ComputerWeekly.com Research Library

Powered by Bitpipe.com

Networking Research

  • UCaaS-to-SaaS Cooperation Offers Competitive Edge

    Sponsored by: TechTarget Networking

    In this edition of Network Evolution, find out how integrating your unified communications platform with mission-critical enterprise applications like Salesforce can provide significant competitive advantage by reducing human error and offering new insight into customer behavior.

  • SD-WAN Could Hurt NFV: How to Keep Up

    Sponsored by: Silver Peak

    Keeping up with the barrage of industry developments and "must-know" technologies, without getting completely overwhelmed is hard. In this e-guide, three industry experts dive into why SD-WAN can spell trouble for NFV, how to stay up to date with industry developments and why you shouldn't be too quick to dismiss open networking.

  • In-house Network Test Labs and SDN Switching Assessment

    Sponsored by: Juniper Networks, Inc.

    Keeping an in-house network test lab up to date requires considerable expertise. Learn how to avoid the complexity of maintaining an internal lab by utilizing a virtual test environment. Additionally, learn how expert bloggers assess SDN switching at UNH InterOperability Laboratory.

  • The SDN Charge and the New Role in Mobile Security

    Sponsored by: Juniper Networks, Inc.

    Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.

  • SDN: The Key to Better Security

    Sponsored by: Juniper Networks, Inc.

    Software-defined networking may hold the key to better security. In this expert e-guide, Principal Analyst, Lee Doyle explains how to strengthen SDN network security to prevent breaches. And Security and Systems Engineer, Judith M. Myerson, dives into improving SDN controller security with a 5 step risk management plan.

  • How does SDN automation work?

    Sponsored by: Juniper Networks, Inc.

    In this expert e-guide by principal analyst Lee Doyle, learn how SDN allows organizations to automatically scale and provision their networks, and gives them the opportunity to run large, complex applications flawlessly.

  • Storage Networking Technology Steps Up to Overcome Performance Challenges

    Sponsored by: IBM

    Fast flash storage and the growing use of virtual apps carry larger amounts of data than ever before—placing pressure on networks that carry storage traffic. This guide illustrates how to keep storage traffic from becoming the bottleneck in your data center, revealing key improvements to 2016 storage networking technologies.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • A Golden Age Dawns for Network Services

    Sponsored by: TechTarget Networking

    Advanced network technology options have expanded, offering enterprises better, cheaper, options for network services. This three part guide is designed to help you understand the ongoing evolution of network services and the connectivity technologies needed to access them.

  • Is Passive Optical Networking Good For Enterprises?

    Sponsored by: Nokia

    This expert e-guide explores the possibilities a passive optical network or PON offers to both service providers as well as personal users. Access now to discover the key benefits PON could potentially offer to enterprises and the top factors IT managers must consider before choosing PON.

  • IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy

    Sponsored by: Aruba Networks

    The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.

  • Ringing Endorsement: Which IP Phone Fits Your Needs?

    Sponsored by: TechTarget Networking

    Despite the rise of smartphones and tablets, many organizations still depend on the IP telephone, because of its reliability and functionality.But with hundreds of models on the market and a plethora of available features, how do you choose the right one for your business? This issue of Network Evolution dials in on that question and more.

  • Giving Your SAN a Boost with Flash Storage

    Sponsored by: Hewlett Packard Enterprise

    This e-guide discusses improving your network performance by embracing improved storage, particularly flash storage. It will show you how the benefits of an all-flash array cross over into improving business outcomes through better performance.

  • How to Leverage Video Conferencing in the Enterprise

    Sponsored by: Cisco

    This e-guide shows how you can best utilize video conferencing and collaboration technology while circumventing the worst challenges that arise from video adoption.

  • What You Need to Know When Choosing Between Office 2016 and Office 365

    Sponsored by: TechTarget Enterprise Desktop

    Use this expert e-book to discover whether the local Office 2016 or cloud-based Office 365 is the right fit for your enterprise. Explore topics such as the different costs of each program, increased file encryption in Office 2016, and the system requirements that it takes to run each Office suite.

  • Which Way Now for Your WAN?

    Sponsored by: TechTarget Networking

    Wire area networks and WAN connection types have evolved. In this technical guide, learn whether your WAN is what it needs to be.

  • Software-Defined Network Security: A 'No-Touch' Approach

    Sponsored by: VMware

    Despite its difficult-to-define nature, SDN security is an achievable goal if you can extend SDN's role beyond enhanced network capability. But to do this, a new touchless configuration policy may be necessary. In this expert e-guide, we discuss what it takes to make this "no-touch" approach a reality.

  • Microsegmentation Strategies for Smarter Security

    Sponsored by: VMware

    In this expert e-guide, we discuss the potential benefits of the microsegmentation approach to virtual networking. Discover why this security method is driving deployment momentum across enterprises and find out what questions you should be asking before you get started on your own transformation.

  • Breathe New Life Into Your Data Center Network

    Sponsored by: TechTarget Networking

    This technical guide examines how data center network design needs are changing and which upgrades networking pros should consider to meet the challenge.

  • Internet of Things Use Cases and Network Demands

    Sponsored by: Level 3 Communications, Inc.

    You must think carefully about ways that your organization can implement the internet of things. It also reveals how 4 organizations have deployed connected devices in order to enhance operations.

  • What to Look for in ADCs

    Sponsored by: TechTarget Networking

    This TechTarget Buyer's Guide explains key developments in app delivery controller technology and reviews the features ADCs must have.

  • MicroScope: July 2016

    Sponsored by: MicroScope

    The online battleground of SEO sabotage is the latest and worrying way some firms are being undermined by competitors. MicroScope looks at the issue and outlines how to stop it from wrecking website rankings

  • Modern Infrastructure E-zine – June 2016

    Sponsored by: TechTarget Data Center

    Are containers an open source lifeline? That remains to be seen, as the technology just might offer a saving grace to the OpenStack infrastructure. Find out how containers are impacting Openstack deployment.

  • Microscope June 2016

    Sponsored by: MicroScope

    June ezine: Think wireless Highlighting the opportunities when you package cloud services with wireless technologies to secure repeat revenue on network sales

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.