ComputerWeekly.com Research Library

Powered by Bitpipe.com

Networking Research

  • Infographic: Get the Edge in Network Performance

    Sponsored by: Level 3 Communications, Inc.

    The higher the network performance you require, the greater control you need. Now, discover new levels of visibility, agility and control. In this infographic, explore how you can spend your organization's IT resources wisely.

  • Use Cases for Level 3: Adaptive Network Control Solutions

    Sponsored by: Level 3 Communications, Inc.

    See how a portfolio of SDN-Based applications can seamlessly address your network challenges. Particularly how mobile business environments can be improved by adding customized controls to the network.

  • The Future of Connected Cars in a Software-defined World

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine how software is reshaping the car industry, with internet-connected cars presenting challenges and opportunities. IT suppliers are putting up prices in the UK as the value of the pound falls – we look at the implications. And Eurostar's digital chief talks about his IT overhaul. Read the issue now.

  • A Conversation: Make Your Network Work Smarter, Not Harder

    Sponsored by: Level 3 Communications, Inc.

    If you expect to thrive, your network must be able to respond instantly to changing requirements. It needs to help control costs and improve productivity. That's where the new capabilities of Level 3 Adaptive Network Control Solutions (ANCS) deliver real advantages.

  • Looking Back on 25 Years of Linux

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.

  • Enterprise Mobility Management: Mobile Device Management's Expansion to Devices, Apps and Content

    Sponsored by: IBM

    This white paper uncovers key considerations for a unified mobile enterprise policy. Read on to discover how to gain visibility into every device entering your network, as well as ways to ensure corporate data security and productivity simultaneously.

  • A Golden Age Dawns for Network Services

    Sponsored by: SearchNetworking.com

    Advanced network technology options have expanded, offering enterprises better, cheaper, options for network services. This three part guide is designed to help you understand the ongoing evolution of network services and the connectivity technologies needed to access them.

  • Computer Weekly: Leadership bonus – analysing our UK salary survey

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, our UK salary survey shows that IT leaders are benefiting from generous bonuses as tech becomes part of mainstream business. We find out how the internet of things is transforming the railway industry. And the CIO of the Williams F1 team explains how data analytics is boosting race performance. Read the issue now.

  • A Roadmap for Transport Network Modernization

    Sponsored by: Cisco Systems, Inc.

    Today's transport network is suffering somewhat of an identity crisis. In this e-book discover the background and current state of metro transport networks and the challenges you're facing today and tomorrow as providers.

  • A reference architecture for the IoE

    Sponsored by: ComputerWeekly.com

    Analyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).

  • Raspberry PI with Java: programming the internet of things

    Sponsored by: ComputerWeekly.com

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

  • Case Study: Optimizing the In-Store, Retail Experience with Application and Network Monitoring

    Sponsored by: AppNeta

    "Is it the app or the network?" Discover how to pinpoint whether your network or a certain app is causing latency or service outages within minutes. Read on to enable your app teams to constructively diagnose and troubleshoot the precise issues, freeing up resources to focus on more strategic initiatives.

  • Advanced Evasion Techniques for Dummies

    Sponsored by: Forcepoint

    Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.

  • Beyond Application Visibility and Control: What an NGFW Must Be

    Sponsored by: Cisco Systems, Inc.

    Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.

  • Next-Generation Firewalls: An Investment Checklist

    Sponsored by: Cisco Systems, Inc.

    What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs. Read on now to determine the benefits a truly effective NGFW can deliver, and find one that will provide actionable indications of compromise to identify malicious activity, and more.

  • The SDN Charge and the New Role in Mobile Security

    Sponsored by: Juniper Networks, Inc.

    Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.

  • SDN: The Key to Better Security

    Sponsored by: Juniper Networks, Inc.

    Software-defined networking may hold the key to better security. In this expert e-guide, Principal Analyst, Lee Doyle explains how to strengthen SDN network security to prevent breaches. And Security and Systems Engineer, Judith M. Myerson, dives into improving SDN controller security with a 5 step risk management plan.

  • How does SDN automation work?

    Sponsored by: Juniper Networks, Inc.

    In this expert e-guide by principal analyst Lee Doyle, learn how SDN allows organizations to automatically scale and provision their networks, and gives them the opportunity to run large, complex applications flawlessly.

  • Storage Networking Technology Steps Up to Overcome Performance Challenges

    Sponsored by: IBM

    Fast flash storage and the growing use of virtual apps carry larger amounts of data than ever before—placing pressure on networks that carry storage traffic. This guide illustrates how to keep storage traffic from becoming the bottleneck in your data center, revealing key improvements to 2016 storage networking technologies.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • Is Passive Optical Networking Good For Enterprises?

    Sponsored by: Nokia

    This expert e-guide explores the possibilities a passive optical network or PON offers to both service providers as well as personal users. Access now to discover the key benefits PON could potentially offer to enterprises and the top factors IT managers must consider before choosing PON.

  • IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy

    Sponsored by: Aruba Networks

    The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.

  • Ringing Endorsement: Which IP Phone Fits Your Needs?

    Sponsored by: SearchNetworking.com

    Despite the rise of smartphones and tablets, many organizations still depend on the IP telephone, because of its reliability and functionality.But with hundreds of models on the market and a plethora of available features, how do you choose the right one for your business? This issue of Network Evolution dials in on that question and more.

  • Giving Your SAN a Boost with Flash Storage

    Sponsored by: Hewlett Packard Enterprise

    This e-guide discusses improving your network performance by embracing improved storage, particularly flash storage. It will show you how the benefits of an all-flash array cross over into improving business outcomes through better performance.

Browse by Report Type: Networking White Papers | Networking Multimedia | Networking IT Downloads

See more topics related to: Networking

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.