HIT Consultant Insightful coverage of healthcare innovation
 

protocol

Results 151 - 175 of 246Sort Results By: Published Date | Title | Company Name
Published By: WhichVoIP     Published Date: Nov 16, 2012
Download this whitepaper to learn more about the benefits of VoIP phone service for small businesses.
Tags : 
voip, voice over internet protocol, pricing, hosted voip, smbs, pstn, public switched telephone network
    
WhichVoIP
Published By: WhichVoIP     Published Date: Nov 16, 2012
In this whitepaper, you'll read about the six things you need to know before choosing a business phone system.
Tags : 
voip, voice over internet protocol, business phone systems
    
WhichVoIP
Published By: WhichVoIP     Published Date: Nov 16, 2012
The purpose of this white paper is to help all businesses, whether large or small, to make the right decision in choosing a business VoIP phone solution.
Tags : 
voip, voice over internet protocol, business phone systems
    
WhichVoIP
Published By: WhichVoIP     Published Date: Nov 16, 2012
In this whitepaper, you'll find a detailed outline of how a hosted VoIP system works and the advantages of choosing one.
Tags : 
hosted voip, voice over internet protocol, communication systems
    
WhichVoIP
Published By: WhichVoIP     Published Date: Nov 16, 2012
Download this whitepaper to learn more about the pros and cons of a hosted PBX phone system.
Tags : 
hosted pbx, voip, voice over internet protocol
    
WhichVoIP
Published By: WhichVoIP     Published Date: Jan 18, 2013
Voice over Internet Protocol, or VoIP, technology provides businesses with several exceptional advantages, ranging from substantial cost savings to increased reliability.
Tags : 
    
WhichVoIP
Published By: Silver-Peak     Published Date: Mar 21, 2012
Why do industry analysts agree Silver Peak is the WAN Optimization vendor of choice for offsite data replication? It starts with a unique, next generation architecture. Conceived from the ground up to optimize all IP applications, regardless of transport protocol or application version.
Tags : 
data center, data replication, disaster recovery, silver peak, technology
    
Silver-Peak
Published By: Silver Peak     Published Date: Jun 24, 2013
Background and Goals of the 2013 Application and Service Delivery Handbook Throughout the 2013 Application and Service Deliver Handbook, the phrase ensuring acceptable application and service deliver will refer to ensuring that the applications and services that an enterprise uses: Can be effectively managed Exhibit acceptable performance Incorporate appropriate levels of security Are cost effective
Tags : 
application, service delivery, cost effective, security, technology, encryption, supporting chatty protocols, transmitting files, cloud computing
    
Silver Peak
Published By: Intralinks     Published Date: Jan 16, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: Risk management – avoiding data breaches and loss of information that can result in non-compliance Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as i
Tags : 
collaboration solutions, risk management, business productivity, it efficiency, business users
    
Intralinks
Published By: VSS Monitoring     Published Date: Jul 09, 2014
Learn how to optimize network monitoring in high-frequency trading (HFT) When a millisecond can cost a $1 million-plus, there's no tolerance for packet loss or latency. Download this white paper to learn how: The bursty data traffic of HFT can overwhelm networks & their legacy monitoring systems.
Tags : 
vss monitoring, network monitoring, security, threats, cyber terrorists, security protocols, high frequency trading
    
VSS Monitoring
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
The fax market is changing significantly though not in the way predicted by many. Far from an inevitable decline brought about by the emergence of e-mail, the demand for fax, particularly from larger companies, is actually growing. The way that fax is managed within the business is also undergoing a significant period of transition.
Tags : 
kudos, lane, lane telecommunications, fax over ip, foip, ip network, integrated business communications, integrated ip, voice market, voip, multi- function peripherals, mfps, erp, public switched telephone network, pstn, fax over internet protocol, t.37, store and forward, t.38, real-time
    
Lane Telecommunications
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
The introduction of e-mail and its exponential expansion into every aspect of business life presented a significant challenge to the fax industry and for some observers it was a foregone conclusion that fax was destined for a rapid demise. It is interesting to note, therefore, that fax has actually continued on a steady growth path that is predicted to continue well into the future.
Tags : 
kudos, lane, fax, foip, fax over internet protocol, migration strategy, network resources, multifunctional peripherals, mfp, lan, erp, crm, business management, in-house pbx, passport fax server, sms, compliance, voip, voice over internet protocol, security
    
Lane Telecommunications
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
There is little doubt that Multi Function Peripherals (MFP) offer businesses of all sizes significant benefits: they combine printing, scanning, copying and fax functions in one machine and deliver considerable cost and space savings. They also address some very important business process, management and legal issues faced by virtually every business. Within this discussion document we concentrate on the fax element and look specifically at the integration of MFPs with network fax run through a fax server such as Lane’s Passport Fax Server.
Tags : 
fax over internet protocol, mfp, multi function peripherals, network fax, erp applications, off-the-shelf, compliance, fragmented audit trail, optimum mfp, smtp, secure messaging, latency, lane, kudos
    
Lane Telecommunications
Published By: BlueCat     Published Date: Jul 09, 2008
This paper briefly traces some of the challenges involved with IP address distribution over the past two decades, to the current adoption of DHCP as the dynamic protocol of choice for pain-free management of network resources. Integral to the theme of secure yet reliable network administration is the integration of DNS and DHCP into a single network device called the Adonis DNS/DHCP Appliance which ensures that traditional barriers to secure and effective resource allocations are overcome with an efficient yet easy-to-use solution that enhances enterprise information security.
Tags : 
ipam, ip address management, address management, dns, dhcp, ip address, bluecat, blue cat
    
