IT Management  >   Systems Operations  >   Configuration Management  >  

Network Change Management

RSS Feed    Add to Google    Add to My Yahoo!
Network Change Management White Papers (View All Report Types)
Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
Posted: 12 May 2014 | Published: 12 May 2014

Dell, Inc.

Paul Hastings Law Case Study
sponsored by Xirrus
WHITE PAPER: This informative case study examines how a leading international law firm utilized a wireless networking solution to gain ample bandwidth to support BYOD, with seamless management of all devices and full scalability.
Posted: 18 Oct 2013 | Published: 18 Oct 2013


Installing Windows 2008 Hyper-V Best Practices for Xiotech Emprise 7000
sponsored by Xiotech Corporation
WHITE PAPER: This document provides step-by-step instructions on installing Hyper-V and a host operating system. Windows 2008 must be installed and configured prior to installing Hyper-V. In addition, all other server configuration tasks, such as network configuration, domain membership, must be complete before installing Hyper-V.
Posted: 03 Jun 2010 | Published: 03 Jun 2010

Xiotech Corporation

BIG-IP Local Traffic Manager Datasheet
sponsored by F5 Networks
WHITE PAPER: This exclusive paper examines a traffic manager tool that can help you deliver your applications to users in a reliable and secure fashion, providing the extensibility and flexibility of an intelligent services framework and the programmability you need to manage a diverse infrastructure.
Posted: 22 Nov 2013 | Published: 22 Nov 2013

F5 Networks

WAN Deduplication: Getting More by Sending Less
sponsored by Silver Peak
WHITE PAPER: This paper discusses how WAN deduplication works, and how it can be effectively deployed as a complement to existing storage deduplication solutions.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

Silver Peak

A Full-Service Network With Secure, Encrypted Communications
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this guide, discover how to design a full-service network with secure, encrypted communications with VPN technology.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Cisco Systems, Inc.

Optimizing Your Wireless Network
sponsored by Xirrus
WHITE PAPER: This informative white paper discusses a wireless networking solution that can boost your Wi-Fi performance, control applications and meet capacity demands where needed.  Read on to learn more.
Posted: 30 Oct 2013 | Published: 30 Oct 2013


Providing effective endpoint management at the lowest total cost
sponsored by IBM
WHITE PAPER: Endpoint management technologies ensure that servers, workstations, laptops, mobile devices, and virtually any other network-connected device are kept up-to-date and correctly configured. Read on to investigate the total cost of ownership, or TCO, of an endpoint management investment.
Posted: 23 Feb 2012 | Published: 01 Apr 2011


Data Center Cabling Considerations: Point-to-Point vs Structured Cabling
sponsored by Siemon Company
WHITE PAPER: If we don’t learn from the mistakes that occurred in the past, we are bound to repeat them. This is very true when it comes to data centers and aged point-to-point cabling practices. This resource compares point-to-point vs. structured cabling options for data centers.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Siemon Company

Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users
sponsored by Dell Software
WHITE PAPER: Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.
Posted: 12 Feb 2014 | Published: 12 Feb 2014

Dell Software
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement