ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Testing Research

  • Breaking Retail Silos: A Platform Approach That Scales with the Business

    Sponsored by: Super Micro

    Read this brief for a look at the challenge’s retailers—and other distributed organizations—must overcome to succeed in today’s market, and how edge computing can help you break down silos and meet modern customer demands.

  • Lumina Accelerates Multi-Vendor Interoperability

    Sponsored by: Lumina Networks

    Delivering customizable, on-demand 5G services will require automation across vendor devices. Therefore, control is needed to re-imagine how you serve your subscribers. In this infographic, learn how Lumina’s open source automation tools can help enable translation and control of any device at any layer of the network.

  • Streaming Data: The Key to Application Optimization

    Sponsored by: Zenoss, Inc.

    In today’s application economy, it’s critical to ensure key applications are optimized for performance. However, most organizations find that they have the bandwidth and budget to monitor and optimize only a small percentage of their application portfolio. In this white paper, examine the business challenges of application performance monitoring.

  • Barracuda SD-WAN Overview

    Sponsored by: Barracuda

    SD-WAN aims to relieve you of some of the burdens associated with MPLS circuits. Tune into this video for more info on the importance of SD-WAN in the cloud era, 7 key components of SD-WAN, and more.

  • MPLS Replacement with Broadband and Secure SD-WAN

    Sponsored by: Barracuda

    This paper presents an alternative: using SD-WAN protected by cloud-based firewalls to reduce costs and increase availability. Read on to learn how this approach simplifies deployment for all of the firewalls across your sites and gives you the added benefit of built-in redundancy and a more robust network.

  • Intervention areas for superfast broadband project Connecting Cumbria

    Sponsored by: ComputerWeekly.com

    UK broadband roll-out: Download this Excel spreadsheet detailing the intervention status of postcodes across Cumbria

  • WAN Speak Musings – Volume I

    Sponsored by: ComputerWeekly.com

    Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.

  • E-Guide: Choosing enterprise wireless LAN equipment

    Sponsored by: NETGEAR Inc.

    802.11N has solidified and a new product generation has emerged, the time is right for enterprises to pursue broader WLAN deployment. Purchases should be driven by technical requirements that map business needs onto product capabilities. To help you complete that step, we have compiled a list of common enterprise WLAN requirements.

  • Current networking trends increasingly shape the enterprise

    Sponsored by: SearchNetworking.com

    Current networking trends continue to affect the traditional enterprise, as well as the approach to network education and management.

  • In-house Network Test Labs and SDN Switching Assessment

    Sponsored by: Juniper Networks, Inc.

    Keeping an in-house network test lab up to date requires considerable expertise. Learn how to avoid the complexity of maintaining an internal lab by utilizing a virtual test environment. Additionally, learn how expert bloggers assess SDN switching at UNH InterOperability Laboratory.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • In the Network, Analytics Tools Empower Managers

    Sponsored by: SearchNetworking.com

    When it comes to improving network performance, big data alone isn't enough. In this issue of Network Evolution, find out why network managers are leveraging next-generation IT operations analytics (ITOA) tools to identify network performance problems and automate fixes before they can result in downtime.

  • Is Your Network Traffic Invisible?

    Sponsored by: Globalscape

    This brief guide explores the importance of network monitoring and outlines the benefits of increased visibility.

  • Cisco Visual Networking Index Global Mobile Data Traffic Forecast for 2013 to 2018

    Sponsored by: Cisco Systems, Inc.

    This interactive webpage outlines some top trends in mobile data trafficking and explains how this will affect the way IT departments deal with the rising traffic.

  • Ixia Black Book: 802.11ac Wi-Fi Benchmarking

    Sponsored by: Ixia

    Examine 802.11ac Wi-Fi test methodologies in this white paper, which provides insight into the capabilities and features that matter most.

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • Field Testing Multimode 10Gb/s (and beyond) Fiber Permanent Links

    Sponsored by: Fluke Networks

    This white paper is the joint effort of 2 industry leaders of high speed infrastructure cabling and testing, Panduit and Fluke Networks. It provides a thorough analysis and review of different testing techniques and their associated benefits for high speed permanent links.

  • E-Guide: Benchmarking Core Switches: Modeling Techniques for Switch Testing

    Sponsored by: NETGEAR Inc.

    Bottlenecks can lurk inside a high-speed 10 GbE core switch and cause its actual performance to clock in below theoretical maximum. The solution is benchmark any of these high-end devices before purchase. This e-guide discusses why using model traffic modeling to benchmark core switches is your best choice and how it can cut major costs.

  • E-Book: Technical Guide on Network Security Monitoring

    Sponsored by: AVG Technologies USA, Inc.

    Your organization’s network is more than a collection of pipes through which traffic flows: it’s your business’ fundamental IT architecture. Your security devices keep a watchful eye on traffic and systems, and maintain the integrity of your data and systems. Check out this guide to network security monitoring from SearchMidmarketSecurity.com.

  • Advanced Virtualization E-Book: Essentials of High-Availability Planning

    Sponsored by: Dell, Inc. and AMD

    This e-book provides planning and testing tips for establishing high availability in a virtual environment, plus highlights effective management tools and procedures currently available.

  • Symantec Protection Suite Challenge

    Sponsored by: Symantec Corporation

    Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.

  • Core IMPACT Essential

    Sponsored by: Core Security Technologies

    How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.

  • CORE IMPACT 6.0

    Sponsored by: Core Security Technologies

    For organizations that need to ensure the security of critical or sensitive systems, CORE IMPACT is a must-have tool. This Information Security Review examines CORE IMPACT and highly recommends it as an effective security device.

  • Independent Lab Test Report: Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks

    Sponsored by: Cisco Systems, Inc.

    Cisco Systems becomes the first, and to date the only, IP-Telephony vendor to earn Miercom's highest rating of Secure for its proven ability to defend an IP phone system against malicious attack.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.