network architecture

Results 51 - 75 of 244Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Jun 22, 2017
The digital financial services world has created an amplified set of challenges for the data center and network. Its role in enabling the success of the wider institution has become even more critical, but to deliver this it needs to provide a higher level of performance with increased agility, while maintaining high levels of efficiency and security. This is forcing institutions to transform their underlying IT capabilities, with the need to simplify the network, obtain more flexible connectivity, automate IT operations, and enable centralized control and administration being core strategies in this respect. As shown in Figure 8, this is driving a number of requirements for the future network. Key considerations for financial institutions in architecture design and vendor selection should be around moving toward a software-defined, intelligent, cloud-ready, and open network that enables the institution to meet its ICT imperatives and achieve these key ICT strategies.
Tags : 
account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Focus     Published Date: Aug 04, 2011
Download this white paper, sponsored by Juniper Networks, to read an interview with IDC's Vice President of Enterprise Communications and Datacenter Networks about the future of network architectures.
Tags : 
data center, data center design, information technology, juniper, networking, traffic spikes, virtualization
    
Focus
Published By: Pure Storage     Published Date: Dec 05, 2018
"Although interest in machine learning has reached a high point, lofty expectations often scuttle projects before they get very far. How can machine learning—especially deep neural networks—make a real difference in your organization? This hands-on guide not only provides the most practical information available on the subject, but also helps you get started building efficient deep learning networks. Dive into machine learning concepts in general, as well as deep learning in particular Understand how deep networks evolved from neural network fundamentals Explore the major deep network architectures, including Convolutional and Recurrent Learn how to map specific deep networks to the right problem Walk through the fundamentals of tuning general neural networks and specific deep network architectures"
Tags : 
    
Pure Storage
Published By: ipoque     Published Date: Feb 14, 2019
Area of business ? Leader in virtualized mobile networks, providing virtualized network solutions to top-tier CSPs Challenge ? vEPC helps CSPs transform their network architecture in order to move to SDN/NFV, reducing overall costs ? Providers of virtualized network solutions have to create a market differentiator to assert their position successfully in an increasingly competitive marketplace Solution ? By embedding the easy-to-implement highperformance DPI-engine R&S®PACE 2 from Rohde&Schwarz, the vEPC vendor can focus on their core competencies in NFV and gain a competitive advantage in the rapidly growing NFV market Benefits ? The strong partnership between the vEPC vendor and Rohde&Schwarz ensures the high performance of the vEPC solution ? Sourcing R&S®PACE 2 guarantees a rap
Tags : 
    
ipoque
Published By: Gigamon     Published Date: Apr 10, 2019
Need powerful visibility and insights into network traffic while reducing risk, complexity and costs? Download the new Definitive Guide™ to Next-Generation Network Packet Brokers to learn why you should shift your infrastructure strategy to include NGNPBs, which offer new, expanded feature sets that simplify your architecture, realize the true ROI of your security tools and give you visibility into critical security threats. Learn how to see, control and secure what matters -- download now!
Tags : 
    
Gigamon
Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper describes the issues that arise when allowing iPad into the enterprise network and the steps IT must take to maintain control. It outlines security considerations, risk mitigation options and the architecture required to support the iPad
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix
    
Citrix Systems
Published By: Dell     Published Date: Sep 24, 2012
Get the benefits of rigorous server, storage and software integration testing with DellT Desktop Virtualization Solutions (DVS) reference architectures.
Tags : 
windows, dell, architecture, virtual desktop environment, network architecture, hardware, storage architecture, server infrastructure
    
Dell
Published By: Juniper Networks     Published Date: Aug 10, 2017
The impact of cloud computing and software-defined networking (SDN), including network virtualization, has convinced large enterprises and customers building private, public, and hybrid cloud networks to consider new approaches to help them meet their current and future data center switching needs. Data center switching platforms are constantly evolving, delivering increasingly better performance while simplifying network operations.
Tags : 
scaling, memory, asic platforms, broadcom, tomahawk platforms, juniper networks, multivector scaling, memory architecture
    
Juniper Networks
Published By: Cisco     Published Date: Apr 10, 2015
Interest in cloud computing over the last several years has been phenomenal. For cloud providers, public or private, it will transform business and operational processes, streamlining customer on-ramping and time to market, facilitating innovation, providing cost efficiencies, and enabling the ability to scale resources on demand. Cisco's Virtualized Multi-tenant Data Center (VMDC) system defines an end-to-end architecture, which an organization may reference for the migration or build out of virtualized, multi-tenant data centers for new cloud-based service models such as Infrastructure as a Service (IaaS).
Tags : 
cisco, design, network architecture, mobile devices, best practices, vmdc, data center, cloud computing, iaas
    
Cisco
Published By: Infoblox     Published Date: Sep 09, 2014
An integrated DNS architecture is needed in today’s networking landscape. Designing a secure DNS architecture requires more than increased bandwidth and QPS. Learn how to build a secure and scalable DNS solution to ensure network availability.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Distributed systems enable different areas of a business to build specific applications to support their needs and drive insight and innovation. While great for the business, this new normal can result in development inefficiencies when the same systems are reimplemented multiple times. This free e-book provides repeatable, generic patterns, and reusable components to make developing reliable systems easier and more efficient—so you can free your time to focus on core development of your app. In this 160–page e-book, you’ll find: An introduction to distributed system concepts. Reusable patterns and practices for building distributed systems. Exploration of a platform for integrating applications, data sources, business partners, clients, mobile apps, social networks, and Internet of Things devices. Event-driven architectures for processing and reacting to events in real time. Additional resources for learning more about containers and container orchestration systems. “There are more
Tags : 
    
