ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Capacity Research

  • Case Study: Maricopa Region 911

    Sponsored by: Talari_DON'T USE

    This exclusive case study examines how a consortium of local municipalities was able to use a WAN virtualization solution to increase IP network resiliency and predictability, allowing the convergence of data and voice networks.

  • Talari Networks Product Demonstration: Network Resiliency

    Sponsored by: Talari_DON'T USE

    This exclusive webcast examines a networking solution that can create a resilient WAN that prevents applications from being affected by link outages, allowing your remote offices to adapt to changing network conditions and reroute traffic quickly to avoid downtime.

  • Getting on the Road to SDN

    Sponsored by: NEC Corporation of America

    This exclusive resource discusses how software-defined networking (SDN) can turn your network into an enabler of modern IT environments while eliminating manual processes, configuration inflexibility, and latency challenges associated with device-centric networking.

  • Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)

    Sponsored by: NEC Corporation of America

    This crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.

  • Security Considerations When Undergoing a Network Refresh

    Sponsored by: Hewlett Packard Enterprise

    This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.

  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Sponsored by: DellEMC and Intel®

    Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

  • Guarding the Castle

    Sponsored by: DellEMC and Intel®

    Discover the top four strategies and tools that cybercriminals use to infiltrate your network, and how you can stop them. Read this e-book and learn the importance of securing your network every minute of the day against all types of malware, and how a high performance firewall helps you protect against the latest global threats.

  • Case Study - Psomas

    Sponsored by: Riverbed Technology, Inc.

    This exclusive case study discusses how a consulting engineering firm utilized a network optimization solution to enable their employees to share work and leverage resources wherever they happen to be.

  • Cisco ONE Enterprise Networks Architecture: An Automated, Application-Aware Foundation for the Modern Enterprise

    Sponsored by: Cisco

    Access this white paper to take your first step toward an adaptable network platform –this enterprise network architecture provides the open, programmable, and application-aware foundation you need for today's mobile and cloud-connected world.

  • Cisco ONE Enterprise Networks Architecture: An Automated, Application-Aware Foundation for the Modern Enterprise

    Sponsored by: Cisco

    Access this white paper to take your first step toward an adaptable network platform –this enterprise network architecture provides the open, programmable, and application-aware foundation you need for today's mobile and cloud-connected world.

  • Cisco Intelligent WAN (IWAN): Right-Size Your Network without Compromise

    Sponsored by: Cisco

    This exclusive paper examines an intelligent WAN solution that enables you to deliver an uncompromised experience over any connection, detailing how you can right-size your branch office connections without impacting performance, security or reliability.

  • Adaptive Packet Filtering

    Sponsored by: Gigamon

    This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.

  • What's New in Wireless Networking and 802.11?

    Sponsored by: Global Knowledge

    This exclusive white paper examines the ins-and-outs of wireless networking, discussing the current state 802.11 and what near-future developments you need to prepare for if you want to remain competitive.

  • Next-Gen WLAN: How 802.11ac Will Change Your Network Forever

    Sponsored by: TechTarget Networking

    With the IEEE 802.11ac-2013 standard approved, WLAN data rates are poised to soar to multiple-gigabit territory. This Technical Guide focuses on the WLAN's evolution and why it will soon be a viable alternative to Ethernet.

  • Achieve Deeper Network Security and Application Control

    Sponsored by: DellEMC and Intel®

    Combating emerging threats effectively while reducing the total cost of ownership (TCO) is crucial in a firewall. Read this paper and learn how NGFWs help you achieve a deeper level of security and safeguard your organization against today's evolving threats.

  • Virtualizing the Edge

    Sponsored by: Netsocket

    This exclusive resource discusses an cloud-managed virtual network solution designed specifically for edge deployments that can provide top-notch network performance to distributed environments.

  • Five Steps to Building Visibility and Security Into Your Network

    Sponsored by: Ixia

    Discover five steps you need to take to not only build visibility and security into your network, but also get the most out of your current monitoring investments.

  • Improving Network Visibility with Advanced Packet Filtering

    Sponsored by: Ixia

    Find out more about a network monitoring switch tool with advanced filtering options that can quickly resolve network problems and address future requirements.

  • Network Evolution – March 2014

    Sponsored by: TechTarget Networking

    In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros.

  • Virtual Edge Solution: Advanced, Cloud-Managed Virtualization for the Network Edge

    Sponsored by: Netsocket

    This exclusive resource discusses a virtual edge tool that delivers a completely virtualized network edge solution that is cost-effective, flexible, and simple to use and allows your organization to grow at your own pace.

  • Mobile-First Enterprise; 10 Requirement for Optimizing your Network for Mobility

    Sponsored by: Aerohive Networks

    This informative white paper takes a look at what it means to be a mobile-first enterprise, examining what networks are needed to accommodate today's corporate user and how to overcome the problems IT will inevitably run into.

  • Netsocket's Virtual Edge Solution

    Sponsored by: Netsocket

    This crucial paper identifies the need for and benefits of network edge virtualizations, and analyzes how an SDN-based network edge solution can provide a cost-effective and simple platform for you to grow your network at your own pace.

  • Understanding the Network Impact of 802.11ac

    Sponsored by: Aerohive Networks

    This crucial webcast takes an in-depth look at 802.11ac and the impact it will have on your network, examining current wireless trends along with how you can best prepare your infrastructure for the next generation of Wi-Fi.

  • Managed Service Provider Case Study

    Sponsored by: Netsocket

    This exclusive paper discusses a software-defined networking (SDN) edge service solution that provides an advanced framework for network virtualization, allowing for powerful, automated orchestration capabilities for SDN functions and applications.

  • Why Leaks Matter

    Sponsored by: Lumeta Corporation

    This exclusive white paper takes an in-depth look at the dangers of network leaks and how your organization can form a strategy to mitigate these risks through comprehensive visibility of connectivity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.