ComputerWeekly.com Research Library

Powered by Bitpipe.com

Networking Research

  • Build Your Own Ethernet Fabric

    Sponsored by: Brocade

    Learn about creating a self-forming and self-healing Ethernet fabric, and why Ethernet fabric is the right choice for your data center in the first place. Within, you will see a quick sketch of how to construct a reflexive, powerful, data center network infrastructure.

  • Case Study: Brocade and the Jim Henson Company

    Sponsored by: Brocade

    This case study discusses how the famed Jim Henson company removed the limits to timely content development and delivery. These improvements being principally achieved by embracing technology which facilitates large data transfers and improved editing productivity.

  • Bringing Hyper-Scale Cloud Efficiencies to the Enterprise Data Center and Network

    Sponsored by: Brocade

    Discover how the software-defined data center (SDDC) and software-defined networking (SDN) market is building products and services that can deliver hyper-scale cloud efficiencies to the enterprise today.

  • Why DNS Plays a Critical Role In Hybrid Cloud Business Continuity

    Sponsored by: Dyn

    In this webinar, learn some of the ways in which leveraging your DNS system in a hybrid cloud environment opens up new opportunities to your business, as well as some tips on how to harden your DNS infrastructure to eliminate single points of failure. Then, explore the capabilities a managed DNS service can provide.

  • Bad DNS Trips Can Ruin Web Performance

    Sponsored by: Dyn

    In this white paper from the Aberdeen Group, discover how your DNS could be leading to poor web performance. Find out how a variety of modern website trends like the use of modular templates, short time to live (TTL), and more contribute to an inconsistent DNS connection.

  • Enable Advanced Ethernet Fabric Capabilities and Scalable Networking

    Sponsored by: Brocade

    Read this white paper and learn about network switches that allow you to overcome key challenges, and enable you to support cloud-optimized networking and greater enterprise agility. Learn about Ethernet fabric technology, and how it is helping organizations overcome barriers to network optimization.

  • Evaluating SolarWinds Network Performance Manager

    Sponsored by: SolarWinds, Inc.

    This research report features a compare and contrast study of two network performance monitoring tools based on four critical decision criteria categories. Access now to uncover an analysis on the unique features, advantages and more.

  • Computer Weekly – Rolling out full-fibre broadband

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as Ofcom moves to force a split between BT and its Openreach subsidiary, we examine whether the regulator's action will improve the roll out of full-fibre broadband. Our buyer's guide looks at trends in client access devices. And IT leaders discuss the roadmap to a software-defined infrastructure. Read the issue now.

  • What to Look for in IT Operations Analytics

    Sponsored by: SearchNetworking.com

    In this buyer's guide, learn what IT operations analytics is, how it works, what product features are essential and how to evaluate vendor ITOA offerings.

  • UCaaS-to-SaaS Cooperation Offers Competitive Edge

    Sponsored by: SearchNetworking.com

    In this edition of Network Evolution, find out how integrating your unified communications platform with mission-critical enterprise applications like Salesforce can provide significant competitive advantage by reducing human error and offering new insight into customer behavior.

  • Networking & Digital Transformation: ANZ

    Sponsored by: ComputerWeekly.com

    What are the digital transformation trends driving major changes in enterprise networking strategy? In this guide, we look at the IoT and smart city initiatives currently taking off in Australia/New Zealand, look at how hyper-converged infrastructure can enhance networking capabilities and why more businesses are refreshing aging infrastructure.

  • CIO's Security Checklist: Do You Know What Your Vendors are Doing?

    Sponsored by: Bomgar Corp.

    This short infographic asks an important question: Do you have complete visibility intro what your vendors are doing in your network? Learn why legacy solutions used by companies today don't provide the granular control of access required to ensure security.

  • Application Performance Tools for Microsoft Office 365

    Sponsored by: Riverbed Technology, Inc.

    Access this resource to discover an app performance tool that will transform Office 365 by leveraging hybrid IT for new forms of operational and network agility. Learn how to enact complete performance awareness of O365 apps and make optimal use of network resources by analyzing design and traffic.

  • How to Facilitate a Successful Transition to Office 365: A Brief Video

    Sponsored by: Riverbed Technology, Inc.

    Discover a tool that will identify and mitigate hidden network constraints to ensure a smooth transition to O365. Here, learn how to analyze your network requirements with dependency mapping, capacity planning, and SLA analyses to ensure the best performance for all O365 end users.

  • Advanced Network Device Troubleshooting & End-to-End Visibility

    Sponsored by: SolarWinds, Inc.

    This webinar is designed to show how you can manage and monitor all aspects of your IT infrastructure now that we live in a hybrid world. Discover a network performance monitor, and view demos of the product in action.

  • SD-WAN Could Hurt NFV: How to Keep Up

    Sponsored by: Silver Peak

    Keeping up with the barrage of industry developments and "must-know" technologies, without getting completely overwhelmed is hard. In this e-guide, three industry experts dive into why SD-WAN can spell trouble for NFV, how to stay up to date with industry developments and why you shouldn't be too quick to dismiss open networking.

  • The Connected Enterprise: Unify Communications to Manage Beyond the Remote Workforce

    Sponsored by: Arkadin + BlueJeans

    The modern workplace no longer requires the whole team to be physically present. Email, video and instant messaging/social networking allow for almost instantaneous sharing of ideas. Learn how to manage your remote workforce by unifying these channels, and providing remote access to data while maintaining compliance.

  • In-house Network Test Labs and SDN Switching Assessment

    Sponsored by: Juniper Networks, Inc.

    Keeping an in-house network test lab up to date requires considerable expertise. Learn how to avoid the complexity of maintaining an internal lab by utilizing a virtual test environment. Additionally, learn how expert bloggers assess SDN switching at UNH InterOperability Laboratory.

  • RoundTower Technologies Protects its Customer's SDN: Video Case Study

    Sponsored by: Check Point Software Technologies Ltd.

    Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.

  • The SDN Charge and the New Role in Mobile Security

    Sponsored by: Juniper Networks, Inc.

    Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.

  • Introducing Network Performance Monitor 12

    Sponsored by: SolarWinds, Inc.

    See what IT professionals are saying about hybrid IT, how they are maintaining visibility into both on-premises and cloud networks.

  • SDN: The Key to Better Security

    Sponsored by: Juniper Networks, Inc.

    Software-defined networking may hold the key to better security. In this expert e-guide, Principal Analyst, Lee Doyle explains how to strengthen SDN network security to prevent breaches. And Security and Systems Engineer, Judith M. Myerson, dives into improving SDN controller security with a 5 step risk management plan.

  • How does SDN automation work?

    Sponsored by: Juniper Networks, Inc.

    In this expert e-guide by principal analyst Lee Doyle, learn how SDN allows organizations to automatically scale and provision their networks, and gives them the opportunity to run large, complex applications flawlessly.

  • Empowering Business Evolution on Open Network Infrastructure

    Sponsored by: Juniper Networks, Inc.

    See how you can remove inconveniences that have developed in legacy network and security infrastructure. Inside you will learn about a potential network architecture that embraces openness and simplicity as its main principals.

  • Cloud-Based Managed Security Tools and Services

    Sponsored by: NTT America, Inc.

    The cloud is still an area of uncertainty for security, but research from IHS says managed security vendors are increasingly delivering their products via the cloud. Access this article to understand this growing trend and how virtual networking, NFV, and SDN are affecting vendors' ability to offer secure managed services in the cloud.

Browse by Report Type: Networking White Papers | Networking Multimedia | Networking IT Downloads

See more topics related to: Networking

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.