ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Management Protocols Research

  • Software-Defined Network Security: A 'No-Touch' Approach

    Sponsored by: VMware

    Despite its difficult-to-define nature, SDN security is an achievable goal if you can extend SDN's role beyond enhanced network capability. But to do this, a new touchless configuration policy may be necessary. In this expert e-guide, we discuss what it takes to make this "no-touch" approach a reality.

  • The Path to Network Performance Nirvana

    Sponsored by: Riverbed Technology, Inc.

    This exclusive infographic will show you why you need to enable better visibility into your network performance.

  • Riverbed Advances Visibility into Virtual Data Centers

    Sponsored by: Riverbed Technology, Inc.

    This exclusive whitepaper looks at an upgraded tool that can enhance your visibility into your network.

  • Howe Robinson - Multi-Protocol Label Switched Network

    Sponsored by: Telstra Global

    This exclusive case study examines how one of the largest ship broking companies uses a multi-protocol label switched (MPLS) network solution to provide their global offices with the resources they need to improve productivity, boost operational efficiency, and drive innovation.

  • MarketScope for Unified Communications for the SMB Market, North America

    Sponsored by: Cisco Systems, Inc.

    This exclusive resource examines the current state of the UC market for SMBs, detailing which providers can give your organization the tools and solutions you need to thrive in today's business environment.

  • Turn Inc – Global Communications

    Sponsored by: Telstra Global

    This informative case study examines how a global business was able to extend their high-performance infrastructure to deliver online responses in less than ten milliseconds, regardless of location.

  • Robert Walters - Global IP VPN

    Sponsored by: Telstra Global

    This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.

  • Network Project of the Year 2014

    Sponsored by: Talari_DON'T USE

    This exclusive resource details how a leading railcar manufacturer utilized a networking tool to maximize availability and prevent costly network downtime. Read on to find out more.

  • Talari Case Study: American Railcar Industries

    Sponsored by: Talari_DON'T USE

    This exclusive case study examines how an American manufacturer was able to utilize a network solution to prevent downtime, eliminate off-hour crises, and maximize efficiencies.

  • Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention

    Sponsored by: Palo Alto Networks

    Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.

  • Getting on the Road to SDN

    Sponsored by: NEC Corporation of America

    This exclusive resource discusses how software-defined networking (SDN) can turn your network into an enabler of modern IT environments while eliminating manual processes, configuration inflexibility, and latency challenges associated with device-centric networking.

  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Sponsored by: DellEMC and Intel®

    Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

  • Case Study - Psomas

    Sponsored by: Riverbed Technology, Inc.

    This exclusive case study discusses how a consulting engineering firm utilized a network optimization solution to enable their employees to share work and leverage resources wherever they happen to be.

  • Top 5 IT Benefits of the Next-Generation Workplace

    Sponsored by: Aruba Networks

    This guide explores 5 top IT benefits of the next-generation workplace and how with the right network tools in place, you can reap the maximum benefits of mobility.

  • Adaptive Packet Filtering

    Sponsored by: Gigamon

    This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.

  • Virtualizing the Edge

    Sponsored by: Netsocket

    This exclusive resource discusses an cloud-managed virtual network solution designed specifically for edge deployments that can provide top-notch network performance to distributed environments.

  • A Practical Guide for Moving to 10GbE

    Sponsored by: DellEMC and Intel®

    The data center landscape for many organizations is constantly changing, leading to challenges for IT professionals. This brief guide highlights how 10 gigabit Ethernet (10GbE) technology can be a solution for some of your IT concerns.

  • Netsocket Virtual Network White Paper

    Sponsored by: Netsocket

    This exclusive paper examines how a completely virtualized network infrastructure, combined with powerful SDN-based applications, can help your organization achieve network automation, interoperability with legacy systems, and real business benefits.

  • Delivering on the Promise of SDN & Network Virtualization Today

    Sponsored by: Netsocket

    This informative resource takes a look at both network virtualization and SDN, examining current pain points, technological advances and how you can reduce capex/opex, automate networks and generate new revenue streams.

  • Avaya Fabric Connect Makes Multicast Simple (Really)

    Sponsored by: Avaya

    This podcast introduces an interesting solution to address the concern of legitimate use cases that haven't made multicast routing any less cumbersome to implement. Find out how you can deploy multicast routing a lot simpler using this innovative technology.

  • Simplify Network Management with New Secure and Scable Wireless Solutions

    Sponsored by: DellEMC and Intel®

    Realizing the value of bring-your-own-device (BYOD) is only possible with a secure and flexible wireless solution in place. This resource explores the challenges of BYOD and the need for wireless connectivity in a wide range of industries, and offers guidance to help you get started.

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • Getting to the Root cause of Network and Application Issues

    Sponsored by: Fluke Networks

    Learn about a tablet-based approach for troubleshooting network and applications issues that helps you get to the root cause faster and more effectively than ever before.

  • Presentation Transcript: Addressing the Common Pitfalls in Availability and Performance Monitoring

    Sponsored by: Software Engineering of America, Inc.

    This is a presentation transcript discussing availability, performance monitoring, environment monitoring and the pitfalls that can occur.

  • WAN optimization: Techniques that speed up your business

    Sponsored by: CDG

    This expert E-Guide discusses best practices and recommendations for WAN optimization. Specifically, learn why packet loss could be the source of WAN performance problems and how virtual WAN optimization software is bringing connectivity to far-flung branches.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.