ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Appliances Research

  • MicroScope – October 2020: Get in touch with remote network security

    Sponsored by: MicroScope

    In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption

  • Trend Watch: Advances in Malaysia's digital infrastructure

    Sponsored by: ComputerWeekly.com

    In this handbook, Computer Weekly looks at Malaysia's successes and challenges in modernising its infrastructure and other digital transformation initiatives

  • Jargon Buster Guide to Virtualisation

    Sponsored by: ComputerWeekly.com

    This jargon buster e-guide will detail everything an enterprise IT manager needs to know about the concept of virtualisation, while also taking a look at what enterprises are doing to build upon this now commonplace bedrock within most enterprise IT estates

  • Jargon Buster Guide to Virtualisation

    Sponsored by: ComputerWeekly.com

    This jargon buster e-guide will detail everything an enterprise IT manager needs to know about the concept of virtualisation, while also taking a look at what enterprises are doing to build upon this now commonplace bedrock within most enterprise IT estates.

  • Computer Weekly – 18 December 2018: The 50 most influential people in UK IT

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we reveal our annual UKtech50 list of the most influential people in UK IT. We talk to this year's winner, HM Revenue & Customs CIO Jacky Wright about the challenges of government IT during Brexit. And we also examine the issues around upgrading SAP's ERP system to S/4 Hana. Read the issue now.

  • Jargon Buster Guide to Unified Communications

    Sponsored by: ComputerWeekly.com

    In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.

  • How to enhance your network for the future

    Sponsored by: ComputerWeekly.com

    The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

  • How Cloud-Based Network Monitoring Tools Can Make Finding Errors Easier

    Sponsored by: Aerohive Networks

    Download this expert guide to learn how 1 performing arts college uses network management tools to quickly detect problems, and explore a new tool by Aerohive that integrates with Amazon Alexa and enables you to query client and network analytics, as well as accomplish routine tasks, with just your voice.

  • Navigating the Data Center Networking Architecture and the Relevance of Composable Infrastructure

    Sponsored by: Hewlett-Packard Enterprise

    Download this guide to overcome the complexity modern data center networking architectures create, including the impact of hybrid cloud on workload segregation, service-policy enforcement, and security. Additionally, experts highlight composable infrastructure as a new method for server simplification.

  • Future Network Market Vision Emphasizes the Edge

    Sponsored by: Limelight Networks, Inc.

    In this expert guide, Tom Nolle, President of CIMI Corporation will uncover two network market truths, and how they impact network operators' infrastructure and profits.

  • Internet of Things Use Cases and Network Demands

    Sponsored by: Level 3 Communications, Inc.

    You must think carefully about ways that your organization can implement the internet of things. It also reveals how 4 organizations have deployed connected devices in order to enhance operations.

  • Network Management and Monitoring: The Evolution of Network Control

    Sponsored by: NetScout Systems, Inc.

    This e-guide takes a twofold approach to improving your network operations. First it discusses why you should implement unified network management to easily diagnose problems. Second, it reveals how you can use network monitoring to reduce costs and increase revenue.

  • Apply New Nagios Plugins and Network Alerts

    Sponsored by: BigPanda

    This guide discusses how to create different configurations of Nagios that will send notifications to different administrators at various times during the day. It shows in detail how to make the actual changes to the configuration that you'll need to make.

  • Talari Mercury Appliances

    Sponsored by: Talari_DON'T USE

    This exclusive paper examines a set of network appliances that leverages network bandwidth from multiple sources to enable you to take advantage of the economics of broadband and the public internet without sacrificing business-quality, reliability, or availability.

  • Talari Networks Product Demonstration: Network Resiliency

    Sponsored by: Talari_DON'T USE

    This exclusive webcast examines a networking solution that can create a resilient WAN that prevents applications from being affected by link outages, allowing your remote offices to adapt to changing network conditions and reroute traffic quickly to avoid downtime.

  • The Fight for Full Network Visibility in a Dangerous World

    Sponsored by: APCON, Inc.

    This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.

  • Extreme Networks Physical Security Solution

    Sponsored by: Extreme Networks

    This guide explores some significant benefits of networking for your physical security and how it can enhance your network performance.

  • Case Study - Square Enix

    Sponsored by: Riverbed Technology, Inc.

    The Square Enix Group constructed an international business promotion structure with major development locations established in Japan, North America, and Europe, with develop data (ROM) transferring between locations on a daily basis. After adopting Steelhead appliances, Square Enix saw transfer times reduce by more than 90%.

  • Case Study - Schneider Electric

    Sponsored by: Riverbed Technology, Inc.

    Schneider Electric transformed its IT infrastructure to increase the company's business agility, gain greater control over IT costs, and support the growing use of mobile devices, cloud computing and IaaS. Learn how.

  • Case Study: Implementing BYOD at Wittenberg University

    Sponsored by: Extreme Networks

    This exclusive case study discusses how a university with limited resources was able to use a series of networking tools to centralize mobile management while providing the performance needed to support BYOD.

  • Wireless Solutions for Tablets and Smartphones

    Sponsored by: Xirrus

    This exclusive paper examines a wireless networking solution that is designed to support a large number of end-user devices while providing high performance and connectivity. Read on to learn more.

  • Case Study: How Liverpool FC and Alexandra Palace successfully rolled out Wi-Fi

    Sponsored by: Xirrus

    Access this exclusive guide to find out how the Liverpool Football club provides reliable, high-performing wireless access to the thousands of fans that visit their home stadium.

  • Scan and Send Critical Documents With the Push of a Button

    Sponsored by: Hewlett-Packard Enterprise

    This exclusive resource examines a scanning and routing solution that makes capturing and sending your critical documents as easy as pushing a button. Read on to find out more.

  • The Network without Borders

    Sponsored by: SearchNetworking.com

    This handbook looks at how to design and manage the new endpoint-driven network and extend secure access to private and public cloud services and virtual applications.

  • Dell PowerEdge VRTX Stands Alone Addressing IT Demands of Remote and Small Offices

    Sponsored by: Dell EMC and Microsoft

    This exclusive paper discusses a network hardware solution that can help your organization significantly reduce complexity, confidently adopt new applications, improve collaboration and gain a competitive advantage.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.