ComputerWeekly.com Research Library

Powered by Bitpipe.com

Networking Research

  • Data Center Fabric Architectures

    Sponsored by: Brocade

    This comprehensive white paper details the next evolutionary step in data center fabric architectures. Learn how to easily transition to cloud-optimized data center on your own time and terms.

  • Data Center Fabric Architectures At a Glance

    Sponsored by: Brocade

    Networking is transforming to support a more diverse and geographically dispersed workforce. Learn how to easily architect, automate, and integrate with current and future data center technologies while transitioning to a cloud model.

  • Simplify your SDDC Strategy with Network Virtualization

    Sponsored by: Brocade

    To support the software-defined data center (SDDC), your network must be automated, agile, and fast. It also must work seamlessly with your virtual infrastructure. Discover ways to create a reliable foundation, achieve full network visibility, and more.

  • Getting Down to Business: Reducing the Risk of Restrictive IT

    Sponsored by: Brocade

    This white paper explores how to overcome issues with restrictive, legacy IT technologies. Find out how CIOs can implement strategic planning to absorb the growing cost of updating systems, mitigate the impact of a failing network, and more.

  • Building a Flexible Foundation for a Software-Defined Data Center

    Sponsored by: Brocade

    To deliver physical and virtual network functions, architectures, and services at high scale and performance, organizations are looking to the software-defined data center (SDDC.) Discover ways to achieve improved visibility across data center resources.

  • Build Your Own Ethernet Fabric

    Sponsored by: Brocade

    Learn about creating a self-forming and self-healing Ethernet fabric, and why Ethernet fabric is the right choice for your data center in the first place. Within, you will see a quick sketch of how to construct a reflexive, powerful, data center network infrastructure.

  • Case Study: Brocade and the Jim Henson Company

    Sponsored by: Brocade

    This case study discusses how the famed Jim Henson company removed the limits to timely content development and delivery. These improvements being principally achieved by embracing technology which facilitates large data transfers and improved editing productivity.

  • Bringing Hyper-Scale Cloud Efficiencies to the Enterprise Data Center and Network

    Sponsored by: Brocade

    Discover how the software-defined data center (SDDC) and software-defined networking (SDN) market is building products and services that can deliver hyper-scale cloud efficiencies to the enterprise today.

  • Why DNS Plays a Critical Role In Hybrid Cloud Business Continuity

    Sponsored by: Dyn

    In this webinar, learn some of the ways in which leveraging your DNS system in a hybrid cloud environment opens up new opportunities to your business, as well as some tips on how to harden your DNS infrastructure to eliminate single points of failure. Then, explore the capabilities a managed DNS service can provide.

  • Bad DNS Trips Can Ruin Web Performance

    Sponsored by: Dyn

    In this white paper from the Aberdeen Group, discover how your DNS could be leading to poor web performance. Find out how a variety of modern website trends like the use of modular templates, short time to live (TTL), and more contribute to an inconsistent DNS connection.

  • Enable Advanced Ethernet Fabric Capabilities and Scalable Networking

    Sponsored by: Brocade

    Read this white paper and learn about network switches that allow you to overcome key challenges, and enable you to support cloud-optimized networking and greater enterprise agility. Learn about Ethernet fabric technology, and how it is helping organizations overcome barriers to network optimization.

  • Computer Weekly – Rolling out full-fibre broadband

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as Ofcom moves to force a split between BT and its Openreach subsidiary, we examine whether the regulator's action will improve the roll out of full-fibre broadband. Our buyer's guide looks at trends in client access devices. And IT leaders discuss the roadmap to a software-defined infrastructure. Read the issue now.

  • What to Look for in IT Operations Analytics

    Sponsored by: SearchNetworking.com

    In this buyer's guide, learn what IT operations analytics is, how it works, what product features are essential and how to evaluate vendor ITOA offerings.

