IT Management  >   Systems Design and Development  >   Architectures  >  

Network Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networking Architecture, Networking Architectures, WLAN Architectures, Network Architecture, Computer Network Architectures
DEFINITION: The design of a computer network that includes the hardware, software, access methods and protocols used.
Network Architectures White Papers (View All Report Types)
26 - 50 of 372 Matches Previous Page  |  Next Page
Building a Flexible Foundation for a Software-Defined Data Center
sponsored by Brocade
WHITE PAPER: To deliver physical and virtual network functions, architectures, and services at high scale and performance, organizations are looking to the software-defined data center (SDDC.) Discover ways to achieve improved visibility across data center resources.
Posted: 08 Dec 2016 | Published: 08 Dec 2016

Brocade

Bringing Hyper-Scale Cloud Efficiencies to the Enterprise Data Center and Network
sponsored by Brocade
WHITE PAPER: Discover how the software-defined data center (SDDC) and software-defined networking (SDN) market is building products and services that can deliver hyper-scale cloud efficiencies to the enterprise today.
Posted: 06 Dec 2016 | Published: 06 Dec 2016

Brocade

Three Keys to Success: Preparing Your Mobile Network for 5G
sponsored by Cisco Systems, Inc.
WHITE PAPER: This e-book examines the unsung heroes of 5G adoption and the infrastructure changes you will need to make at three key levels: access (HetNet), transport (xHaul) and core (Mobile Core).
Posted: 06 Dec 2016 | Published: 31 Oct 2016

Cisco Systems, Inc.

The Connected Enterprise: Unify Communications to Manage Beyond the Remote Workforce
sponsored by Arkadin + BlueJeans
WHITE PAPER: The modern workplace no longer requires the whole team to be physically present. Email, video and instant messaging/social networking allow for almost instantaneous sharing of ideas. Learn how to manage your remote workforce by unifying these channels, and providing remote access to data while maintaining compliance.
Posted: 18 Nov 2016 | Published: 18 Nov 2016

Arkadin + BlueJeans

Adaptive Network Control Solutions
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Learn how you can enable greater visibility and gain more granular control over network functions to seamlessly adjust to shifting demands all while controlling costs.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Level 3 Communications, Inc.

The Packet Train Difference
sponsored by AppNeta
WHITE PAPER: Get an in-depth look at packet train dispersion technology and how it delivers an accurate measure of network performance. You'll learn key benefits of packet train dispersion analysis, how it works, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

AppNeta

Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture
sponsored by EfficientIP
WHITE PAPER: Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

Gain Complete Control of Your Digital Ecosystem with PKI
sponsored by Entrust, Inc.
WHITE PAPER: Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

Entrust, Inc.

How a School District Swiftly Detects and Remediates Internal and External Threats
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how the Council Rock School District approached their massive network security blind spot and reduced their threat reaction time from months to detect and resolve to mere minutes. Discover what did and what did not work for them, how they also improved their capacity planning, and more.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Cisco Systems, Inc.

Outperform Your Expectations with Passive Optical LAN
sponsored by Nokia
WHITE PAPER: Passive optical LAN (POL) technology eliminates the networking limitations of Traditional LAN. This resource offers a side by side comparison of POL and traditional LAN and details the key features of POL. Access now to learn about these features.
Posted: 01 Sep 2016 | Published: 29 Jul 2016

Nokia

Passive Optical LAN, Explained
sponsored by Nokia
WHITE PAPER: This paper outlines the key elements of an enterprise POL. Access now and discover why POL is an optimal enterprise network option for today's digital world.
Posted: 01 Sep 2016 | Published: 29 Jul 2016

Nokia

The Top Five Security Threats to Your Business
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Cyber security breaches are more common now than they have ever been. And the risks they present are all serious. This infographic details the top five security threats to your business and highlights a network-based security solution that protects against them.
Posted: 08 Jul 2016 | Published: 30 Jun 2016

Level 3 Communications, Inc.

Network Security Playbook Guide
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Successful enterprises deal with network security threats quickly and efficiently by relying on network security playbooks. Access this white paper that explains how to build your playbook and highlights a security platform that can be crucial to your network security.
Posted: 08 Jul 2016 | Published: 01 Jun 2016

Level 3 Communications, Inc.

