ComputerWeekly.com Research Library

Powered by Bitpipe.com

Networking Research

  • Networking & Digital Transformation: ANZ

    Sponsored by: ComputerWeekly.com

    What are the digital transformation trends driving major changes in enterprise networking strategy? In this guide, we look at the IoT and smart city initiatives currently taking off in Australia/New Zealand, look at how hyper-converged infrastructure can enhance networking capabilities and why more businesses are refreshing aging infrastructure.

  • Application Performance Tools for Microsoft Office 365

    Sponsored by: Riverbed Technology, Inc.

    Access this resource to discover an app performance tool that will transform Office 365 by leveraging hybrid IT for new forms of operational and network agility. Learn how to enact complete performance awareness of O365 apps and make optimal use of network resources by analyzing design and traffic.

  • How to Facilitate a Successful Transition to Office 365: A Brief Video

    Sponsored by: Riverbed Technology, Inc.

    Discover a tool that will identify and mitigate hidden network constraints to ensure a smooth transition to O365. Here, learn how to analyze your network requirements with dependency mapping, capacity planning, and SLA analyses to ensure the best performance for all O365 end users.

  • SD-WAN Could Hurt NFV: How to Keep Up

    Sponsored by: Silver Peak

    Keeping up with the barrage of industry developments and "must-know" technologies, without getting completely overwhelmed is hard. In this e-guide, three industry experts dive into why SD-WAN can spell trouble for NFV, how to stay up to date with industry developments and why you shouldn't be too quick to dismiss open networking.

  • Cloud-Based Managed Security Tools and Services

    Sponsored by: NTT America, Inc.

    The cloud is still an area of uncertainty for security, but research from IHS says managed security vendors are increasingly delivering their products via the cloud. Access this article to understand this growing trend and how virtual networking, NFV, and SDN are affecting vendors' ability to offer secure managed services in the cloud.

  • Infographic: Get the Edge in Network Performance

    Sponsored by: Level 3 Communications, Inc.

    The higher the network performance you require, the greater control you need. Now, discover new levels of visibility, agility and control. In this infographic, explore how you can spend your organization's IT resources wisely.

  • Use Cases for Level 3: Adaptive Network Control Solutions

    Sponsored by: Level 3 Communications, Inc.

    See how a portfolio of SDN-Based applications can seamlessly address your network challenges. Particularly how mobile business environments can be improved by adding customized controls to the network.

  • The Future of Connected Cars in a Software-defined World

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine how software is reshaping the car industry, with internet-connected cars presenting challenges and opportunities. IT suppliers are putting up prices in the UK as the value of the pound falls – we look at the implications. And Eurostar's digital chief talks about his IT overhaul. Read the issue now.

  • A Conversation: Make Your Network Work Smarter, Not Harder

    Sponsored by: Level 3 Communications, Inc.

    If you expect to thrive, your network must be able to respond instantly to changing requirements. It needs to help control costs and improve productivity. That's where the new capabilities of Level 3 Adaptive Network Control Solutions (ANCS) deliver real advantages.

  • High Availability DNS Reduces Downtime Risk and Improves End-User Experience

    Sponsored by: Dyn

    This white paper reviews the business advantages of implementing a high availability DNS architecture. You'll learn the critical role DNS plays in the user experience, the risks of relying on a single DNS solution, and the added performance benefits of a high availability DNS architecture.

  • Mobility Management Made Simple With IBM MaaS360

    Sponsored by: IBM

    In this webcast learn about a program that enables simple and intuitive application management while keeping mission-critical information safe without slowing down mobile development. Discover a software that allows for single-sign on, separates data for business security, and end-user peace of mind, and more.

  • DNS For Hybrid Cloud Success

    Sponsored by: Dyn

    This webcast addresses industry concerns about applications hosted in a hybrid cloud, as well as explores various strategies for implementing cloud services in your business. Learn some successful cloud adoption tactics like using traditional technologies to assist cloud migration and focusing on a 3-part migration life-cycle.

  • Enterprise Mobility Management: Mobile Device Management's Expansion to Devices, Apps and Content

    Sponsored by: IBM

    This white paper uncovers key considerations for a unified mobile enterprise policy. Discover how to gain visibility into every device entering your network, as well as ways to ensure corporate data security and productivity simultaneously.

  • Find Out how LogMeIn Rescue Stacks Up To The Competition

    Sponsored by: LogMeIn Rescue

    In this one-page resource to discover how LogMeIn rescue compares to one of its top competitors in 6 key categories, and find out what customers are saying about their experience with the program.

  • A Golden Age Dawns for Network Services

    Sponsored by: SearchNetworking.com

    Advanced network technology options have expanded, offering enterprises better, cheaper, options for network services. This three part guide is designed to help you understand the ongoing evolution of network services and the connectivity technologies needed to access them.

  • UCaaS-to-SaaS Cooperation Offers Competitive Edge

    Sponsored by: SearchNetworking.com

    In this edition of Network Evolution, find out how integrating your unified communications platform with mission-critical enterprise applications like Salesforce can provide significant competitive advantage by reducing human error and offering new insight into customer behavior.

  • Network Design Best Practices for Office 365: An Expert Report

    Sponsored by: Riverbed Technology, Inc.

    Unfortunately, many organizations transitioning from on-premises Microsoft apps to Office 365 will experience performance problems. Download this Gartner report to minimize network and app performance issues by optimizing the infrastructure to support O365, with the guidance outlined here.

  • In-house Network Test Labs and SDN Switching Assessment

    Sponsored by: Juniper Networks, Inc.

    Keeping an in-house network test lab up to date requires considerable expertise. Learn how to avoid the complexity of maintaining an internal lab by utilizing a virtual test environment. Additionally, learn how expert bloggers assess SDN switching at UNH InterOperability Laboratory.

  • The SDN Charge and the New Role in Mobile Security

    Sponsored by: Juniper Networks, Inc.

    Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.

  • SDN: The Key to Better Security

    Sponsored by: Juniper Networks, Inc.

    Software-defined networking may hold the key to better security. In this expert e-guide, Principal Analyst, Lee Doyle explains how to strengthen SDN network security to prevent breaches. And Security and Systems Engineer, Judith M. Myerson, dives into improving SDN controller security with a 5 step risk management plan.

  • How does SDN automation work?

    Sponsored by: Juniper Networks, Inc.

    In this expert e-guide by principal analyst Lee Doyle, learn how SDN allows organizations to automatically scale and provision their networks, and gives them the opportunity to run large, complex applications flawlessly.

  • Storage Networking Technology Steps Up to Overcome Performance Challenges

    Sponsored by: IBM

    Fast flash storage and the growing use of virtual apps carry larger amounts of data than ever before—placing pressure on networks that carry storage traffic. This guide illustrates how to keep storage traffic from becoming the bottleneck in your data center, revealing key improvements to 2016 storage networking technologies.

  • Looking Back on 25 Years of Linux

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

Browse by Report Type: Networking White Papers | Networking Multimedia | Networking IT Downloads

See more topics related to: Networking

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.