ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Configuration ManagementResearch

  • The Top 5 Security Challenges of Higher Education

    Sponsored by: Tenable Network Security

    This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.

  • Why You Should Think of the F5/ADC as a "Platform," Not a "Product"

    Sponsored by: F5 Networks

    This white paper explains that application delivery controllers (ADCs) must be thought of as a platform, not a product, and also introduces one company's innovative application delivery platform.

  • Visualize Your Entire Mobile Environment

    Sponsored by: Fiberlink

    Each entireprise is unique, so you need a flexible yet simple platform to manage your mobile environment.  Enterprise IT is in the middle of a shift in how they provide support and do business, and enterprise management needs to do the same.

  • An Application and Database Delivery Platform Offering Workload Relief to Small Businesses

    Sponsored by: Dell, Inc. and Intel®

    This paper spotlights one company's application and database delivery platform that is ideal for small businesses, minimizing the complexities and costs associated with assembling a disparate, multi-vendor workload.

  • Top Unified Communications Trends For Midsize Businesses

    Sponsored by: Cisco Systems, Inc.

    As corporations become increasingly mobile, and workers collaborate from anywhere in the world, the need for an agile and secure unified communications (UC) infrastructure is clear.

  • How to Use TCO to Build a Business Case for Unified Communications

    Sponsored by: ShoreTel

    Historically, IT investments were made simply in the interest of increasing competitiveness and with little insight into the hard, fact-based financial case.

  • The Top Ten Requirements for a UC Solution

    Sponsored by: ShoreTel

    Unified Communications (UC) has come a long way since VoIP was first introducted nearly two decades ago.  In the past ten years UC solutions have included colaboration tools to substantially improve how we do business.

  • Brian Madden Learns about NetScaler and Virtual Networking

    Sponsored by: Citrix

    Watch to hear Brian Madden talk to experts at Citrix about NetScaler, SDN, and the virtualization of networking in datacenters.

  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Sponsored by: Dell Software

    Sophisticated exploits that utilize advanced evasion techniques are all too common. Anti-evasion data-normalizing techniques are critical to an effective IPS, since evasions that aren't decoded and detected effectively render the IPS useless.

  • Guarding the Castle

    Sponsored by: Dell Software

    This ebook details the sophisticated strategies and tools that today's cybercriminals use to infiltrate your network, and how you can stop them.

  • 10 Ways for Developers to Benefit from Application Performance Management Solutions

    Sponsored by: Riverbed Technology, Inc.

    This white paper covers ten key strategies for developers looking to improve the quality and performance of their software through application management (APM) solutions.

  • 10 Common Problems that Application Performance Management Helps You Solve

    Sponsored by: Riverbed Technology, Inc.

    This white paper breaks down the top ten quality and performance issues that application performance management can help to solve by detecting applications' performance problems and their causes.

  • Howe Robinson - Multi-Protocol Label Switched Network

    Sponsored by: Telstra Global

    This exclusive case study examines how one of the largest ship broking companies uses a multi-protocol label switched (MPLS) network solution to provide their global offices with the resources they need to improve productivity, boost operational efficiency, and drive innovation.

  • Turn Inc – Global Communications

    Sponsored by: Telstra Global

    This informative case study examines how a global business was able to extend their high-performance infrastructure to deliver online responses in less than ten milliseconds, regardless of location.

  • Robert Walters - Global IP VPN

    Sponsored by: Telstra Global

    This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.

  • Network Project of the Year 2014

    Sponsored by: Talari Networks

    This exclusive resource details how a leading railcar manufacturer utilized a networking tool to maximize availability and prevent costly network downtime. Read on to find out more.

  • Talari Mercury Appliances

    Sponsored by: Talari Networks

    This exclusive paper examines a set of network appliances that leverages network bandwidth from multiple sources to enable you to take advantage of the economics of broadband and the public internet without sacrificing business-quality, reliability, or availability.

  • Talari Case Study: American Railcar Industries

    Sponsored by: Talari Networks

    This exclusive case study examines how an American manufacturer was able to utilize a network solution to prevent downtime, eliminate off-hour crises, and maximize efficiencies.

  • Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention

    Sponsored by: Palo Alto Networks

    Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.

  • Case Study: Maricopa Region 911

    Sponsored by: Talari Networks

    This exclusive case study examines how a consortium of local municipalities was able to use a WAN virtualization solution to increase IP network resiliency and predictability, allowing the convergence of data and voice networks.

  • Talari Networks Product Demonstration: Network Resiliency

    Sponsored by: Talari Networks

    This exclusive webcast examines a networking solution that can create a resilient WAN that prevents applications from being affected by link outages, allowing your remote offices to adapt to changing network conditions and reroute traffic quickly to avoid downtime.

  • Getting on the Road to SDN

    Sponsored by: NEC Corporation of America

    This exclusive resource discusses how software-defined networking (SDN) can turn your network into an enabler of modern IT environments while eliminating manual processes, configuration inflexibility, and latency challenges associated with device-centric networking.

  • Extreme - IndentiFi

    Sponsored by: Extreme Networks

    This exclusive webcast discusses wireless networking solution that allows your organization to provide your users with the wireless performance needed to seamlessly access critical applications and data, even if the workloads are media-intensive.

  • Security Considerations When Undergoing a Network Refresh

    Sponsored by: Hewlett-Packard Company

    This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.

  • Creating a Best-of-Breed DDI Solution in a Microsoft Environment

    Sponsored by: Infoblox

    Access this informative whitepaper and learn how you can implement effective DNS, DHCP, and IP address management (DDI).

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.