it management
    
F5 Networks Inc
Published By: Safenet     Published Date: Oct 11, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : 
safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management
    
Safenet
Published By: EMC Converged Platforms     Published Date: Aug 19, 2016
VxRail is aiding in Land Rover BAR’s quest for the America’s Cup.
Tags : 
data center, data application, network performance, data virtualization, optimization, security, technology, network management
    
EMC Converged Platforms
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library