5 Signs Your Cloud Connection is Mission Critical Ready
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Is your cloud connection "mission-critical" ready? Access this infographic that provides 5 signs that your cloud connection is "mission-critical" ready and offers complete solutions if it isn't.
Posted: 07 Jul 2016 | Published: 01 Jun 2016

Level 3 Communications, Inc.

Cloud Agility with Performance
sponsored by Array Networks
WHITE PAPER: As enterprises adopt cloud and virtualization, many will deploy application delivery and security functions in cloud environments. Read this white paper that explains how to successfully deploy models for application delivery controllers and secure access gateways in cloud environments.
Posted: 28 Jun 2016 | Published: 02 May 2016

Array Networks

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Citrix NetScaler: A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: Denial of service (DoS) attacks are on the rise after years of relative dormancy. In that time they have evolved and are honed in on attacking the different networking layers. Discover how DoS attacks have evolved and how to approach DoS protection at each layer of your network.
Posted: 13 Jun 2016 | Published: 30 Jan 2015

Citrix

The Top 7 Criteria for Cloud Wi-Fi
sponsored by Fortinet, Inc.
WHITE PAPER: Follow this discussion of the 7 criteria you need to consider when choosing a cloud Wi-Fi solution for your all-wireless business. Cloud-managed Wi-Fi is the inevitable future of the medium, so all that's left is choosing the best provider for your business.
Posted: 25 May 2016 | Published: 25 May 2016

Fortinet, Inc.

The Emerging Opportunity for Full Stack Communications in the Midmarket
sponsored by Avaya CenturyLink
WHITE PAPER: If your business is struggling with communications complexities, you may be in a communications environment that fails to benefit your customers and employees. This white paper written by Principal Analyst, Dave Michels, covers the issues with IT and communications and explains how a full-stack communications approach may be able to remove them.
Posted: 01 Jul 2016 | Published: 31 Dec 2015

Avaya CenturyLink

Quality Contact Recording Increases Workforce Optimization
sponsored by Avaya CenturyLink
WHITE PAPER: Choosing top tier contact recording services can empower businesses by optimizing the performance of their customer-facing resources. Read this white paper that educates you on communication monitoring services and how they can help you achieve performance improvement that increases customer retention.
Posted: 30 Jun 2016 | Published: 31 Dec 2015

Avaya CenturyLink

Build a Secure Network Access Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: Evolving changes in mobile usage, devices, and applications create an enormous challenge for IT to protect the network. Explore ways to enable a secure network access architecture that helps keep internal enterprise assets safe, and protects users from cyberattacks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

Nemertes Research: Re-Architecting the Enterprise Network For WLAN, Cloud, Mobility, Bandwidth, and Cybercrimes
sponsored by Juniper Networks, Inc.
WHITE PAPER: IT professionals continue to embrace new technologies but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and security infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.
Posted: 09 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

IDC Research: 7 Trends Impacting Enterprise Campus Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER: Reliance upon cloud applications for mission-critical business functions has heightened network requirements at the edge. Discover in this exclusive white paper 7 prevalent issues in today's enterprise campus networks, and how to leverage a cloud-enabled network to seamlessly glue your network edge to the cloud and optimize your cloud applications.
Posted: 06 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Network Strategies that Will Help You Eliminate, Embrace, or Coexist with Shadow IT
sponsored by Juniper Networks, Inc.
WHITE PAPER: Shadow IT is here. Access this e-guide for the current trends driving the rise of shadow IT, explore the drawbacks and benefits it offers, and learn how designing and building the right network is essential for your preferred shadow IT strategy.
Posted: 05 May 2016 | Published: 05 May 2016

Juniper Networks, Inc.

SD-WAN for Maximizing WAN Performance
sponsored by Fatpipe, Inc.
WHITE PAPER: More and more applications are moving to the cloud which is causing a decrease in WAN performance. This white paper displays how SD-WAN offers a solution to address these new network complexities and performance needs with a seven layered approach to WAN optimization.
Posted: 19 Apr 2016 | Published: 06 Apr 2016

Fatpipe, Inc.
26 - 50 of 372 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement