ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Management Research

  • Storage Networking Technology Steps Up to Overcome Performance Challenges

    Sponsored by: IBM

    Fast flash storage and the growing use of virtual apps carry larger amounts of data than ever before—placing pressure on networks that carry storage traffic. This guide illustrates how to keep storage traffic from becoming the bottleneck in your data center, revealing key improvements to 2016 storage networking technologies.

  • Networked Cloud Emerges to Meet Evolving Enterprise Needs

    Sponsored by: TechTarget Networking

    A growing number of network managers have their heads in the cloud, and that's a good thing. This edition of Network Evolution examines how cloud-based networking can make network managers' lives easier in a new era of IT.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • How DNS Information Can Help Cut Millions from Your Infrastructure Costs

    Sponsored by: Dyn

    This expert e-guide explains why DNS intelligence is the key to better network capacity planning and dynamic resourcing. Access now to begin planning to cut your infrastructure costs dramatically in the coming years.

  • Is Passive Optical Networking Good For Enterprises?

    Sponsored by: Nokia

    This expert e-guide explores the possibilities a passive optical network or PON offers to both service providers as well as personal users. Access now to discover the key benefits PON could potentially offer to enterprises and the top factors IT managers must consider before choosing PON.

  • Tips to Right-Size Cloud Capacity and Optimize Performance

    Sponsored by: Hewlett Packard Enterprise

    Overprovisioning and overspending for unused cloud capacity is a common issue that can impact your enterprise's bottom line. Access this e-guide for tips on right-sizing your cloud to prevent wasting resources. Plus, learn how to manage data to avoid performance bottlenecks in the hybrid cloud.

  • 6 Crucial Incident Response Policy Mistakes to Avoid

    Sponsored by: Delta Risk

    Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.

  • Next-Generation Networking Trends

    Sponsored by: Optus

    In this e-guide, learn about innovation in software-defined networking and network functions virtualization technologies for next-generation networks, and one IT pro's strategies for improving Wi-Fi in a device-saturated dormitory.

  • IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy

    Sponsored by: Aruba Networks

    The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.

  • Structuring Your Wireless Enterprise Network

    Sponsored by: Optus

    Has the day of the wireless enterprise dawned? This e-guide addresses this question, as well as the challenges facing enterprise IT as it considers moving towards a wireless network. Additionally, dive into a Q&A with a senior IT engineer on how he adapted his wireless network design to overcome today's challenges.

  • How to Evaluate SD-WAN, Hybrid WAN Products

    Sponsored by: TechTarget Networking

    Software-defined WANs are replacing legacy networks for better performance and cost-effectiveness. The marketplace is packed with vendors, each pitching different values, and it can be difficult to know what you actually need. This SD-WAN buyer's guide helps you evaluate vendors based on your unique needs.

  • Comparing Enterprise Data Center Cable Types and Their Effects

    Sponsored by: CommScope

    This expert e-guide compares fiber and copper cables and takes a close look at where each type of cable might be used in today's complex data centers. Access now to ensure you're using the right cable for your network. Additionally, further explore fiber optic cable types and their effects on the data center.

  • Ringing Endorsement: Which IP Phone Fits Your Needs?

    Sponsored by: TechTarget Networking

    Despite the rise of smartphones and tablets, many organizations still depend on the IP telephone, because of its reliability and functionality.But with hundreds of models on the market and a plethora of available features, how do you choose the right one for your business? This issue of Network Evolution dials in on that question and more.

  • Five Ways to Prevent a Ransomware Infection

    Sponsored by: Dimension Data

    Access this e-guide for IT security expert Kevin Beaver's 5 ways that you can bolster your network security to prevent ransomware from infecting your enterprise systems.

  • How to Identify Effective Telemedicine Systems

    Sponsored by: Avaya TSG

    As more telemedicine systems flood the market, providers should be aware of the key factors that make some products more suited to their organizations. Access this e-guide for the 5 areas by which you should judge potential telemedicine products to ensure you deploy the best tool.

  • Your SD-WAN Roadmap

    Sponsored by: Citrix

    Discover how making the transition to SD-WAN can save you money and simplify your current WAN structure.

  • Understanding SD-WAN

    Sponsored by: Citrix

    In this e-guide learn about deploying your WAN architecture onto the cloud, thus creating an SD-WAN architecture that can allow for smarter routing and improved networking. Uncover the benefits of SD-WAN and how its architecture better suits the demands of cloud, mobile and real-time applications.

  • How to Make Your WAN Architecture Software-Defined

    Sponsored by: Citrix

    In this e-guide, you will receive advice on how to choose the right SD-WAN for your enterprise needs. Discover how to analyze the vast array of SD-WAN vendors by isolating your particular needs, and uncover insight into securing and deploying the SD-WAN tool that will meet your goals.

  • IT Battles the Top Three Mobile Security Threats

    Sponsored by: Hewlett Packard - Intel Xeon

    Learn about 3 mobile security threats facing IT managers and security experts today. Access now to learn what best practices are being deployed to face the rapidly growing danger to your mobile devices.

  • SD-WAN Helps Secure Hybrid Networks

    Sponsored by: Citrix

    SD-WAN enables enterprises to create hybrid networks. But many network engineers eyeing hybrid WAN architectures are asking themselves the question: It can't be as safe as running on MPLS, right? Access this expert e-guide to learn about SD-WAN platforms' security features that finally make hybrid networks secure enough for widespread use.

  • How Does SDN Automation Work?

    Sponsored by: VMware

    While the DevOps style of application development requires rapid provisioning, scalable resources, and automated operations to flexibly deliver IT services, most methods can't scale to meet the demands of large data centers or complex distributed apps. Expert Lee Doyle explains how software-defined networking enables network automation.

  • Software-Defined Network Security: A 'No-Touch' Approach

    Sponsored by: VMware

    Despite its difficult-to-define nature, SDN security is an achievable goal if you can extend SDN's role beyond enhanced network capability. But to do this, a new touchless configuration policy may be necessary. In this expert e-guide, we discuss what it takes to make this "no-touch" approach a reality.

  • Microsegmentation Strategies for Smarter Security

    Sponsored by: VMware

    In this expert e-guide, we discuss the potential benefits of the microsegmentation approach to virtual networking. Discover why this security method is driving deployment momentum across enterprises and find out what questions you should be asking before you get started on your own transformation.

  • In the Network, Analytics Tools Empower Managers

    Sponsored by: TechTarget Networking

    When it comes to improving network performance, big data alone isn't enough. In this issue of Network Evolution, find out why network managers are leveraging next-generation IT operations analytics (ITOA) tools to identify network performance problems and automate fixes before they can result in downtime.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.