ComputerWeekly.com Research Library

Powered by Bitpipe.com

Networking Research

  • The Future of Connected Cars in a Software-defined World

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine how software is reshaping the car industry, with internet-connected cars presenting challenges and opportunities. IT suppliers are putting up prices in the UK as the value of the pound falls – we look at the implications. And Eurostar's digital chief talks about his IT overhaul. Read the issue now.

  • A Conversation: Make Your Network Work Smarter, Not Harder

    Sponsored by: Level 3 Communications, Inc.

    If you expect to thrive, your network must be able to respond instantly to changing requirements. It needs to help control costs and improve productivity. That's where the new capabilities of Level 3 Adaptive Network Control Solutions (ANCS) deliver real advantages.

  • High Availability DNS Reduces Downtime Risk and Improves End-User Experience

    Sponsored by: Dyn

    This white paper reviews the business advantages of implementing a high availability DNS architecture. You'll learn the critical role DNS plays in the user experience, the risks of relying on a single DNS solution, and the added performance benefits of a high availability DNS architecture.

  • Mobility Management Made Simple With IBM MaaS360

    Sponsored by: IBM

    In this webcast learn about a program that enables simple and intuitive application management while keeping mission-critical information safe without slowing down mobile development. Discover a software that allows for single-sign on, separates data for business security, and end-user peace of mind, and more.

  • DNS For Hybrid Cloud Success

    Sponsored by: Dyn

    This webcast addresses industry concerns about applications hosted in a hybrid cloud, as well as explores various strategies for implementing cloud services in your business. Learn some successful cloud adoption tactics like using traditional technologies to assist cloud migration and focusing on a 3-part migration life-cycle.

  • Enterprise Mobility Management: Mobile Device Management's Expansion to Devices, Apps and Content

    Sponsored by: IBM

    This white paper uncovers key considerations for a unified mobile enterprise policy. Discover how to gain visibility into every device entering your network, as well as ways to ensure corporate data security and productivity simultaneously.

  • Find Out how LogMeIn Rescue Stacks Up To The Competition

    Sponsored by: LogMeIn Rescue

    In this one-page resource to discover how LogMeIn rescue compares to one of its top competitors in 6 key categories, and find out what customers are saying about their experience with the program.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • If External DNS Fails, So Does Your Digital Business

    Sponsored by: Dyn

    Without properly functioning external DNS, Internet-based resources may "disappear" or become unavailable without warning. To boost DNS management, this Gartner research report explores the concept of externally sourced and managed DNS as a service. Access now to uncover their key findings and learn best practices for improved DNS performance.

  • A Roadmap for Transport Network Modernization

    Sponsored by: Cisco Systems, Inc.

    Today's transport network is suffering somewhat of an identity crisis. In this e-book discover the background and current state of metro transport networks and the challenges you're facing today and tomorrow as providers.

  • A reference architecture for the IoE

    Sponsored by: ComputerWeekly.com

    Analyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).

  • Raspberry PI with Java: programming the internet of things

    Sponsored by: ComputerWeekly.com

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

  • Case Study: Optimizing the In-Store, Retail Experience with Application and Network Monitoring

    Sponsored by: AppNeta

    "Is it the app or the network?" Discover how to pinpoint whether your network or a certain app is causing latency or service outages within minutes. Read on to enable your app teams to constructively diagnose and troubleshoot the precise issues, freeing up resources to focus on more strategic initiatives.

  • Advanced Evasion Techniques for Dummies

    Sponsored by: Forcepoint

    Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.

  • Beyond Application Visibility and Control: What an NGFW Must Be

    Sponsored by: Cisco Systems, Inc.

    Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.

  • Next-Generation Firewalls: An Investment Checklist

    Sponsored by: Cisco Systems, Inc.

    What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs. Read on now to determine the benefits a truly effective NGFW can deliver, and find one that will provide actionable indications of compromise to identify malicious activity, and more.

  • SD-WAN Securely Delivers a Consistent User Experience

    Sponsored by: Citrix

    This short video shows a user maintaining security while demonstrating network performance despite deteriorating conditions. You'll see how an SD-WAN can make up for failures in your MPLS.

  • Looking Back on 25 Years of Linux

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • A Golden Age Dawns for Network Services

    Sponsored by: SearchNetworking.com

    Advanced network technology options have expanded, offering enterprises better, but cheaper, options for network services.

  • Is Passive Optical Networking Good For Enterprises?

    Sponsored by: Nokia

    This expert e-guide explores the possibilities a passive optical network or PON offers to both service providers as well as personal users. Access now to discover the key benefits PON could potentially offer to enterprises and the top factors IT managers must consider before choosing PON.

  • Computer Weekly: Leadership bonus – analysing our UK salary survey

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, our UK salary survey shows that IT leaders are benefiting from generous bonuses as tech becomes part of mainstream business. We find out how the internet of things is transforming the railway industry. And the CIO of the Williams F1 team explains how data analytics is boosting race performance. Read the issue now.

  • IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy

    Sponsored by: Aruba Networks

    The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.

  • Ringing Endorsement: Which IP Phone Fits Your Needs?

    Sponsored by: SearchNetworking.com

    Despite the rise of smartphones and tablets, many organizations still depend on the IP telephone, because of its reliability and functionality.But with hundreds of models on the market and a plethora of available features, how do you choose the right one for your business? This issue of Network Evolution dials in on that question and more.

  • Giving Your SAN a Boost with Flash Storage

    Sponsored by: Hewlett Packard Enterprise

    This e-guide discusses improving your network performance by embracing improved storage, particularly flash storage. It will show you how the benefits of an all-flash array cross over into improving business outcomes through better performance.

Browse by Report Type: Networking White Papers | Networking Multimedia | Networking IT Downloads

See more topics related to: Networking

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.