- Secure Cloud Networking
- U.S. Defense Contractors Say They Remain Vulnerable to Cyber-Attack
- Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
- Stepping into the Cloud: A Practical Guide to Creating and Implementing a Successful Cloud
- Optimize MySQL Cluster Environments with HGST Flash Pools
June 2009- Wireshark, the world's most popular open-source network analyzer, has become an essential tool to locate and diagnose the cause of network problems in the most efficient and cost-effective method possible. In March 2009, the Wireshark Certification Program was released to validate a candidate's knowledge of Wireshark functionality, TCP/IP troubleshooting, and network forensics/security. In this white paper, we examine how to use Wireshark to troubleshoot some of the top causes of poor network performance.
May 2009- Network security is a top priority for companies, and this includes securing Cisco routers. It is surprising to some that Cisco routers run many services that could create vulnerabilities. Some of these services are enabled by default. This white paper is not an exhaustive listing of all services enabled on Cisco routers that could create vulnerabilities, nor of all best practices for configuring Cisco routers. It is intended to be a vehicle for discussion regarding ...
April 2009- The majority of enterprise Internet traffic passing through the firewall is Web traffic, which creates serious business risks. What's needed is a high-performance solution that can provide total visibility and control of all network users during Web-based communications with zero impact on firewall operations and network bandwidth.
April 2009- Social networking, P2P file sharing, and video-sharing sites dramatically changed how we communicate. As an IT manager, you have to control the infrastructure that supports your organization without completely blocking recreational applications that are an essential part of daily interaction.
April 2009- Application performance and security tend to remain haphazard and unsatisfactory, especially across a distributed enterprise. Enterprises need a new layer of intelligence and control in the network. Learn how the Application Delivery Network (ADN) combines real-time intelligence about users, applications, business rules, network status, and security policies to deliver applications quickly and securely across the WAN and Internet.
April 2009- The criticality of today's Web-based business applications means organizations rely more heavily on SSL encryption, but unfortunately, IT is increasingly "blind" to that traffic. Until now, there has not been a practical solution for "inside-out SSL." Learn how Blue Coat's SSL proxy functionality enables you to extend the power of the intelligent and secure proxy appliances to all SSL traffic.
April 2009- To optimize VoIP deployments, Blue Coat is driving a new generation of solutions designed to accelerate converged IP voice and data networks. With Blue Coat's ADN, IT can deploy application visibility, security and acceleration technologies to deliver the highest quality VoIP transactions possible.
April 2009- It's no secret that application performance drives business performance. But to achieve the level of application performance your business demands, you need total visibility into your network infrastructure so you can identify and monitor all your applications and resolve the issues that impede performance.
April 2009- Ever try walking across the room in the dark? Lack of visibility makes even the simplest task difficult indeed. Imagine tackling complex jobs like nailing ROI targets or meeting rising network performance expectations. Get five concrete reasons why you should work toward greater network visibility.
Companies that cannot adapt to address fluctuating business opportunities and challenges face serious downside risk. The ability to adopt new IT technology successfully can be a major enabler for change, while the inability can be a major anchor that holds a company back, preventing business evolution.
Superficially, it can seem relatively easy to make technology changes, but testing and assessing the impact of those changes ...
January 2009- Today’s small-to-medium sized enterprises (SME) are undergoing the same IT evolution as their large enterprise counterparts, only on a smaller scale. For SMEs, WAN reliability, flexible scalability, performance, and ease of management are as essential to their WAN infrastructure as they are to a large enterprise. SMEs are able to achieve efficiencies and competitive advantages through the adoption of affordable, yet feature-rich WAN optimization technologies. On the other hand, without suitable technology, they will ...
May 2008- NetGear provides a presentation of finding the right switch technology for small to medium-sized businesses.
May 2008- Enterprises and service providers tend to offer WAN optimization as a tactical “quick fix” to performance problems in certain parts of the network. Taking a more strategic approach to WAN optimization can yield benefits across the enterprise that are not limited to fixing short term performance and bandwidth challenges. Ipanema Technologies promotes its Autonomic WAN Optimization System (AWOS), which is designed to deal with meshed networks and meshed traffic flows.
April 2008- ConSentry provides this presentation on Intelligent Switching Architecture. Having intelligence directly in the switch simplifies the task of applying controls, ConSentry explains.
April 2008- Enterprises have tactically deployed WAN Optimization Controllers at sites to improve application performance. While this approach may provide immediate relief, it will not address the application performance control that a global enterprise needs. What are the challenges of a tactical approach to WOCs? How does an Autonomic WAN Optimization System overcome these? Ipanema Technologies offers this presentation on AWOS.
April 2008- Intelligent bandwidth can help rein in networking challenges such as ever-increasing demand for services, security, and networked applications.
April 2008- Virtualization of all resources enables dynamic online operation, says EMC in this presentation. It enables end-to-end dynamic provisioning, load balancing, and nondisruptive optimization of all infrastructure resources. EMC explores unified virtualization infrastructure and its strengths.
Media converters play an important role in today's multiprotocol, mixed-media LANs. For example, LAN administrators can deploy media converters to integrate fiber-optic cabling and active equipment into existing copper-based, structured cabling systems while achieving significant cost savings.
Media converters are also becoming a critical piece of data networks outside the LAN, as electrical-to-optical conversion technology is enabling service providers to speed up deployment and minimize the cost of provisioning fiber to the subscriber, ...
December 2008- At the heart of all IP networks live core network services, like DNS, DHCP and RADIUS, that are crucial for keeping traffic flowing, users connected and applications available. As networks increase in size and complexity, are core network services capable of keeping up?
Media and Entertainment (M&E) companies are moving to managed, automated file based workflows to receive and deliver content to and from many more places in shorter periods of time. Central management and automation are required to manage the growing number of partners – and each partner’s different requirements – without creating an operational nightmare or escalating costs.
Companies want to get their content to new distribution outlets quickly so it can get to ...
June 2008- There are six practical best practices that most enterprises can implement to reduce the impact of email by up to 80%, without changing the culture or operations of the business. These steps will significantly reduce storage and bandwidth costs and help reduce the information overload that is stifling employee productivity.
January 2000- There are six practical best practices that most enterprises can implement to reduce the impact of email by up to 80 percent, without changing the culture or operations of the business. These steps will significantly reduce storage and bandwidth costs, and help reduce the information overload that is stifling employee productivity. This paper discusses the impact of email overload on the bottom line and takes you through each of the best practices your IT department can ...
April 2008- For many years, in most industries, traceability is essential, and very often is mandated by the State. And since Sarbanes Oxley, traceability is mandatory for the information systems bound to financial transactions of a company quoted on the stock market. In most of our systems, traceability is done with logs which provide the history of all transactions. But for networking, it seems that traceability is unknown. Currently, we don't get an accurate picture of how ...
January 2008- WorkLoad Management (WLM) is a WebSphere facility that provides load balancing and affinity between application servers in a WebSphere clustered environment. WLM is an important facet of performance. WebSphere uses workload management to send requests to alternate members of the cluster. This paper helps to debug common problems that are related to workload management in WebSphere Application Server network deployment on distributed and on i5/OS platforms.
January 2008- Load balancing allows incoming HTTP requests to a companys website to be distributed across several physical servers. Incase of failure of one server, other servers pick up the workload. Load balancing can be performed using application software. Bulwark Systems dedicated switch can perform this function much faster as the redirection is handled by specialized hardware. Clients access servers through a virtual IP address, with load balancing.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services