IT Management  >   Systems Design and Development  >   Architectures  >  

Network Architecture

RSS Feed    Add to Google    Add to My Yahoo!
Network ArchitectureWhite Papers (View All Report Types)
 
Carrier Ethernet: Transforming Business Telecommunications
sponsored by Cox Communications, Inc.
WHITE PAPER: This white paper elucidates the process of selecting the best services for your organization's WAN needs, including Private Line, Layer 2 VPNs, and Layer 3 VPNs.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Cox Communications, Inc.

Enabling Business Transformation With a Top-Tier Network Architecture Solution
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide introduces one company's top-tier network architecture solution that can help you to transform your enterprise networks.
Posted: 26 Jun 2014 | Published: 30 Nov 2013

Cisco Systems, Inc.

Accelerating Web Applications: 3 Essential Principles
sponsored by F5 Networks
WHITE PAPER: This webcast gives tips on how organizations can accelerate their web applications by sending less data, sending data less frequently, and sending it more efficiently.
Posted: 31 Jul 2014 | Published: 30 Jun 2014

F5 Networks

Cisco UCS 6324 Fabric Interconnect
sponsored by Zones, Inc.
WHITE PAPER: This white paper details the Cisco UCSĀ® 6324 Fabric Interconnect, a low-latency, lossless 10 Gigabit Ethernet unified network fabric with enterprise-class, x86-architecture servers.
Posted: 25 Sep 2014 | Published: 31 Jul 2014

Zones, Inc.

Integrating Application Management and Business Analytics with Other IT Management Systems
sponsored by Extreme Networks
WHITE PAPER: This informative guide explores a top tool for network visibility and outlines the benefits of centralized visibility and management.
Posted: 23 May 2014 | Published: 23 May 2014

Extreme Networks

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

Use Case: An Innovative, Cost-Effective Method for Collecting Global Mobile Data
sponsored by Gigamon
WHITE PAPER: This white paper illustrates a use case involving a global provider of international connectivity and interoperability services in need of an innovative, cost-effective solution to support the collection of mobile roaming data from locations around the world.
Posted: 07 Aug 2014 | Published: 30 Jun 2014

Gigamon

Using Policy Based Routing and Access Control Lists in a Virtualized Network
sponsored by Dell, Inc.
WHITE PAPER: This resource is a deployment guide for Dell Networking switches, discussing the implementation of policy based routing and access control lists in virtualized networks.
Posted: 21 Aug 2014 | Published: 31 Dec 2013

Dell, Inc.

Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention
sponsored by Palo Alto Networks
WHITE PAPER: Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.
Posted: 16 Jun 2014 | Published: 10 Jul 2014

Palo Alto Networks

The Fight for Full Network Visibility in a Dangerous World
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
Posted: 09 May 2014 | Published: 09 May 2014

APCON, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement