ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Configuration Management Research

  • Howe Robinson - Multi-Protocol Label Switched Network

    Sponsored by: Telstra Global

    This exclusive case study examines how one of the largest ship broking companies uses a multi-protocol label switched (MPLS) network solution to provide their global offices with the resources they need to improve productivity, boost operational efficiency, and drive innovation.

  • Turn Inc – Global Communications

    Sponsored by: Telstra Global

    This informative case study examines how a global business was able to extend their high-performance infrastructure to deliver online responses in less than ten milliseconds, regardless of location.

  • Robert Walters - Global IP VPN

    Sponsored by: Telstra Global

    This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.

  • Network Project of the Year 2014

    Sponsored by: Talari_DON'T USE

    This exclusive resource details how a leading railcar manufacturer utilized a networking tool to maximize availability and prevent costly network downtime. Read on to find out more.

  • Talari Mercury Appliances

    Sponsored by: Talari_DON'T USE

    This exclusive paper examines a set of network appliances that leverages network bandwidth from multiple sources to enable you to take advantage of the economics of broadband and the public internet without sacrificing business-quality, reliability, or availability.

  • Talari Case Study: American Railcar Industries

    Sponsored by: Talari_DON'T USE

    This exclusive case study examines how an American manufacturer was able to utilize a network solution to prevent downtime, eliminate off-hour crises, and maximize efficiencies.

  • Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention

    Sponsored by: Palo Alto Networks

    Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.

  • Case Study: Maricopa Region 911

    Sponsored by: Talari_DON'T USE

    This exclusive case study examines how a consortium of local municipalities was able to use a WAN virtualization solution to increase IP network resiliency and predictability, allowing the convergence of data and voice networks.

  • Talari Networks Product Demonstration: Network Resiliency

    Sponsored by: Talari_DON'T USE

    This exclusive webcast examines a networking solution that can create a resilient WAN that prevents applications from being affected by link outages, allowing your remote offices to adapt to changing network conditions and reroute traffic quickly to avoid downtime.

  • Getting on the Road to SDN

    Sponsored by: NEC Corporation of America

    This exclusive resource discusses how software-defined networking (SDN) can turn your network into an enabler of modern IT environments while eliminating manual processes, configuration inflexibility, and latency challenges associated with device-centric networking.

  • Extreme - IndentiFi

    Sponsored by: Extreme Networks

    This exclusive webcast discusses wireless networking solution that allows your organization to provide your users with the wireless performance needed to seamlessly access critical applications and data, even if the workloads are media-intensive.

  • Security Considerations When Undergoing a Network Refresh

    Sponsored by: Hewlett Packard Enterprise

    This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.

  • Creating a Best-of-Breed DDI Solution in a Microsoft Environment

    Sponsored by: Infoblox

    Access this informative whitepaper and learn how you can implement effective DNS, DHCP, and IP address management (DDI).

  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Sponsored by: DellEMC and Intel®

    Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

  • Guarding the Castle

    Sponsored by: DellEMC and Intel®

    Discover the top four strategies and tools that cybercriminals use to infiltrate your network, and how you can stop them. Read this e-book and learn the importance of securing your network every minute of the day against all types of malware, and how a high performance firewall helps you protect against the latest global threats.

  • Case Study - Psomas

    Sponsored by: Riverbed Technology, Inc.

    This exclusive case study discusses how a consulting engineering firm utilized a network optimization solution to enable their employees to share work and leverage resources wherever they happen to be.

  • Cisco Intelligent WAN (IWAN): Right-Size Your Network without Compromise

    Sponsored by: Cisco

    This exclusive paper examines an intelligent WAN solution that enables you to deliver an uncompromised experience over any connection, detailing how you can right-size your branch office connections without impacting performance, security or reliability.

  • What's New in Wireless Networking and 802.11?

    Sponsored by: Global Knowledge

    This exclusive white paper examines the ins-and-outs of wireless networking, discussing the current state 802.11 and what near-future developments you need to prepare for if you want to remain competitive.

  • Next-Gen WLAN: How 802.11ac Will Change Your Network Forever

    Sponsored by: TechTarget Networking

    With the IEEE 802.11ac-2013 standard approved, WLAN data rates are poised to soar to multiple-gigabit territory. This Technical Guide focuses on the WLAN's evolution and why it will soon be a viable alternative to Ethernet.

  • Achieve Deeper Network Security and Application Control

    Sponsored by: DellEMC and Intel®

    Combating emerging threats effectively while reducing the total cost of ownership (TCO) is crucial in a firewall. Read this paper and learn how NGFWs help you achieve a deeper level of security and safeguard your organization against today's evolving threats.

  • Virtualizing the Edge

    Sponsored by: Netsocket

    This exclusive resource discusses an cloud-managed virtual network solution designed specifically for edge deployments that can provide top-notch network performance to distributed environments.

  • Delivering Breakthrough Performance with 802.11ac

    Sponsored by: Ixia

    Gain an understanding of how 802.11ac can help provide higher performance by boosting bandwidth, and dive into the technical challenges associated with this new technology.

  • Chassis-Based Switches Offer Flexible, Optimized Network Performance

    Sponsored by: DellEMC and Intel®

    This brief video introduces the Dell C-Series: Resilient, chassis-based switches that deliver reliability, network control, and scalability.

  • Virtual Edge Solution: Advanced, Cloud-Managed Virtualization for the Network Edge

    Sponsored by: Netsocket

    This exclusive resource discusses a virtual edge tool that delivers a completely virtualized network edge solution that is cost-effective, flexible, and simple to use and allows your organization to grow at your own pace.

  • Mobile-First Enterprise; 10 Requirement for Optimizing your Network for Mobility

    Sponsored by: Aerohive Networks

    This informative white paper takes a look at what it means to be a mobile-first enterprise, examining what networks are needed to accommodate today's corporate user and how to overcome the problems IT will inevitably run into.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.