ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Infrastructure Research

  • In-house Network Test Labs and SDN Switching Assessment

    Sponsored by: Juniper Networks, Inc.

    Keeping an in-house network test lab up to date requires considerable expertise. Learn how to avoid the complexity of maintaining an internal lab by utilizing a virtual test environment. Additionally, learn how expert bloggers assess SDN switching at UNH InterOperability Laboratory.

  • The SDN Charge and the New Role in Mobile Security

    Sponsored by: Juniper Networks, Inc.

    Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.

  • How to Select the Best Network Monitoring Tool

    Sponsored by: SolarWinds, Inc.

    From the essential to the nice-to-have, in this e-guide you will learn the criteria for choosing the best network monitoring tool for your enterprise.

  • How does SDN automation work?

    Sponsored by: Juniper Networks, Inc.

    In this expert e-guide by principal analyst Lee Doyle, learn how SDN allows organizations to automatically scale and provision their networks, and gives them the opportunity to run large, complex applications flawlessly.

  • Laying The Foundation for a Virtualized Network Infrastructure

    Sponsored by: VMware

    SDN, NFV and VNF: Don't get bogged down with these hot-topic terms. This expert guide discusses how and whether you should implement virtualized functions in your enterprise.

  • Understanding SDN Components and Where They're Being Implemented

    Sponsored by: VMware

    Download this expert e-guide for IT expert Andrew Froehlich's guidance on what SDN is, how the approach differs from NFV, and where SDN components are being implemented in current enterprise networks.

  • Storage Networking Technology Steps Up to Overcome Performance Challenges

    Sponsored by: IBM

    Fast flash storage and the growing use of virtual apps carry larger amounts of data than ever before—placing pressure on networks that carry storage traffic. This guide illustrates how to keep storage traffic from becoming the bottleneck in your data center, revealing key improvements to 2016 storage networking technologies.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • How DNS Information Can Help Cut Millions from Your Infrastructure Costs

    Sponsored by: Dyn

    This expert e-guide explains why DNS intelligence is the key to better network capacity planning and dynamic resourcing. Access now to begin planning to cut your infrastructure costs dramatically in the coming years.

  • A Golden Age Dawns for Network Services

    Sponsored by: TechTarget Networking

    Advanced network technology options have expanded, offering enterprises better, cheaper, options for network services. This three part guide is designed to help you understand the ongoing evolution of network services and the connectivity technologies needed to access them.

  • 6 Crucial Incident Response Policy Mistakes to Avoid

    Sponsored by: Delta Risk

    Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.

  • IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy

    Sponsored by: Aruba Networks

    The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.

  • Structuring Your Wireless Enterprise Network

    Sponsored by: Optus

    Has the day of the wireless enterprise dawned? This e-guide addresses this question, as well as the challenges facing enterprise IT as it considers moving towards a wireless network. Additionally, dive into a Q&A with a senior IT engineer on how he adapted his wireless network design to overcome today's challenges.

  • Comparing Enterprise Data Center Cable Types and Their Effects

    Sponsored by: CommScope

    This expert e-guide compares fiber and copper cables and takes a close look at where each type of cable might be used in today's complex data centers. Access now to ensure you're using the right cable for your network. Additionally, further explore fiber optic cable types and their effects on the data center.

  • Ringing Endorsement: Which IP Phone Fits Your Needs?

    Sponsored by: TechTarget Networking

    Despite the rise of smartphones and tablets, many organizations still depend on the IP telephone, because of its reliability and functionality.But with hundreds of models on the market and a plethora of available features, how do you choose the right one for your business? This issue of Network Evolution dials in on that question and more.

  • Your SD-WAN Roadmap

    Sponsored by: Citrix

    Discover how making the transition to SD-WAN can save you money and simplify your current WAN structure.

  • Understanding SD-WAN

    Sponsored by: Citrix

    In this e-guide learn about deploying your WAN architecture onto the cloud, thus creating an SD-WAN architecture that can allow for smarter routing and improved networking. Uncover the benefits of SD-WAN and how its architecture better suits the demands of cloud, mobile and real-time applications.

  • Make EMM Part of a Broader Mobile Enterprise Strategy

    Sponsored by: Hewlett Packard - Intel Xeon

    Are you like many other who think enterprise mobility management (EMM) can be a centerpiece of your mobile enterprise security strategy? Find out why EMM alone is not enough.

  • Which Way Now for Your WAN?

    Sponsored by: TechTarget Networking

    Wire area networks and WAN connection types have evolved. In this technical guide, learn whether your WAN is what it needs to be.

  • Breathe New Life Into Your Data Center Network

    Sponsored by: TechTarget Networking

    This technical guide examines how data center network design needs are changing and which upgrades networking pros should consider to meet the challenge.

  • How to Yield the Benefits of Converged Infrastructure

    Sponsored by: Dell, Inc. and Intel®

    Is converging corporate infrastructure—to eliminate siloed servers, storage, data and processes—worth the risk of potential vendor lock-in? Discover how to yield maximum benefit from implementing converged infrastructure in your data center, as well as learn CI implementation best practices.

  • Cloud Migration Strategies for a Hybrid Cloud World

    Sponsored by: New Relic

    Cloud computing strategies aren't always easy to carry out – especially when migrating between cloud providers or public and private clouds. This e-guide reveals recommended cloud migration practices and explores three common approaches to migrating apps to the cloud.

  • How to Implement Network Microsegmentation

    Sponsored by: NTT Com Security (UK) Ltd

    Discover how microsegmentation can break up your data center into logical elements and reduce its susceptibility to catastrophic lateral movement of malicious activity once a breach occurs.

  • 9 Essential Elements for Effective Enterprise Mobility

    Sponsored by: VMware, Inc.

    Expert-level mobility comes in threes. Uncover three essentials for an effective mobile app strategy, three steps to a successful mobile initiative, and three steps to better mobile data protection.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.