ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Applications Software Research

  • A Computer Weekly e-guide on Network Visibility, Performance and Monitoring

    Sponsored by: TechTarget ComputerWeekly.com

    Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.

  • Ofcom raise over £1.3bn in new 5G spectrum auction

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: After announcing their plans to extend and improve basic 4G connectivity around the country, the UK's mobile operators are celebrating their principal gains in the 5G arena with low-band and mid-band spectrum.

  • Top 10 network stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    2018 was the year when software-defined networking, and more specifically software-defined WANs, took centre stage. We look back at a transformative year for the world of the network manager. Here are Computer Weekly's top 10 networking stories of 2018.

  • CW Nordics November 2017

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.

  • Jargon Buster Guide to Unified Communications

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.

  • Channel getting ready for SD-WAN lift-off

    Sponsored by: MicroScope

    Software defined networking has been around for a few years but it is early days for SD-WAN and that means there is time for resellers to get on board before the technology takes off.

  • Computer Weekly – 25 October 2016: 25 years of Linux

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.

  • A reference architecture for the IoE

    Sponsored by: TechTarget ComputerWeekly.com

    Analyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).

  • How to enhance your network for the future

    Sponsored by: TechTarget ComputerWeekly.com

    The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

  • Presentation Transcript: Demystifying ROI for Managed Services for IPT (IP Telephony)

    Sponsored by: Dimension Data

    If you're looking to better manage your IP telephony but don't know where to start, this presentation transcript, taken from the webcast of the same name, can help.

  • Managing the WAN to Optimize Business

    Sponsored by: BlueCoat

    Bandwidth management is a common technique employed by IT organizations to improve quality of service over the WAN by assigning guaranteed levels of bandwidth and prioritizing traffic to improve application performance. To be effective, bandwidth management must be perfectly aligned with business policies and priorities. Read on to learn more.

  • Application List: Applications that Blue Coat PacketShaper Classifies and Controls

    Sponsored by: BlueCoat

    Check out this data sheet for a categorized listing of 600 common applications for which Blue Coat PacketShaper delivers an accurate picture of network traffic.

  • The OSI Model: Understanding the Seven Layers of Computer Networks

    Sponsored by: Global Knowledge

    This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.

  • An Objective Approach to Security

    Sponsored by: Bytware, Inc.

    i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this...

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.