  • UCaaS-to-SaaS Cooperation Offers Competitive Edge

    Sponsored by: SearchNetworking.com

    In this edition of Network Evolution, find out how integrating your unified communications platform with mission-critical enterprise applications like Salesforce can provide significant competitive advantage by reducing human error and offering new insight into customer behavior.

  • Networking & Digital Transformation: ANZ

    Sponsored by: ComputerWeekly.com

    What are the digital transformation trends driving major changes in enterprise networking strategy? In this guide, we look at the IoT and smart city initiatives currently taking off in Australia/New Zealand, look at how hyper-converged infrastructure can enhance networking capabilities and why more businesses are refreshing aging infrastructure.

  • CIO's Security Checklist: Do You Know What Your Vendors are Doing?

    Sponsored by: Bomgar Corp.

    This short infographic asks an important question: Do you have complete visibility intro what your vendors are doing in your network? Learn why legacy solutions used by companies today don't provide the granular control of access required to ensure security.

  • Application Performance Tools for Microsoft Office 365

    Sponsored by: Riverbed Technology, Inc.

    Access this resource to discover an app performance tool that will transform Office 365 by leveraging hybrid IT for new forms of operational and network agility. Learn how to enact complete performance awareness of O365 apps and make optimal use of network resources by analyzing design and traffic.

  • How to Facilitate a Successful Transition to Office 365: A Brief Video

    Sponsored by: Riverbed Technology, Inc.

    Discover a tool that will identify and mitigate hidden network constraints to ensure a smooth transition to O365. Here, learn how to analyze your network requirements with dependency mapping, capacity planning, and SLA analyses to ensure the best performance for all O365 end users.

  • SD-WAN Could Hurt NFV: How to Keep Up

    Sponsored by: Silver Peak

    Keeping up with the barrage of industry developments and "must-know" technologies, without getting completely overwhelmed is hard. In this e-guide, three industry experts dive into why SD-WAN can spell trouble for NFV, how to stay up to date with industry developments and why you shouldn't be too quick to dismiss open networking.

  • The Connected Enterprise: Unify Communications to Manage Beyond the Remote Workforce

    Sponsored by: Arkadin + BlueJeans

    The modern workplace no longer requires the whole team to be physically present. Email, video and instant messaging/social networking allow for almost instantaneous sharing of ideas. Learn how to manage your remote workforce by unifying these channels, and providing remote access to data while maintaining compliance.

  • In-house Network Test Labs and SDN Switching Assessment

    Sponsored by: Juniper Networks, Inc.

    Keeping an in-house network test lab up to date requires considerable expertise. Learn how to avoid the complexity of maintaining an internal lab by utilizing a virtual test environment. Additionally, learn how expert bloggers assess SDN switching at UNH InterOperability Laboratory.

  • The SDN Charge and the New Role in Mobile Security

    Sponsored by: Juniper Networks, Inc.

    Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.

  • SDN: The Key to Better Security

    Sponsored by: Juniper Networks, Inc.

    Software-defined networking may hold the key to better security. In this expert e-guide, Principal Analyst, Lee Doyle explains how to strengthen SDN network security to prevent breaches. And Security and Systems Engineer, Judith M. Myerson, dives into improving SDN controller security with a 5 step risk management plan.

  • How to Buy: Assessing Next-Gen Firewalls

    Sponsored by: Fortinet, Inc.

    Is there a next-gen firewall in your future? Inside this How to Buy guide, IT security expert Dave Shackleford offers his advice to help you purchase the best platform to meet your enterprise needs.

  • Network Design Best Practices for Office 365: An Expert Report

    Sponsored by: Riverbed Technology, Inc.

    Unfortunately, many organizations transitioning from on-premises Microsoft apps to Office 365 will experience performance problems. Download this Gartner report to minimize network and app performance issues by optimizing the infrastructure to support O365, with the guidance outlined here.

Browse by Report Type: Networking White Papers | Networking Multimedia | Networking IT Downloads

See more topics related to: Networking

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.