Research Library

Powered by

Networking Research

  • Why Businesses Are Adopting Network Virtualization

    Sponsored by: VMware

    Whether you virtualization segments or the entirety of your network, it only takes one objective to make it worth your while. Learn how to deliver services faster, strengthen security, and more according to your business needs.

  • Delivering Wireless to Support the University Mission

    Sponsored by: Panduit

    This case study reveals how Purdue University improved their site's wireless connectivity. By improving your network infrastructure you can improve your wireless in tandem.

  • Effect of Next Generation 100 W Power over Ethernet on RJ45 Connectivity

    Sponsored by: Panduit

    This resource discusses adding power to Ethernet cabling, and mitigating the heat issues that rise from embracing this new technology. It further goes into details about implementing this new Ethernet cable infrastructure.

  • Mobility Management Made Simple With IBM MaaS360

    Sponsored by: IBM

    In this webcast learn about a program that enables simple and intuitive application management while keeping mission-critical information safe without slowing down mobile development. Discover a software that allows for single-sign on, separates data for business security, and end-user peace of mind, and more.

  • Power over Ethernet with Panduit Copper Cabling

    Sponsored by: Panduit

    This technology brief provides information and guidance on installing Panduit cabling and connectivity with both the existing PoE+ and the new higher power PoE++ standards.

  • Computer Weekly – 25 October 2016: 25 years of Linux

    Sponsored by:

    In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.

  • DNS For Hybrid Cloud Success

    Sponsored by: Dyn

    This webcast addresses industry concerns about applications hosted in a hybrid cloud, as well as explores various strategies for implementing cloud services in your business. Learn some successful cloud adoption tactics like using traditional technologies to assist cloud migration and focusing on a 3-part migration life-cycle.

  • Enterprise Mobility Management: Mobile Device Management's Expansion to Devices, Apps and Content

    Sponsored by: IBM

    This white paper uncovers key considerations for a unified mobile enterprise policy. Discover how to gain visibility into every device entering your network, as well as ways to ensure corporate data security and productivity simultaneously.

  • What PoE and Powered-Device Wattages Mean For The Future of Cabling

    Sponsored by: Panduit

    Two new flavors of IEEE-specified Power over Ethernet (PoE) are in the works. What does it mean for cabling? Use this white paper to gain insight into the current cutting-edge of PoE cable design, and get a glimpse into the direction this industry is heading, and how enterprises can adjust their practices to become early adopters.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • How the Cloud Stretches Enterprise Networks

    Sponsored by: SolarWinds, Inc.

    This white paper explores how to provide your IT pros with real-time cloud diagnostics to make sure that your network is always running smoothly. Inside learn how you can gain insight into slowdowns and errors in critical elements of your cloud network, discover the contact information of problem nodes, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Suspicious DNS traffic is a telltale sign that a device on your network has been coopted into a botnet. Therefore, monitoring DNS data is an excellent way to determine if a network has actually been breached. Learn here the top three DNS monitoring methods that SearchSecurity suggests.

  • A Golden Age Dawns for Network Services

    Sponsored by:

    Advanced network technology options have expanded, offering enterprises better, but cheaper, options for network services.

  • Network Considerations for Digital Building Infrastructure

    Sponsored by: Panduit

    This webcast explores the concept of creating "Smart Space" workplaces by leveraging Power over Ethernet (PoE) technology to create digital building infrastructures. Discover how you can create smarter facility systems, like LED lighting that becomes part of an intelligent IP platform, allowing light fixtures to monitor CO2 levels and more.

  • If External DNS Fails, So Does Your Digital Business

    Sponsored by: Dyn

    Without properly functioning external DNS, Internet-based resources may "disappear" or become unavailable without warning. To boost DNS management, this Gartner research report explores the concept of externally sourced and managed DNS as a service. Access now to uncover their key findings and learn best practices for improved DNS performance.

  • Is Passive Optical Networking Good For Enterprises?

    Sponsored by: Nokia

    This expert e-guide explores the possibilities a passive optical network or PON offers to both service providers as well as personal users. Access now to discover the key benefits PON could potentially offer to enterprises and the top factors IT managers must consider before choosing PON.

  • Endpoint Monitoring and Forensics

    Sponsored by: LogRhythm, Inc.

    Defending against advanced threats, compliance violations, and operational issues is an ongoing battle. A key part of winning the fight is your ability to correlate what's happening at the endpoint level to event data throughout the network. Find out how to unlock visibility and protection with fully integrated endpoint monitoring and forensics.

  • Computer Weekly – 11 October 2016: Leadership bonus – analysing our UK salary survey

    Sponsored by:

    In this week's Computer Weekly, our UK salary survey shows that IT leaders are benefiting from generous bonuses as tech becomes part of mainstream business. We find out how the internet of things is transforming the railway industry. And the CIO of the Williams F1 team explains how data analytics is boosting race performance. Read the issue now.

  • How Proactive Analytics Can Help You Understand Your Customers' Experiences

    Sponsored by: IBM

    In order to engage and retain your customers, you need to understand their experiences. But how can you put together the whole picture, when there are so many unique puzzle pieces? In this webcast, discover how proactive analytics can be used to measure customer experiences in real-time, predict customer behavior for better engagement, and more.

  • Modernizing the Industrial Ethernet Network with Increased Visibility

    Sponsored by: Panduit

    This technical resource discusses how you can implement an Ethernet network that can tie your whole manufacturing operation together. This connected strategy has the ability to deliver unprecedented levels of monitoring, management, visibility and efficiency.

  • Automation World Tactical Brief - IIoT EcoSystem

    Sponsored by: Panduit

    This multi-article briefing discusses many aspects of the Internet of Things – and particularly the Industrial Internet of Things (IIoT) – and how it is shaping networks and enterprise operations. From manufacturing to modeling, the IoT is going to radically change how all enterprises do business, but how will it affect you?

  • A Roadmap for Transport Network Modernization

    Sponsored by: Cisco Systems, Inc.

    Today's transport network is suffering somewhat of an identity crisis. In this e-book discover the background and current state of metro transport networks and the challenges you're facing today and tomorrow as providers.

  • A reference architecture for the IoE

    Sponsored by:

    Analyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).

  • Raspberry PI with Java: programming the internet of things

    Sponsored by:

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

  • Disruption Defined: What Your Business Needs to Know About Moving to the Cloud

    Sponsored by: TeraGo Networks

    Moving to the cloud is a business decision – not a technology decision. In order to become an enduring business, the benefits of the cloud have to be leveraged. Access this e-book to discover how you can remain ahead of the potential pitfalls.

Browse by Report Type: Networking White Papers | Networking Multimedia | Networking IT Downloads

See more topics related to: Networking

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.