ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Architectures Research

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • How DNS Information Can Help Cut Millions from Your Infrastructure Costs

    Sponsored by: Dyn

    This expert e-guide explains why DNS intelligence is the key to better network capacity planning and dynamic resourcing. Access now to begin planning to cut your infrastructure costs dramatically in the coming years.

  • Is Passive Optical Networking Good For Enterprises?

    Sponsored by: Nokia

    This expert e-guide explores the possibilities a passive optical network or PON offers to both service providers as well as personal users. Access now to discover the key benefits PON could potentially offer to enterprises and the top factors IT managers must consider before choosing PON.

  • Your SD-WAN Roadmap

    Sponsored by: Citrix

    Discover how making the transition to SD-WAN can save you money and simplify your current WAN structure.

  • How to Make Your WAN Architecture Software-Defined

    Sponsored by: Citrix

    In this e-guide, you will receive advice on how to choose the right SD-WAN for your enterprise needs. Discover how to analyze the vast array of SD-WAN vendors by isolating your particular needs, and uncover insight into securing and deploying the SD-WAN tool that will meet your goals.

  • What You Need to Know When Choosing Between Office 2016 and Office 365

    Sponsored by: TechTarget Enterprise Desktop

    Use this expert e-book to discover whether the local Office 2016 or cloud-based Office 365 is the right fit for your enterprise. Explore topics such as the different costs of each program, increased file encryption in Office 2016, and the system requirements that it takes to run each Office suite.

  • Which Way Now for Your WAN?

    Sponsored by: TechTarget Networking

    Wire area networks and WAN connection types have evolved. In this technical guide, learn whether your WAN is what it needs to be.

  • SD-WAN Helps Secure Hybrid Networks

    Sponsored by: Citrix

    SD-WAN enables enterprises to create hybrid networks. But many network engineers eyeing hybrid WAN architectures are asking themselves the question: It can't be as safe as running on MPLS, right? Access this expert e-guide to learn about SD-WAN platforms' security features that finally make hybrid networks secure enough for widespread use.

  • How Does SDN Automation Work?

    Sponsored by: VMware

    While the DevOps style of application development requires rapid provisioning, scalable resources, and automated operations to flexibly deliver IT services, most methods can't scale to meet the demands of large data centers or complex distributed apps. Expert Lee Doyle explains how software-defined networking enables network automation.

  • SD-WAN benefits create serious competition for MPLS

    Sponsored by: Silver Peak

    If your company's current WAN technology seems too expensive and sluggish, then you may want to consider employing a software-defined WAN (SD-WAN). Access this expert e-guide for an explanation of SD-WAN benefits, and how you can navigate its potential downfalls.

  • Is Your Network Too Flat? Prevent Data Breaches with Segmentation

    Sponsored by: TechTarget Security

    How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.

  • Is Your Wireless Network Ready for the Internet of Things?

    Sponsored by: TechTarget Networking

    In this issue of Network Evolution, four organizations share how their resilient, high-performance networks enable IoT use cases that combine automation with intelligence.

  • Network Management and Monitoring: The Evolution of Network Control

    Sponsored by: NetScout Systems, Inc.

    This e-guide takes a twofold approach to improving your network operations. First it discusses why you should implement unified network management to easily diagnose problems. Second, it reveals how you can use network monitoring to reduce costs and increase revenue.

  • Computer Weekly: Robots at Your Service

    Sponsored by: TechTarget ComputerWeekly.com

    Many digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.

  • Apply New Nagios Plugins and Network Alerts

    Sponsored by: BigPanda

    This guide discusses how to create different configurations of Nagios that will send notifications to different administrators at various times during the day. It shows in detail how to make the actual changes to the configuration that you'll need to make.

  • Protect Revenue and Emphasize User Experience with APM Tools

    Sponsored by: eG Innovations, Inc.

    Looking to boost revenue and keep your customers happy with an improved user experience? Access this expert guide to learn how to leverage the latest in application performance management (APM) tools and discover a host of approaches to evaluate end-user experience across all channels.

  • Application Infrastructures That Make Updates Easy

    Sponsored by: Cisco Systems, Inc and Citrix

    This in-depth video discusses the advantages of one system that steps up to the plate when it comes to scalable networking and application upgrading. Access now to learn how you can streamline and simplify your processes, ultimately slashing project costs.

  • A New Network Architecture: Send in the Clouds

    Sponsored by: TechTarget Networking

    This three-part guide covers all key aspects in moving your enterprise network to the cloud, including: security, availability, software-defined networking, and more. Access now if you are planning a future cloud deployment, or have some aspects of the network in the cloud but wonder if you should be moving more.

  • March Network Evolution – Cloud Networking Gets Real

    Sponsored by: TechTarget Networking

    In this issue of "Network Evolution," discover what it means to build a cloud networking strategy and learn from several IT departments that have already done so.

  • Leverage the Network Infrastructure for Competitive Success

    Sponsored by: Cisco Systems, Inc.

    This IDC report examines the opportunity midmarket firms have in leveraging network infrastructure for competitive success in the new cloud and mobility era. Inside, learn how midmarket firms can improve their competitive position by providing more efficient access to advanced productivity resources.

  • Getting Down to Business with Mobile APM

    Sponsored by: TechTarget Networking

    Mobile APM matures with more granular visibility than ever for mobile apps. Also discover what's behind the big push for 25 Gigabit Ethernet, plus new uses for SDN in wireless.

  • Resolve Performance Issues Within Your Citrix XenApp Environment

    Sponsored by: Riverbed Technology, Inc.

    This white paper introduces an innovative application performance management technology that could be very valuable to IT professionals who frequently troubleshoot performance issues across a Citrix server, saving time and taking the guesswork out of the analysis.

  • Enabling Ubiquitous Visibility in Virtualized Enterprises

    Sponsored by: Riverbed Technology, Inc.

    This white paper discusses the lack of visibility in the context of monitoring and troubleshooting end-to-end application performance and introduces one company's network performance management solution.

  • How to Make Apps Run More Efficiently in the Age of the Cloud

    Sponsored by: Riverbed Technology, Inc.

    This white paper details many of the issues that applications operations staff currently face; explains the requirements that today's applications operations groups have for an application performance management solution; and lists a number of suggestions for organizations currently choosing between APM solutions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.