ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Management Research

  • Internet of Things Use Cases and Network Demands

    Sponsored by: Level 3 Communications, Inc.

    You must think carefully about ways that your organization can implement the internet of things. It also reveals how 4 organizations have deployed connected devices in order to enhance operations.

  • How to Yield the Benefits of Converged Infrastructure

    Sponsored by: Dell, Inc. and Intel®

    Is converging corporate infrastructure—to eliminate siloed servers, storage, data and processes—worth the risk of potential vendor lock-in? Discover how to yield maximum benefit from implementing converged infrastructure in your data center, as well as learn CI implementation best practices.

  • Picking the Right Spots for SDN

    Sponsored by: TechTarget Networking

    This 3 part guide covers the top misconceptions that plague SDN, its importance to horizontal scaling and virtues of two SDN technologies: SD-WAN and NFV. In addition, discover how Microsoft aims to be a top contender in the SDN enterprise market.

  • Cloud Migration Strategies for a Hybrid Cloud World

    Sponsored by: New Relic

    Cloud computing strategies aren't always easy to carry out – especially when migrating between cloud providers or public and private clouds. This e-guide reveals recommended cloud migration practices and explores three common approaches to migrating apps to the cloud.

  • How to Implement Network Microsegmentation

    Sponsored by: NTT Com Security (UK) Ltd

    Discover how microsegmentation can break up your data center into logical elements and reduce its susceptibility to catastrophic lateral movement of malicious activity once a breach occurs.

  • 9 Essential Elements for Effective Enterprise Mobility

    Sponsored by: VMware, Inc.

    Expert-level mobility comes in threes. Uncover three essentials for an effective mobile app strategy, three steps to a successful mobile initiative, and three steps to better mobile data protection.

  • Why It's Important to Have a Mobile Enterprise Strategy

    Sponsored by: VMware, Inc.

    We sat down with the general manager of VMware's end-user computing group to learn about the vendor's EMM evolution. Explore additional expert resources that detail ways to integrate EMM into a broader mobile enterprise strategy, and what it means to have a mobile-first strategy.

  • 25 GbE and the Future of the Data Center

    Sponsored by: QLogic Corporation

    Expanded performance and throughput in 25 Gigabit Ethernet (25 GbE), a new Ethernet standard, reflects continued advances in server processing – and also may be the cure for oversubscribed data centers. Access this e-guide for more on these claims, and what 25 GbE means for the future of networking.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • Is It Time to 'Software-Define' Your Network Security?

    Sponsored by: TechTarget Security

    This guide goes beyond most examinations of security in SDN, goes beyond explaining what SDN is and how it might improve network security. Instead, this publication looks in-depth at specific implementations of SDN. Readers will come away with a freshly packed toolkit of SDN-related actionable advice.

  • Why SD-WAN is the Way to WAN Optimization

    Sponsored by: Silver Peak

    If the growth of cloud computing and mobility has proven anything, it's that the legacy boundaries of the enterprise no longer exist. As a result, the traditional model of WAN optimization is changing too. Access this e-guide to discover if SD-WAN is right for your network.

  • Is Your Wireless Network Ready for the Internet of Things?

    Sponsored by: TechTarget Networking

    In this issue of Network Evolution, four organizations share how their resilient, high-performance networks enable IoT use cases that combine automation with intelligence.

  • Should You Upgrade to 802.11ac Wireless LAN?

    Sponsored by: Rogers Communications, Inc.

    This e-guide discusses the questions LAN managers should ask themselves to determine if they need to upgrade to 802.11ac wireless LAN, as well as the pros and cons of doing so.

  • Network Management and Monitoring: The Evolution of Network Control

    Sponsored by: NetScout Systems, Inc.

    This e-guide takes a twofold approach to improving your network operations. First it discusses why you should implement unified network management to easily diagnose problems. Second, it reveals how you can use network monitoring to reduce costs and increase revenue.

  • Computer Weekly: Robots at Your Service

    Sponsored by: TechTarget ComputerWeekly.com

    Many digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.

  • Threat Intelligence Services: An Introduction

    Sponsored by: Cisco Umbrella

    Improve your enterprise security with threat intelligence services, as presented in this e-guide, and learn what you can expect when you hire an incident response provider to handle your ongoing crisis.

  • Measuring the Business Benefits of Unified Communications

    Sponsored by: Dimension Data

    This guide discusses the waning enthusiasm for UC, but more importantly, how IT can rethink the business benefits and the best ways to manage UC services in order to increase adoption and enthusiasm.

  • Top UC Trends Impacting 2016

    Sponsored by: Dimension Data

    This guide discusses the top 5 unified communications (UC) trends to watch in 2016. UC has undoubtedly entered the mainstream, but knowing the shape that deployments will take moving forward will lead to competitive advantage.

  • Apply New Nagios Plugins and Network Alerts

    Sponsored by: BigPanda

    This guide discusses how to create different configurations of Nagios that will send notifications to different administrators at various times during the day. It shows in detail how to make the actual changes to the configuration that you'll need to make.

  • Deploying Nagios Monitoring

    Sponsored by: BigPanda

    In this technical guide you will learn how to integrate monitoring into your existing Nagios environment, and specifically how to set up remote server monitoring using remote host definitions that contain a specification for each individual service that needs monitoring. The advantage of this approach is the ease of deployment.

  • Moving UC to the Cloud

    Sponsored by: Carousel Industries

    This e-guide provides an overview of unified communications as a service (UCaaS), including the companies that offer UCaaS, the services that are involved, the key benefits, and reasons you should consider UCaaS for your business.

  • Buying the Right Video Conferencing System

    Sponsored by: Carousel Industries

    This e-guide discusses the benefits of video conferencing, and aims to help you choose between on-premise, cloud-based, and hybrid video conferencing options in order to implement the best tool for your enterprise.

  • SSL Certificate Management: How to Avoid Common Mistakes

    Sponsored by: Symantec Website Security

    This expert e-guide describes the most common SSL certificate management mistakes and provides advice on how to avoid them. Discover how to choose the best certificates for your enterprise's needs, manage renewal of certificates, and more.

  • SSL Certificate Management: A Practical Guide

    Sponsored by: Symantec Website Security

    This expert e-guide breaks down SSL certificate management into practical, accessible terms. Discover the basics of SSL certificates, learn how you can prevent and troubleshoot problems in certificate management, and see examples of SSL certificate management tools at work.

  • It's Time to Take Cloud UC Seriously

    Sponsored by: Carousel Industries

    This expert e-guide discusses the adoption trends for cloud-based UC services and reveals the results of a survey aimed at discovering the opinion of IT professionals towards cloud UC.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.