ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Protocols Research

  • Lumina Accelerates Multi-Vendor Interoperability

    Sponsored by: Lumina Networks

    Delivering customizable, on-demand 5G services will require automation across vendor devices. Therefore, control is needed to re-imagine how you serve your subscribers. In this infographic, learn how Lumina’s open source automation tools can help enable translation and control of any device at any layer of the network.

  • Shortest Path Bridging for Mission-Critical Video Surveillance Networks

    Sponsored by: ALE USA

    Research shows that when things go wrong in a surveillance situation, 75% of the time the failures are attributed to network related issues. In this white paper, learn how and why Shortest Path Bridging (SPB) for video deployments can help ensure consistent quality of video especially when there are network failures.

  • How to Take Advantage of 5G Wireless Technology

    Sponsored by: CradlePoint

    As the reality of 5G wireless communications builds, enterprises are looking toward new ways of doing business with higher speed and increased capacity. New 5G wireless technology promises super-fast network speeds and massive capacity. In this e-guide, learn how organizations can begin to prepare for 5G in the enterprise.

  • Your Guide to Using NGINX

    Sponsored by: NGINX

    Read this eBook to learn about NGINX, open source software that can be used as a web server, load balancer, content cache, API gateway and more. This 175-page book covers everything from how to properly install NGINX, to how to configure all the major features, to debugging and troubleshooting.

  • Understanding Network TAPs

    Sponsored by: Gigamon

    Network security depends not only on common communication protocols but also on the ability to decipher what’s actually in those packets. There’s a simple solution to this that provides visibility into networked traffic: network TAPs. Read the white paper to gain a full understanding of why TAPs are the most effective way to copy network traffic.

  • Tunnel-Based versus Tunnel-Free SD-WAN

    Sponsored by: 128 Technology

    SD-WAN enables the kind of connectivity needed in today’s cloud era. However, overlay-based SD-WAN comes with one big caveat: dependence on tunnels. Although these tunnels can make the creation of overlays easier, there are issues. In this research report, learn about the benefits and the option of tunnel-free SD-WAN.

  • Riverbed SD-WAN: Simple, Powerful, Transformative

    Sponsored by: Riverbed

    Every once in a while, a technology emerges that greatly simplifies how things get done. For IT networking professionals, SD-WAN can be one of those technologies. It can help improve how networks are designed, deployed, and managed. Watch this quick video to learn about the key features of Riverbed’s SD-WAN.

  • 6 Reasons to Expand Network Visibility

    Sponsored by: AppNeta

    In a world where enterprise connectivity is more critical to business success than ever before, you need easy and efficient access to usage data. In this infographic, find out how you can expand upon the capabilities of NetFlow – a protocol developed for monitoring traffic – so that you can create even more comprehensive performance monitoring.

  • Security at the Speed of Your Network

    Sponsored by: Gigamon

    Read “Security at the Speed of Your Network” to learn how to use an architectural approach that improves security posture and reduces costs without painful compromises on performance.

  • The GoAnywhere Book of Secure File Transfer Project Examples

    Sponsored by: Help/Systems

    Managed file transfer (MFT) software is primarily used to automate and encrypt the data exchanged between an organization and its trading partners, users, and employees. A robust MFT solution can also solve problems that fall outside your basic file transfer needs. In this white paper, learn how your peers use managed file transfer.

  • GoAnywhere MFT

    Sponsored by: Help/Systems

    GoAnywhere MFT is an enterprise-level solution which will secure, automate and manage all of your organization’s file transfer needs through a single interface. In this data sheet, learn how GoAnywhere MFT can help your organization comply with data privacy regulations.

  • Replacing FTP Scripts with Managed File Transfer

    Sponsored by: Help/Systems

    Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the lack of security these methods provide. In this webcast, Stephen Mabbut of HelpSystems discusses why using FTP is a threat to your organization’s cybersecurity.

  • Network Management for IP-based Networks

    Sponsored by: Beta Systems

    In this white paper, explore a high-level introduction to network management in the Auconent Business Infrastructure Control Solution (BICS) for office and industrial networks.

  • Intent-Based Networking: Building on the Power of the API

    Sponsored by: Apcela

    Intent-based network (IBN) systems hold the promise of finally meeting enterprise needs, delivering on the promise of self-configuring and optimizing networks that technology companies have been making for years. In this white paper, examine the trends driving interest in IBN systems along with a description of the elements of these systems.

  • Are You Still Testing Your Wireless by Yesterday’s Methods?

    Sponsored by: 7SIGNAL

    There are two big mistakes you can make with Wi-Fi. The first is never testing it. The second is measuring its performance by outdated methods. Today’s truly effective wireless management employs multiple metrics to boost performance and productivity. In this white paper, explore common mistakes and myths which can cause Wi-Fi problems.

  • Tips for Conducting Wireless Network Monitoring

    Sponsored by: 7SIGNAL

    Wireless network monitoring (WMN) helps you answer important questions about how your network is functioning and performing. Without it, end users may experience problems before they can be addressed by IT managers. Learn about WMN and explore tips for using it in this white paper.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • Thou Shalt Not Pass… I Think?!

    Sponsored by: SolarWinds, Inc.

    Monitoring and managing VPN concentrators and the combined technology within devices like Cisco ASAs, can be challenging. However, organizations are starting to have a better handle on their networks because they can control them with adaptive devices. In this white paper, learn about breakthroughs for monitoring and managing these technologies.

  • Open for Business

    Sponsored by: Lumina Networks

    A modular open SDN controller platform for customizing and automating networks of any size and scale, OpenDaylight is one of the key open source projects pivotal in achieving transformation goals. In this e-book, explore a collection of articles written by Lumina field and community experts to customers amidst an OpenDaylight trial or deployment.

  • 4 Dimensions of Network Monitoring

    Sponsored by: AppNeta

    Your network spans multiple cloud providers, third-party services, and an always-growing web of remote locations. Does your team have the comprehensive visibility to tie it all together? Download this quick checklist to ensure that you have all the data and insights you need to manage your network effectively.

  • Border Gateway Protocol: The Roadmap to the Internet

    Sponsored by: AppNeta

    Monitoring BGP data gives enterprise IT visibility into the high-level networks and Autonomous Systems that an app may traverse on its path to delivery. In this white paper, learn how AppNeta helps teams put this data to use.

  • A Guide to Navigating Your Network Performance Successfully

    Sponsored by: AppNeta

    Transforming your network is a lot like going on a hike. There are a number of steps that go into planning before you can get started. In this infographic, learn how to navigate your network performance successfully by getting the lay of the land, finding the best route and getting the right gear.

  • Financial Services: How to Achieve the Proper Network Visibility

    Sponsored by: Gigamon

    In this white paper, learn about the Gigamon Visibility Platform and how it enables financial services firms to build an effective network security infrastructure, maximize tool efficiency without compromising network resiliency, and ensure compliance with strict industry mandates.

  • SD-WAN Benchmarking Best Practices for QoS

    Sponsored by: Infovista

    Read this white paper to review key capabilities of QoS systems and find out why it's considered a critical component of smart SD-WAN. Also, learn how to properly compare different QoS products prior to implementation to help determine if they can meet your needs.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.