Research Library

Powered by

Network Infrastructure Research

  • Rethinking Network Architecture

    Sponsored by: Juniper Networks, Inc.

    To meet the demands of application environments prevalent in today's data centers, IT leaders need to rethink their approach to network architecture. Access this white paper that explains the need for a new approach to network architectures and how you can enable a simple, open and smart data center.

  • How a School District Swiftly Detects and Remediates Internal and External Threats

    Sponsored by: Cisco Systems, Inc.

    Learn how the Council Rock School District approached their massive network security blind spot and reduced their threat reaction time from months to detect and resolve to mere minutes. Discover what did and what did not work for them, how they also improved their capacity planning, and more.

  • 5 Organizations Harness the Cloud to Transform Their Networks

    Sponsored by: Juniper Networks, Inc.

    Carefully planning your journey to the cloud is essential to your enterprise's continued success. This white paper details how 5 organizations used one unified network platform to easily construct an agile, secure, and cloud-enabled enterprise. Access now to learn about this platform and how it ensures a successful move to the cloud.

  • The Best Ways to Manage Shadow IT

    Sponsored by: Juniper Networks, Inc.

    Shadow IT raises challenges, namely security, integration, and operational ones. This essential guide looks at the trends that are driving the rise of shadow IT, explores the drawbacks and benefits it offers and explains how to design the right network for your preferred shadow IT strategy.

  • Ringing Endorsement: Which IP Phone Fits Your Needs?

    Sponsored by:

    Despite the rise of smartphones and tablets, many organizations still depend on the IP telephone, because of its reliability and functionality.But with hundreds of models on the market and a plethora of available features, how do you choose the right one for your business? This issue of Network Evolution dials in on that question and more.

  • Outperform Your Expectations with Passive Optical LAN

    Sponsored by: Nokia

    Passive optical LAN (POL) technology eliminates the networking limitations of Traditional LAN. This resource offers a side by side comparison of POL and traditional LAN and details the key features of POL. Access now to learn about these features.

  • Passive Optical LAN, Explained

    Sponsored by: Nokia

    This paper outlines the key elements of an enterprise POL. Access now and discover why POL is an optimal enterprise network option for today's digital world.

  • Managing Software-Defined Networks

    Sponsored by: Turbonomic

    Network-heavy workloads place considerable stress on today's virtualized and cloud data centers. SDN technologies aim to reduce the bottlenecks that can precipitate at the network layer in such environments. Access this whitepaper that explores the benefits of incorporating network topology and traffic-matrix information in VM placement decisions.

  • Quantifying Business Benefits of NFV-Based Managed Enterprise Services

    Sponsored by: Ciena

    Service providers are transforming their services and networks by using SDN and NFV. This white paper explains the benefits of the NFV-based managed enterprise services necessary to know for a successful transformation. Access now to learn about these benefits and a consulting service that can help build the business of a SDN and NFV network.

  • The Essential Guide to Licensing Microsoft Azure

    Sponsored by: Softchoice Corporation

    In this guide, you'll get a crash course in the licensing Microsoft Azure. You'll also learn 5 tips and tricks everyone should know as they consider moving to Microsoft's cloud services.

  • Point/Counterpoint: YANG versus TOSCA

    Sponsored by: Ciena

    As SDN and NFV take hold, confusion is growing among developers and network operators. Access this application note to learn how both YANG and TOSCA can help you expand virtualization across the WAN and data center environments – and which is the best choice for your organization.

  • Quantifying the Business Benefits of NFV-based Managed Enterprise Services

    Sponsored by: Ciena

    This white paper discusses the requirements for network operations transformation and outlines the key benefits of new technology approaches that, when combined in an operational platform, satisfy the novel management needs of a virtualized network.

  • SDN and NFV are Changing the Game

    Sponsored by: Ciena

    Network operators are still struggling to meet performance, availability, and bandwidth demands, due to the inherent deficiencies of legacy platforms and technologies. Access this white paper to learn about how you can meet customer demands by implementing SDN and NFV for your business.

  • Competitive Landscape: Carrier-Class Network Firewalls

    Sponsored by: Juniper Networks, Inc.

    As communications service providers (CSPs) move toward software-defined networking (SDN), and virtualizing network functions, new security capabilities must be in place. Access this report to uncover essential competitive insights into carrier network firewall providers.

  • Deliver Security Virtually Everywhere with SDN and NFV

    Sponsored by: Juniper Networks, Inc.

    Security vendors are progressing toward secure SDN and NFV rollouts. Read this report and explore approaches and exhibits for adding a layer of security to virtual network infrastructures.

  • Report: Data Center Networking Trends

    Sponsored by: Juniper Networks, Inc.

    This study provides insight into data center facility trends, including facilities offered by third-party service and network providers. Uncover key insights on how data center decision-making impacts the network and virtualization.

  • A 6-Step Guide to Getting Started with Network Automation

    Sponsored by: Juniper Networks, Inc.

    This white paper features a six-step guide to getting started with network automation. Read on to find an outline of the processes involved in planning for automation, how different areas of business can benefit, and how to ensure the tools and partners you've selected are the right ones.

  • IT Project: Internet of Things

    Sponsored by:

    The internet of things, or IoT, is moving from far-fetched to reality in 2016, and more and more enterprises are taking a serious look at how they can capitalise on this to improve their processes.

  • Target Networking for Successful Cloud Deployments

    Sponsored by: Juniper Networks, Inc.

    This analyst report invites you to foster culture and skill set changes to move beyond traditional network design practices. Discover ways to invest in automation, programmability, and multitenacity capabilities to ensure the network is "cloud ready."

  • Make EMM Part of a Broader Mobile Enterprise Strategy

    Sponsored by: Hewlett Packard - Intel Xeon

    Are you like many other who think enterprise mobility management (EMM) can be a centerpiece of your mobile enterprise security strategy? Find out why EMM alone is not enough.

  • Which Way Now for Your WAN?

    Sponsored by:

    Wire area networks and WAN connection types have evolved. In this technical guide, learn whether and how your WAN is what it needs to be.

  • Your SD-WAN Roadmap

    Sponsored by: Citrix

    Discover how making the transition to SD-WAN can save you money and simplify your current WAN structure.

  • Understanding SD-WAN

    Sponsored by: Citrix

    In this e-guide learn about deploying your WAN architecture onto the cloud, thus creating an SD-WAN architecture that can allow for smarter routing and improved networking. Uncover the benefits of SD-WAN and how its architecture better suits the demands of cloud, mobile and real-time applications.

  • The New WAN: How SDN Changes Wide Area Network Operations

    Sponsored by: Citrix

    This e-guide discusses why network professionals should be rethinking the functions of their WAN, and how to approach the new technology coming to remake the WAN landscape.

  • Enterprise Mobility: How Mobile Device Management Exploded to Include Devices, Apps and Content

    Sponsored by: IBM MaaS360

    Today, nearly every enterprise works with mobile devices, but few know how to maximize their potential. So, how do you turn mobility into a valued asset? Access this white paper to learn about workplace mobility and how to successfully implement a unified mobile policy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.