Microsoft Azure
Published By: Lenovo     Published Date: Jul 07, 2015
Lenovo® is known for innovative design, superior performance, and reliability. Lenovo Flex System™ — powered by Intel® Xeon® processors — is designed to be the foundation of your IT infrastructure now and into the future. To meet today’s complex and ever changing demands, Lenovo Flex System provides a high performance, integrated infrastructure platform that supports a mix of compute and networking capabilities. The Flex System architecture provides the efficiency you need now, along with the growth path necessary to protect your investment tomorrow. Read more about it when you download! Sponsored by Lenovo® and Intel®"
Tags : 
lenovo, chassis, flex system, integrated infrastructure platform, networking capabilities
    
Lenovo
Published By: Cisco     Published Date: Jun 21, 2016
Transform your business with services that allow you to innovate faster, simplify operations, and reduce risk. Building on an open, software-driven approach that uses virtualization, automation, analytics, and cloud, our networkwide architecture prepares you to respond to new opportunities at digital speed.
Tags : 
    
Cisco
Published By: BlueCat     Published Date: Sep 14, 2007
This paper introduces and describes the principal concepts and techniques involved with DNS best practices.
Tags : 
dns, dns server, dns servers, server, servers, ip network, ip networks, ip address, network architecture, network management, ipam, ip address management, caching server, bind views, best practices, bluecat, blue cat
    
BlueCat
Published By: AWS     Published Date: Nov 07, 2018
To best support global users and customers, enterprises require seamlessly connectivity between branch office locations, applications, and workloads hosted in the cloud. Many WAN solutions are ill-equipped for this task because they are generally rigid, complex to configure, and expensive to maintain. IoT adoption, a dramatic increase of the number of network devices, and the sophistication of security threats further compounds this challenge. Geographically-distributed devices need secure cloud connectivity, limiting the ability of existing WAN solutions to fulfill the need of distributed organizations. Cisco SD-WAN on Amazon Web Services (AWS) is an overlay WAN architecture that is designed to address modern enterprise cloud applications and workloads, heterogeneous WAN connectivity, distributed global workforces, and other business needs that traditional WAN solutions cannot meet. Learn more by downloading this solution brief. Join our webinar to learn -How to migrate a data ce
Tags : 
    
AWS
Published By: F5 Networks Inc     Published Date: Jun 24, 2015
To meet the challenges of IT organizations, Cisco and F5 have developed a shared architectural vision and joint solution to simplify networking and solve pain points in next-generation data centers. The solution extends the F5 Synthesis architecture and programmable Software-Defined Application Services (SDAS) within the Cisco Application Centric Infrastructure (ACI), helping customers efficiently deliver applications that are fast, secure and available. Read the whitepaper to learn more.
Tags : 
appplication services, cloud, software, load balancing, iot, agility, automation, operational efficiency, cisco ace, big-ip, deployment
    
F5 Networks Inc
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : 
viruses, malware, hackers, leaks, supply chain interruptions, stuxnet, scada, usb, multi-zone architecture, dmz
    
Globalscape
Published By: McAfee     Published Date: Jan 20, 2015
Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.
Tags : 
network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
    
McAfee
Published By: CDW     Published Date: Sep 10, 2014
Enterprise-critical applications—those which drive the core of an organization—require the highest availability infrastructure to support the most stringent service levels. EMC meets this need with a high performing, functionally capable, and competitively priced high-end networked storage system—the EMC® Symmetrix® VMAX® 20K system with the Enginuity™ operating environment. The VMAX 20K scale-out architecture helps organizations exceed the performance and capacity demands of hyper-consolidation, cloud deployments, and all-virtual Software Defined Data Centers (SDDCs), while simplifying the costs of data management.
Tags : 
    
CDW
Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends, conficker, virus, agent, endpoint security, networkwide platforms, heuristic scanning, saas, proactive security, network architecture, security architecture
    
ESET
Published By: HP and Intel® Xeon® processors     Published Date: May 08, 2012
Download this paper to learn how HP Networking platforms, built around HP Provision Architecture and Silicon, achieve substantial power savings for all customers and all deployment situations.
Tags : 
smb, hp networking, networking, switches, deployment, power, cooling, packet processing, architecture, deployment
    
HP and Intel® Xeon® processors
Published By: Burton Group     Published Date: Jul 07, 2008
While many enterprise architecture (EA) programs may be less than effective or threatened by extinction, the EA discipline is still an important set of skills and processes that improve IT decision-making and CIO effectiveness. Yet, after decades of architecting systems, the advent of several EA frameworks, and the many definitions available for the term EA, we still strive to understand what EA is, what it does, and what it looks like when it is successful.
Tags : 
architecture, architect, network architecture, it management, network design, network management, burton group, enterprise architecture
    
Burton Group
Published By: Equinix     Published Date: Mar 26, 2015
Seeking to gain a competitive advantage with increased business agility, global consulting engineering construction and operations company CDM Smith decided to transform their current network architecture, leverage a hybrid cloud model to gain access to new dynamic workloads and introduce greater global consistency. By choosing an integrated solution designed by Equinix and partner CFN Services, CDM Smith now has a flexible network model that is application-focused, scalable and cost-effective.
Tags : 
business agility, competitive advantage, integrated solution, application-focused, scalable, cost-effective
    
Equinix
Published By: Equinix     Published Date: May 28, 2015
This infographic provides information on how Performance Hub is designed to improve the performance of your entire network while simplifying your infrastructure and lowering your Total Cost of Ownership.
Tags : 
equinix performance hub, networks, data growth, network architecture, connectivity, network services, cloud, devices, equinix solutions, performance hub
    
Equinix
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.