ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Testing Research

  • Barracuda SD-WAN Overview

    Sponsored by: Barracuda

    SD-WAN aims to relieve you of some of the burdens associated with MPLS circuits. Tune into this video for more info on the importance of SD-WAN in the cloud era, 7 key components of SD-WAN, and more.

  • MPLS Replacement with Broadband and Secure SD-WAN

    Sponsored by: Barracuda

    This paper presents an alternative: using SD-WAN protected by cloud-based firewalls to reduce costs and increase availability. Read on to learn how this approach simplifies deployment for all of the firewalls across your sites and gives you the added benefit of built-in redundancy and a more robust network.

  • Network Purchasing Intentions 2013

    Sponsored by: ComputerWeekly.com

    This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.

  • Intervention areas for superfast broadband project Connecting Cumbria

    Sponsored by: ComputerWeekly.com

    UK broadband roll-out: Download this Excel spreadsheet detailing the intervention status of postcodes across Cumbria

  • WAN Speak Musings – Volume I

    Sponsored by: ComputerWeekly.com

    Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.

  • E-Guide: Choosing enterprise wireless LAN equipment

    Sponsored by: NETGEAR Inc.

    802.11N has solidified and a new product generation has emerged, the time is right for enterprises to pursue broader WLAN deployment. Purchases should be driven by technical requirements that map business needs onto product capabilities. To help you complete that step, we have compiled a list of common enterprise WLAN requirements.

  • Current networking trends increasingly shape the enterprise

    Sponsored by: SearchNetworking.com

    Current networking trends continue to affect the traditional enterprise, as well as the approach to network education and management.

  • In-house Network Test Labs and SDN Switching Assessment

    Sponsored by: Juniper Networks, Inc.

    Keeping an in-house network test lab up to date requires considerable expertise. Learn how to avoid the complexity of maintaining an internal lab by utilizing a virtual test environment. Additionally, learn how expert bloggers assess SDN switching at UNH InterOperability Laboratory.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • In the Network, Analytics Tools Empower Managers

    Sponsored by: SearchNetworking.com

    When it comes to improving network performance, big data alone isn't enough. In this issue of Network Evolution, find out why network managers are leveraging next-generation IT operations analytics (ITOA) tools to identify network performance problems and automate fixes before they can result in downtime.

  • Is Your Network Traffic Invisible?

    Sponsored by: Globalscape

    This brief guide explores the importance of network monitoring and outlines the benefits of increased visibility.

  • Cisco Visual Networking Index Global Mobile Data Traffic Forecast for 2013 to 2018

    Sponsored by: Cisco Systems, Inc.

    This interactive webpage outlines some top trends in mobile data trafficking and explains how this will affect the way IT departments deal with the rising traffic.

  • Ixia Black Book: 802.11ac Wi-Fi Benchmarking

    Sponsored by: Ixia

    Examine 802.11ac Wi-Fi test methodologies in this white paper, which provides insight into the capabilities and features that matter most.

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • Field Testing Multimode 10Gb/s (and beyond) Fiber Permanent Links

    Sponsored by: Fluke Networks

    This white paper is the joint effort of 2 industry leaders of high speed infrastructure cabling and testing, Panduit and Fluke Networks. It provides a thorough analysis and review of different testing techniques and their associated benefits for high speed permanent links.

  • E-Guide: Benchmarking Core Switches: Modeling Techniques for Switch Testing

    Sponsored by: NETGEAR Inc.

    Bottlenecks can lurk inside a high-speed 10 GbE core switch and cause its actual performance to clock in below theoretical maximum. The solution is benchmark any of these high-end devices before purchase. This e-guide discusses why using model traffic modeling to benchmark core switches is your best choice and how it can cut major costs.

  • E-Book: Technical Guide on Network Security Monitoring

    Sponsored by: AVG Technologies USA, Inc.

    Your organization’s network is more than a collection of pipes through which traffic flows: it’s your business’ fundamental IT architecture. Your security devices keep a watchful eye on traffic and systems, and maintain the integrity of your data and systems. Check out this guide to network security monitoring from SearchMidmarketSecurity.com.

  • Advanced Virtualization E-Book: Essentials of High-Availability Planning

    Sponsored by: Dell, Inc. and AMD

    This e-book provides planning and testing tips for establishing high availability in a virtual environment, plus highlights effective management tools and procedures currently available.

  • Symantec Protection Suite Challenge

    Sponsored by: Symantec Corporation

    Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.

  • Core IMPACT Essential

    Sponsored by: Core Security Technologies

    How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.

  • CORE IMPACT 6.0

    Sponsored by: Core Security Technologies

    For organizations that need to ensure the security of critical or sensitive systems, CORE IMPACT is a must-have tool. This Information Security Review examines CORE IMPACT and highly recommends it as an effective security device.

  • Independent Lab Test Report: Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks

    Sponsored by: Cisco Systems, Inc.

    Cisco Systems becomes the first, and to date the only, IP-Telephony vendor to earn Miercom's highest rating of Secure for its proven ability to defend an IP phone system against malicious attack.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.