Network Protocols Research
-
Computer Weekly – 25 April 2023: Aston Martin Formula One: Driven by data
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we speak to Aston Martin Formula One's Clare Lansley to find out how digital transformation helps the team to move further up the F1 grid. We explore how automation and AI is helping businesses tackle rising costs and also look into the maturity of Industry 4.0 initiatives. Read the issue now.
-
A Computer Weekly buyer's guide to perimeterless network security
Sponsored by: TechTarget ComputerWeekly.comPerimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
Focus: Network security
Sponsored by: TechTarget ComputerWeekly.comDuring the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
-
How to enhance your network for the future
Sponsored by: TechTarget ComputerWeekly.comThe world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
-
How SSL-Encrypted Web Connections are Intercepted
Sponsored by: TechTarget SecurityIn this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
-
Improve BYOD with the Bonjour Protocol
Sponsored by: Aerohive NetworksThis E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
-
Next Generation Network Management Techniques
Sponsored by: TechTarget SecurityThe February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
-
A Computer Weekly buyer’s guide to perimeterless network security
Sponsored by: TechTarget ComputerWeekly.comPerimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
What to Look for in Secure Sockets Layer
Sponsored by: TechTarget SecurityThis Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
-
The Swiss Army Knife for the Network Analyst
Sponsored by: Riverbed Technology, Inc.This exclusive case study covers a tool that helped one company with their network and protocol analysis.
-
SIP trunking services close cost gaps around mobility
Sponsored by: Cox Communications, Inc.Most often those evaluating SIP trunking are looking to reduce PSTN access costs. This expert e-guide discusses how and what SIP trunking pros are doing with their network to reduce costs and run an efficient network.
-
Adaptive Packet Filtering
Sponsored by: GigamonThis white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.
-
Extreme Networks Solution with NEC
Sponsored by: Extreme NetworksExplore how using a 1 GbE, 10 GbE, or 40 GbE hardware plane is critical to achieving the interoperability and multi-site capabilities needed for a successful software-defined networking (SDN) initiative.
-
OpenFlow and SDN: What's in Store?
Sponsored by: Big Switch NetworksThis expert e-guide explores the top factors driving the adoption of OpenFlow and software-defined networking (SDN) technology in the campus network, as well as the benefits you can realize with this strategy – including improved security, effective BYOD management, and more.
-
IPv6 Addressing Plan Basics
Sponsored by: InfobloxCreating an IPv6 addressing plan is one of the most important pre-adoption tasks you have. This white paper details the technical and business requirements of deploying IPv6 and also provides a sample plan. View now to learn more!
-
Computer Weekly – 19 March 2013: Delivering software development success
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
-
Key Considerations for MPLS IP-VPN Success
Sponsored by: XO CommunicationsUncover the benefits of an MPLS-based private IP network and learn how it can not only help you simplify network management and reduce costs, but also prioritize application, create and improve disaster recovery, and much more!
-
How to Save Time and Money Making Your Transition to IPv6
Sponsored by: Cisco Systems, Inc.This white paper discusses 9 strategies that can save your business time and money while transitioning to IPv6, by slowing the need for replacements and mitigating risks.
-
Ericom Blaze — RDP Acceleration
Sponsored by: Ericom SoftwareSlow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
-
What Enterprises Should Do About IPv6 in 2011
Sponsored by: Cisco Systems, Inc.The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.
-
Dual Stack Network
Sponsored by: Cisco Systems, Inc.In order to ensure business continuity and future growth, all organizations need to carefully plan for coexistence between IPv4 and IPv6. A combination of both native IPv4 and IPv6, better known as dual stack, is the recommended coexistence strategy for enterprise networks. Continue reading to learn more.
-
IPv6: The Next IP Standard
Sponsored by: AT&T CorpWith available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.
-
Optiview Network Analyzer -- Free Hardware Trial
Sponsored by: Fluke NetworksIT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.
-
Router Essentials
Sponsored by: Global KnowledgeBuild a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.