BlueCat
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Williams Lea is a leading global provider of customized corporate information solutions. The company needed to reliably, easily and securely transfer sensitive files and implement a system to share files and ensure a business continuity/disaster recovery plan.  Today, Williams Lea uses the GlobalSCAPE’s Enhanced File Transfer (EFT) solution to provide secure protocol support and encryption to protect data in transit and at rest.
Tags : 
eft, enhanced file transfer, managed file transfer, mft, disaster recovery, business continuity, data protection, globalscape
    
GlobalSCAPE
Published By: Intel Corp.     Published Date: Aug 08, 2012
The report outlines the benefits of using HP StoreOnce with NetBackup's integrated Network Data Management Protocol (NDMP) backup capabilities to enhance administrators' abilities to effectively manage NDMP-enabled NAS server backup and recovery.
Tags : 
using, storeonce, ndmp, backup, symantec, netbackup, report, outlines, benefits, network, network, data, management, protocol, nas, server
    
Intel Corp.
Published By: Singtel     Published Date: Oct 28, 2014
There are now a variety of alternatives when it comes to connecting multiple sites with WAN links. Multi Protocol Label Switching is fast gaining popularity for many businesses as their preferred choice when it comes to creating a Virtual Private Network (VPN) over WAN. This paper will discuss the differences between MPLS and IPSec, and the benefits achieved from migrating to MPLS.
Tags : 
singtel, vpn, wan, lan
    
Singtel
Published By: Tripp Lite     Published Date: Mar 02, 2015
VoIP is rapidly becoming the standard for voice communications in business, government, education, government and healthcare. It offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, teleconferencing and other advanced features. The transition to VoIP presents a number of challenges like the need to install new equipment in the MDF and the IDFs dispersed throughout your organization's network/telecom wiring closets. Typical closet designs can't handle the increased wattage and heat output of the PoE switches used to power IP phones. In this white paper you'll learn: • The basics of VoIP migration and implementation • What issues to consider when upgrading network/telecom wiring closets for VoIP • What cost-effective solutions are available to power and protect a VoIP network wiring closet
Tags : 
voice traffic, teleconferencing, messaging, mobility, network, platforms, communication, voip, internet protocol, video, call routing, recovery
    
Tripp Lite
Published By: AuditBoard     Published Date: Nov 26, 2018
Affecting over 200,000 machines in more than 150 countries, the ransomware known as Wanna Decryptor, or “WannaCry,” became the largest cybersecurity attack in history in May 2017. The malicious software locked out users from critical data, and demanded a ransom payment to unlock the contents. Governments, hospitals, and corporations scrambled to address the attack and prevent the infection from spreading. Ironically, the virus’ execution method was simple: it exploited a vulnerable Windows SMB protocol to spread – an exploit Microsoft had addressed two months prior to the attack with the release of a patch.
Tags : 
    
AuditBoard
Published By: IBM     Published Date: Mar 18, 2015
Your business depends on the easy, secure movement of data. But if you’re using outdated technologies and unsecure file transfer protocol (FTP), you’re exposing your organization to risk—and driving up costs as well. Use the FTP Risk Advisor to find out your risk level, and get a customized report with recommended actions you can take to protect your files—and your business.
Tags : 
ibm, secure data movement, risk advisor, file transfer protocol, risk report, file protection
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
In this report, EMA highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application.
Tags : 
network management, network security, enterprise management, security technology, converged security systems, application protocols
    
IBM
Published By: Intel     Published Date: Apr 16, 2012
Read how blades are the best infrastructure choice for an extremely wide range of enterprise applications and use cases.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation
    
Intel
Published By: Microsoft Dynamics     Published Date: Jul 23, 2007
This paper walks you through the tools and technologies that enable service orientation. The purpose of this paper is to share with you the value of Real-World SOA and a few success stories from our customers who have taken on Real-World SOA projects to support their business vision.
Tags : 
microsoft, microsoft dynamics, soa, service-oriented, service oriented architecture, web services, soap, simple object access protocol, dynamics ax, dynamics crm, aif, application integration framework, biztalk, sharepoint
    
Microsoft Dynamics
Published By: Astrocom     Published Date: Dec 13, 2007
Enterprises with mission critical applications are exploring the benefits of disaster recovery sites for their data centers to ensure business continuity. Special network technology is needed to ensure that site failover and failback occurs reliably and predictably. An ideal solution should provide reliable network connections, manage inbound and outbound traffic over multiple WAN links, failover to a secondary data center if all links at the primary data center are down, and eliminate deployment barriers and costs of multi-homing with BGP (Border Gateway Protocol).
Tags : 
data center, datacenter, data centers, business continuity, disaster recovery, backup, recovery, failover, redundancy, high availability, astrocom
    
Astrocom
Published By: Astrocom     Published Date: Apr 23, 2008
Quality of Service (QoS) enables outbound network traffic to be identified and controlled to give priority to certain types of traffic. Network traffic may be categorized based on a variety of criteria including addressing information, protocol, port number (TCP and UDP), and packet length.
Tags : 
astrocom, networking, traffic, quality of service, traffic management, network management
    
Astrocom
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.