Home
 > search for

Featured Documents related to »  analyse traffic

Data, Data Everywhere: A Special Report on Managing Information
The quantity of information in the world is soaring. Merely keeping up with, and storing new information is difficult enough. Analyzing it, to spot patterns and

analyse traffic  allows ordinary PCs to analyse huge quantities of data that previously required a supercomputer. It does this by parceling out the tasks to numerous computers at once. This saves time and money. For example, the New York Times a few years ago used cloud computing and Hadoop to convert over 400,000 scanned images from its archives, from 1851 to 1922. By harnessing the power of hundreds of computers, it was able to do the job in 36 hours. Visa, a credit-card company, in a recent trial with Hadoop crunched Read More...
Discrete Manufacturing (ERP)
The simplified definition of enterprise resource planning (ERP) software is a set of applications that automate finance and human resources departments and help manufacturers handle jobs such as or...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » analyse traffic


ShopSocially to Help Retailers Measure Social Commerce Benefits
ShopSocially, a social commerce software provider, has announced the addition of an A/B Testing framework to its platform, so that Internet retailers can

analyse traffic  to Help Retailers Measure Social Commerce Benefits ShopSocially , a social commerce software provider, has announced the addition of an A/B Testing framework to its platform, so that Internet retailers can measure the exact incremental business benefits accrued by adding onsite social commerce modules on their e-commerce Web sites. ShopSocially is a comprehensive social commerce platform that brings “social to commerce” and not the other way around. The vendor makes the entire shopping Read More...
Be There or Be Square? David and Goliath Team on bCentral Auction Site
FairMarket and Microsoft announced the addition of auction services to Microsoft's bCentral, a business portal for small and growing companies.

analyse traffic  There or Be Square? David and Goliath Team on bCentral Auction Site Event Summary FairMarketSM, Inc. (NASDAQ: FAIM proposed) and Microsoft, Inc (NASDAQ: MSFT) announced the addition of auctions to the Microsoft bCentralTM portal for small and growing businesses. Product categories range from Business Machines to Uniforms/Business Dress. Auctions are only one aspect of bCentral, which also provides information to small businesses on subjects ranging from how to build a web site to how to recruit Read More...
Bandwidth Management in Next-generation Packet Networks
Bandwidth managers can provide the basis of a large-scale solution for a quality of service (QoS) that can support public switched telephone network (PSTN

analyse traffic  Management in Next-generation Packet Networks Bandwidth managers can provide the basis of a large-scale solution for a quality of service (QoS) that can support public switched telephone network (PSTN)-grade services. A key aspect of the solution is the ability to be integrated with multi-protocol label switching (MPLS) traffic engineering capabilities, to provide a highly scalable, resilient, and rigorous solution for end-to-end quality of service. Read More...
How MWL Fights E-threats
When you connect to the Internet, you do so through the Windows Socket (Winsock) layer. While this layer is an integral part of the Windows operating system and

analyse traffic  MWL Fights E-threats When you connect to the Internet, you do so through the Windows Socket (Winsock) layer. While this layer is an integral part of the Windows operating system and acts as an interface between your computer and the Net, it cannot distinguish the difference between good traffic and bad. MicroWorld Winsock Layer (MWL) technology helps by sitting on the Winsock layer and analyzing the traffic—before it gets to your computer. Read More...
Cisco’s Complete Network in a Box
Cisco has extended its Architecture for Voice, Video, and Integrated Data (AVVID) to the mid-sized market. Cisco has introduced the new LAN switching solution

analyse traffic  Complete Network in a Box Cisco’s Complete Network in a Box G. Duhaime - June 16, 2000 Event Summary In May Cisco Systems, Inc. introduced a new high performance device targeted for mid-sized companies with 250-1000 employees to its LAN switching product line. This Catalyst switch is based on Cisco's Architecture for Voice, Video, and Integrated Data (AVVID) technology. The new Catalyst 3524-PWR-XL is best described as a Complete Network in a Box . This device is leveraging Cisco's AVVID Techno Read More...
Defending Your Network from E-mail-borne Botnet Threats
Botnets, networks of hacked computers (bots) that are controlled from a central computer, are rapidly increasing in size and complexity to render legacy e-mail

