ComputerWeekly.com Research Library

Powered by Bitpipe.com

Networking White Papers

  • Microscope July

    Sponsored by: MicroScope

    July ezine: The online battlegroundSEO sabotage is the latest and worrying way some firms are being undermined by competitors and this month we take a look at the issue and how to stop it from wrecking website rankings

  • New Rules of Engagement: Dispelling 3 Myths of Communications

    Sponsored by: Avaya CenturyLink

    Take a closer look at the pros and cons of adopting a consumer-like approach to business communications. Explore 3 enterprise communication myths, and how you can selectively leverage components of these misconceptions to foster a culture of engagement.

  • Advanced Endpoint Protection for Windows Server 2003 After End-of-Support

    Sponsored by: Palo Alto Networks

    Identify how you can maintain security in your network, despite the fact that Windows Server 2003 has reached its End-of-Support.

  • Common Hyper-Converged Network Concerns and Solutions

    Sponsored by: Hewlett Packard Enterprise

    Do your apps require either very high or very specific performance? Discover in this expert guide how to identify and resolve hyper-converged networking bottlenecks by implementing a dedicated storage network and examining how data is stored within your architecture.

  • New Cloud Architectures: Fueling the Change of the WAN Landscape

    Sponsored by: Silver Peak

    Learn how changing times are driving companies to adopt cloud computing, and companies who have cloud computing to deploy more of it. You'll see how companies are gaining practical and financial benefits from new and sophisticated cloud based network architectures.

  • The Shift to SD-WAN

    Sponsored by: Silver Peak

    Learn how SD-WAN has enabled organizations from many fields to replace landlines and traditional WAN architectures. In this research report you will discover how organizations feel about SD-WAN, what their implementation plan is, and what they expect to achieve by making the switch.

  • Making Desktop Virtualization More Viable Through Endpoint Innovation

    Sponsored by: Dell, Inc.

    Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.

  • Internal Segmentation Firewall: Protecting Your Network From the Inside-Out

    Sponsored by: Fortinet, Inc.

    This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.

  • Automated Infrastructure Management Delivers Real-Time Network Visibility

    Sponsored by: CommScope

    Explore how to gain real-time, granular visibility into the critical connectivity that drives your business with automated network infrastructure management (AIM).

  • The Network Takes Center Stage

    Sponsored by: IBM

    Pinpointing issues is becoming more challenging as networks expand and become more complex, but there are ways to monitor your network more effectively in order to spot the early warning signs of downtime. Access this special report to learn about analytics technology, outsourcing options, and more.

  • Transforming the Capabilities of Norway's Largest Hospital with Avaya VENA Fabric Connect

    Sponsored by: Avaya

    Norway's largest health system wanted to reduce complexity and maintain high availability by creating a shared network of 3 hospitals, and extending virtualization to different user groups. Read this case study for the details on how they accomplished their goals.

  • Modern Infrastructure E-zine – June 2016

    Sponsored by: SearchDataCenter.com

    Are containers an open source lifeline? That remains to be seen, as the technology just might offer a saving grace to the OpenStack infrastructure. Find out how containers are impacting Openstack deployment.

  • NetScaler for the best XenApp/XenDesktop access and mobile experience

    Sponsored by: Citrix

    Network virtualization and mobility are the keys to enhancing today's mobile and globally dispersed workforce. Read on to discover ten reasons to adopt an application delivery controller that empowers mobile workers.

  • Consolidate your Secure Remote Access Delivery Infrastructure with One URL

    Sponsored by: Citrix

    Many enterprises are experiencing fragmented secure remote access infrastructure primarily characterized by multiple URLs. This is creating inconsistent and poor access experiences for employees and users. Read on to discover a next-generation secure remote access solution that addresses these issues, particularly those dealing with mobility.

  • Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Network

    Sponsored by: Citrix

    An influx of new devices and applications, bandwidth requirements, and a lack of end-to-end visibility are causing challenges and you are not alone. Overcome these challenges and enable the secure, reliable, cost-effective delivery of applications to any user, over any network.

  • Redefining Networking with Network Virtualization

    Sponsored by: VMware

    82% of enterprises have mapped out a hybrid cloud strategy, but there is a major road block; hardware-centric networking. Discover why legacy network infrastructures are being held back from hybrid clouds by inflexible hardware and how to move forward.

  • Citrix networking from the customer perspective

    Sponsored by: Citrix

    IT teams need to securely deliver virtual applications and desktops across wide-spread networks. Explore several case studies to learn about the challenges and solutions to securely deliver these technologies across vast networks.

  • Canon U.S.A. Fully Automates VMOTION and Storage VMOTION with VMTurbo

    Sponsored by: VMTurbo

    Resource allocation is the key to succeeding in virtualized environments. Read this brief case study to learn how one company was able to implement a solution that automatically made intelligent adjustments, allowing them to expand their virtual footprint and control over a complex virtual environment.

  • How to Increase App Reliability & Scale Bandwidth While Lowering Network Costs

    Sponsored by: Citrix

    See how WAN virtualization provides a solution to the overstressed WAN dilemma. Allowing enterprises to expand WAN bandwidth goes a long way towards ensuring that business critical applications remain uninterrupted – even when underlying networks are unreliable.

  • Redefining the Mission of Mobile Authentication

    Sponsored by: Aruba Networks

    Billions of Wi-Fi enabled smartphones and tablets are pouring into the workplace and users have more latitude to connect to any network and download apps of their choice. The expectation is that the mobility experience just works anytime, anywhere. This is causing IT to struggle to maintain control.

  • Laying the Groundwork for a New Level of Power over Ethernet

    Sponsored by: CommScope

    Discover an overview of Power over Ethernet (PoE) technology, as well as recommendations to ensure that your cabling infrastructure is capable of supporting the PoE evolution.

  • Should On-Prem Apps Use SaaS Monitoring?

    Sponsored by: New Relic

    Need better visibility into the health of the applications running in your data center? Software-as-a-service (SaaS) solutions are the best way to monitor on-prem apps and gain the freedom your team needs. Discover the top 7 reasons to use SaaS monitoring.

  • Boston College Excels With VMTurbo to Assure Performance and Intelligently Plan for Growth

    Sponsored by: VMTurbo

    What if you could increase your virtual footprint by 30% or more? That's what one of Boston's top colleges did. Read on to find out how the college was able to incease its IT staff productivity by 20% and create a viable plan to meet future demands by improving its network infrastructure.

  • Cyber Risk Report 2016 Executive Summary

    Sponsored by: Hewlett Packard Enterprise

    In this year's cyber risk report, you will discover the evolving nature of cybercrime, as well as the developing legislation meant to curtail it. Read on to delve into what defenders now face as they look to secure their enterprises.

  • Improve User Experience for Branch and Mobile Workers

    Sponsored by: Citrix

    Poor performance over the WAN can degrade the virtual desktop experience for branch and mobile workers. Learn how to overcome this challenge with innovative WAN optimization techniques.

Browse by Report Type: Networking White Papers | Networking Multimedia | Networking IT Downloads

See more topics related to: Networking

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.