ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Traffic Management Research

  • Network Forensics in a 10G World

    Sponsored by: WildPackets, Inc.

    This resource outlines the challenges inherent to 10G network forensics, explains why traditional network analysis is ineffective, and offers guidance on how to build and deploy effective forensics in a 10G world.

  • Overcome the Challenges of Virtualization with 10 Gigabit Ethernet Switches

    Sponsored by: Extreme Networks

    Did you know that 10 Gigabit Ethernet can help you overcome the challenges of network congestion in a virtualized data center environment? View this case study to learn more!

  • Network Monitoring and Management

    Sponsored by: TechTarget Networking

    This TechGuide explores the driving trends of advanced WAN management and monitoring tools growth, the impact of virtualization and understanding how the new generation of WAN management and monitoring tools can help you achieve optimum performance.

  • Application Performance Guaranteed for Unified Communications

    Sponsored by: IPANEMA TECHNOLOGIES

    This video reveals how a particular application and network performance solution can help you guarantee the performance of UC and other business-critical apps with ease. View now to learn more!

  • Killer Apps Survey 2013

    Sponsored by: IPANEMA TECHNOLOGIES

    Gain insight into the current state of application performance problems and discover how application performance management is critical to overcoming these challenges.

  • App Performance: The Frustration Factor or Secret to the Great Workplace?

    Sponsored by: IPANEMA TECHNOLOGIES

    This resource details why application performance is directly related to business performance and offers guidance on building the business case for improving app performance within your enterprise.

  • Extreme Networks Converged Infrastructure

    Sponsored by: Extreme Networks

    Gain insight into the components of a converged data center network infrastructure using Ethernet that not only builds a more effective, efficient infrastructure but also saves costs, helping you truly achieve more with less.

  • Voice over IP (VoIP) Growth and the Strain on Network Security

    Sponsored by: WatchGuard Technologies, Inc.

    Explore how VoIP can expose your organization to numerous risks and uncover why traditional firewalls often cannot thwart the many challenges VoIP presents.

  • Optimizing the Private Cloud with EMC VSPEX

    Sponsored by: Extreme Networks

    Learn about a scalable, on-demand infrastructure that leverages Ethernet and a powerful switching platform to help you achieve the most from your private cloud.

  • The Zen of Guaranteed Application Performance

    Sponsored by: IPANEMA TECHNOLOGIES

    Application performance is business performance – yet eliminating frustration and providing app happiness can be a harrowing task. This resource outlines how to gain the control, visibility, and automated intelligence you need for your apps – and business – to be successful.

  • SDN technologies primer: Revolution or evolution in architecture?

    Sponsored by: Enterasys

    While there is no single, clear definition of software-defined networking, there are two camps with two sets of beliefs. This expert e-guide digs deep into the theoretical differences between distributed control and centralized controllers. Uncover the benefits of each and why both are likely to see implementation.

  • 4 Questions to Ask When Evaluating Network Security Solutions

    Sponsored by: WatchGuard Technologies, Inc.

    This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.

  • Delivering IT to the Virtual Workforce

    Sponsored by: Citrix

    Uncover the four key requirements of workshifting, the technologies needed to achieve them, and the solutions that can provide these capabilities to your organization.

  • It's Time to Address the Visibility Challenge Surrounding Applications

    Sponsored by: Citrix

    Are you ready to solve the application visibility challenge? This resource outlines how a next-gen visibility solution provides the end-to-end visibility you need to win the battle.

  • How Citrix NetScaler Supports Virtualized Multi-tenant Datacenters

    Sponsored by: Citrix

    Explore how expanding virtualization to your application delivery controllers (ADCs) can help you facilitate the journey to the cloud.

  • 9 Reasons Why NetScaler Beats F5

    Sponsored by: Citrix

    This whitepaper compares two market-leading application delivery controllers (ADCs) to help your organizations find the one that best aligns with your business needs.

  • Gartner Magic Quadrant Report for Application Delivery Controllers

    Sponsored by: Citrix

    This Gartner Magic Quadrant report explores application delivery controllers (ADCs) and their role in the modern data center. View now to uncover a quick description of twelve of today's leading ADC vendors, their strengths and weaknesses, and where they stack up when compared.

  • A Different Take on Software Defined Networks

    Sponsored by: Enterasys

    Get a different take on software defined networks, who they help, the benefits you can achieve from deploying one, and key tips for utilizing one within your organization.

  • The Total Economic Impact of WANdisco SVN MultiSite

    Sponsored by: WANdisco

    This Forrester Total Economic Impact™ report unveils how one solution provides LAN-speed collaboration between distributed teams, giving them the feeling that they're all working in the same room. View now to uncover how this solution helped one global software engineering company enjoy a 357% ROI with a payback period of less than two months.

  • Enterasys Data Center Networking – Connectivity and Topology Design Guide

    Sponsored by: Enterasys

    View key concepts that will help you build a data center fabric capable of meeting the needs of both organizations and users both today and in the future. View now to learn more!

  • Network Rightsizing Blueprint for the Next-Generation Workplace

    Sponsored by: Aruba Networks

    This resource provides a blueprint for the workplace of the future, explaining in-depth the four key characteristics of the network in a next-gen enterprise. View now to learn how to prepare for, embrace, and enjoy the many benefits of a mobile enterprise.

  • 802.11ac Migration Guide

    Sponsored by: Aruba Networks

    This resource provides the basics of 802.11ac and outlines a number of strategies and recommendations that will help you plan your 802.11ac migration. View now to learn more!

  • Practitioners Guide to Establishing a SOC Webinar

    Sponsored by: AT&T Cybersecurity

    This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).

  • Practitioner's Guide to Establishing an SOC

    Sponsored by: AT&T Cybersecurity

    This white paper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.

  • The Financial Benefit of Cisco’s Elastic Core

    Sponsored by: Cisco Systems, Inc.

    Explore how three Cisco software-based initiatives for the core network can help you address the challenges facing core networks today – including the increasing volumes of traffic, diversity of services, and adoption of cloud services.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.