analyse traffic   Read More...
How to Defend Against New Botnet Attacks
In 2008, botnets were responsible for 90 percent of spam. The ever-changing nature of botnets makes them hard to detect and even harder to defend against@and

analyse traffic  to Defend Against New Botnet Attacks Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Source: Symantec Resources Related to How to Defend Against New Botnet Attacks : Botnet (Wikipedia) How to Defend Against New Botnet Attacks Botnet Attacks is also known as : Software Robots , Malware , Phishing Read More...
SurfAid is Not Enough: IBM Partners with WebCriteria
IBM is partnering with WebCriteria to make it possible for users of its SurfAid traffic analysis package to use the WebCriteria product for improved analysis of

analyse traffic  is Not Enough: IBM Partners with WebCriteria SurfAid is Not Enough: IBM Partners with WebCriteria D. Geller - June 6, 2000 Event Summary WebCriteria sells a product that evaluates a website in terms of the reactions of real surfers, as captured in a model (see TEC article Will Max Get Mad When He Surfs Your Website? ) . The WebCriteria product, Max, is not a replacement for traditional traffic analysis. It can be a valuable adjunct that provides insight into why the traffic numbers come out the way Read More...
Will Max Get Mad When He Surfs Your Website?
WebCriteria announced that it has launched a new study of user interaction with Websites. As with previous studies, the results will be used to build a software

analyse traffic  product also provides comparative analyses of competing sites. The company publishes aggregated statistics for various vertical segments for free on its website. Market Impact WebCriteria's approach should interest website marketers. As a result, the products should do well. This will not be an easy product to replicate, although there will probably be some look-alikes if WebCriteria seems to be catching on. And, especially if they can build interesting models from their new research, we expect them to Read More...
Monitoring and Managing Voice over Internet Protocol (VoIP)
As with most new technologies, voice over Internet protocol (VoIP) brings new challenges along with benefits. The main challenge is VoIP’s extreme sensitivity

analyse traffic  and Managing Voice over Internet Protocol (VoIP) As with most new technologies, voice over Internet protocol (VoIP) brings new challenges along with benefits. The main challenge is VoIP’s extreme sensitivity to delay and packet loss compared with other network applications. However, a basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help you keep your VoIP network running smoothly. Read More...
Friendly Competition Friday - 2010 Analyst Audience
I was playing with an interesting site recently called Compete.com. Compete.com tracks the US traffic audience of various Web sites. Thanks to you, our visitors

analyse traffic  Competition Friday - 2010 Analyst Audience I was playing with an interesting site recently called Compete.com. Compete.com tracks the US traffic audience of various Web sites. Thanks to you, our visitors, I was pleased to see that TEC has surpassed a number of firms (Gartner and Forrester) over the last several months. To see for yourself, click this compete.com link for the 2010 stats . click the image for a larger version As much as I appreciate this graph, it represents the US region Read More...
Emerging Services for Wireless Carrier Networks--Design Abstract
The transition to IP A wireless carrier s national or regional next generation core network will be an all-IP network in the sense that IP will be the network

analyse traffic  Services for Wireless Carrier Networks--Design Abstract Emerging Services for Wireless Carrier Networks--Design Abstract If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Network Insight is an IP network systems integrator and managed services provider. Customer-focused network solutions are proven to dramatically reduce costs, increase revenue and create new features and service offerings on networks ranging from several hundred Read More...
Yahoo! Acquires Tumblr
Internet company Yahoo! has entered into an agreement to acquire the Tumblr social blogging service. According to the official press release:Per the agreement

analyse traffic   Read More...
Network Security Best Practices: Competitive Analysis
When it comes to security architecture, choosing a system that’s scalable and applicable to a broad set of security needs is a wise move. New security services

analyse traffic  Security Best Practices: Competitive Analysis Network Security Best Practices: Competitive Analysis If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. At CipherOptics, we make data protection simple. Whether you need to secure data flows over your application environment or encrypt data in motion across the network, CipherOptics makes it easy. Source : CipherOptics Resources Related to Network Security Best Practices: Competitive Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others