Network infrastructure Whitepapers

Sort by: Date | Company | Title

Redefining networks for cloud, analytics, mobile, social and security
By IBM Australia | 19/8/2015
Much has been written about cloud, big data and analytics, mobile, social, and IT security as significant forces that are transforming information technology and business, but what about their impact on networking? This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data centre and enterprise networks and the changes that organisations will need to make in order to capitalise on these technology forces.
Download this now

The F5 DDoS Protection Reference Architecture part 2 of 3
By F5 Networks | 24/3/2014
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
Download this now

The F5 DDoS Protection Reference Architecture part 1 of 3
By F5 Networks | 24/3/2014
Distributed denial of service attacks (DDoS) attempt to make a machine or network resource unavailable to its intended users, with a wave of crippling attacks on enterprises since 2012. This whitepaper offers guidance to security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks.
Download this now

Unified Access
By Alcatel-Lucent | 7/11/2013
Jump the wall between the wired network and the wireless one.
Download this now

Key Steps to Success fully Migrate to 802.11ac
By Alcatel-Lucent | 23/10/2013
802.11ac is well on its way to becoming the standard for next-generation Wi-Fi. The gigabit speed, improved capacity and reliability that 802.11ac brings to wireless LANs (WLANs) are amplified as mobile users, devices and application usage continue to grow rapidly. In this whitepaper, we look at the five steps for successful migration to an 802.11ac WLAN.
Download this now

Deploying Customer Service in the Cloud
By Oracle | 17/10/2013
Customer engagement is rapidly shifting, and one of the biggest challenges companies are facing is figuring out how to serve consumers in this new digital environment. Implementing and managing new channels needs to be economically palatable, without any disruption to existing customer care practices. This business guide provides insight into how best to deploy customer service in the cloud, detailing the four phases of an evolved customer experience management strategy.
Download this now

Knowledge Management: 5 Steps to Getting it Right the First Time
By Oracle | 16/10/2013
Today customers look to engage with organizations through an increasing number of channels – and expect more from every customer service and support experience. A strategically implemented knowledge management initiative for both the contact center and Web self-service channels offers a powerful answer to this growing need to do more with less. However, a poorly implemented initiative can have a negative impact – increasing call and Web session time and frustrating both customers and agents alike. This eBook sets out 5 simple steps for optimizing customer service and support with an effective, best-practice-led knowledge management initiative.
Download this now

Oracle ERP Cloud Service - Back-Office Solutions that Keep You in Front
By Oracle | 15/10/2013
Learn how you can harness the power of the cloud to run your business more effectively and lower upfront costs. Oracle ERP Cloud Service offers a comprehensive, enterprise-grade cloud that can transform back office operations and allow you to focus on running your business.
Download this now

Guide to the TCO of Encryption
By Check Point Software Technologies | 5/9/2013
While “free” open-source applications still carry unavoidable costs of installation, management, and usage, some costs can be controlled or even eliminated by smart use of appropriate applications, management technology, and best practices. In this whitepaper, we analuse the total cost of owning, managing and using full-disk encryption in large organisations. Click to download!
Download this now

Information Monitoring: How Far Should it Go?
By Clearswift Asia Pacific | 9/8/2013
Information monitoring is a tricky subject. We all want to be able to trust others with data, but information theft and data leakage happen all too often, and organisations are asking themselves how much they should be monitoring the way company information is used. In this whitepaper, we look at why this is an issue and how should it be done? Find out more.
Download this now

Top Whitepapers

Featured Whitepapers