IT Management  >   Systems Operations  >   Network Management  >  

Network Performance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Optimization, Network Tuning, Network Performance Management, Performance
DEFINITION: Network coding is a method of optimizing the flow of digital data in a network by transmitting digital evidence about messages. The "digital evidence" is, itself, a composite of two or more messages. When the bits of digital evidence arrive at the destination, the transmitted message is deduced rather than directly reassembled.The concept of network coding was first introduced by R. W. Yeung  … 
Definition continues below.
Network Performance White Papers (View All Report Types)
1 - 25 of 508 Matches Previous Page  |  Next Page
Anomaly Detection in Periodic Data
sponsored by Prelert
WHITE PAPER: This white paper examines how machine learning anomaly detection can cut through the vast amounts of periodicity to reveal the true abnormal and potentially malicious behavior within your network/systems. Read on and discover how to accurately locate deviations in expected network behavior.
Posted: 05 Feb 2016 | Published: 10 Apr 2015

Prelert

Excluding Frequent from Analysis for Smarter Anomaly Detection
sponsored by Prelert
WHITE PAPER: This white paper delves into the art and science of whitelisting frequent entities to detect abnormalities faster and with greater ease. Read on and learn how to craft a dynamic whitelist for your threat detection strategy to never miss an abnormality or hidden attack again.
Posted: 05 Feb 2016 | Published: 04 May 2015

Prelert

Your Next Digital Security Guard Should be More like RoboCop
sponsored by Prelert
WHITE PAPER: In this white paper, discover how to use machine intelligence to patch major network security vulnerability gaps and mitigate human errors. Continue reading to learn how to identify abnormal and potentially malicious activity as it occurs.
Posted: 05 Feb 2016 | Published: 24 Jun 2015

Prelert

Performance Monitoring for Your Virtualized Infrastructure: Considerations and Checklist
sponsored by eG Innovations, Inc.
WHITE PAPER: In this white paper, you will find a checklist of monitoring-related criteria that both enterprises and service providers should consider with due diligence when managing application performance for virtualized Citrix infrastructures.
Posted: 05 Feb 2016 | Published: 31 Jan 2016

eG Innovations, Inc.

Making Software-Defined Security Work for Your Data Center
sponsored by NTT Com Security (UK) Ltd
WHITE PAPER: This white paper explores micro-segmentation, a new and popular network security approach, and how to stop hackers from moving laterally within the data center.
Posted: 05 Feb 2016 | Published: 30 Dec 2015

NTT Com Security (UK) Ltd

Optimize Anomaly Detection: Insider Tips for Success
sponsored by Prelert
WHITE PAPER: This brief white paper teaches you how to properly backfill historical data to build baseline analyses for ongoing anomaly searches. View now for expert anomaly detection tips and tricks.
Posted: 04 Feb 2016 | Published: 06 Jul 2015

Prelert

Ponemon Study Finds IT Security Not Prepared for Advanced Attacks
sponsored by Prelert
WHITE PAPER: This white paper examines how security vulnerabilities compile when you ignore your organization's threat intelligence strategy. View now to learn the top network threats and how to detect them faster by enhancing threat intelligence.
Posted: 04 Feb 2016 | Published: 28 Oct 2015

Prelert

Identify and Address Five Pressing Application Performance Challenges
sponsored by eG Innovations, Inc.
WHITE PAPER: In this white paper, you will learn how to identify and address 5 common Citrix XenApp and XenDesktop performance challenges, in order to deliver excellent end-user satisfaction. Access this paper to address these problems, and iron out their solutions in order to achieve total performance visibility.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

eG Innovations, Inc.

Trend Estimation for Time Series Anomaly Detection
sponsored by Prelert
WHITE PAPER: This in-depth white paper teaches you how to properly use trend estimation for anomaly detection to improve your network security. Continue reading to learn how to avoid the most common difficulties of accurate automatic anomaly detection.
Posted: 03 Feb 2016 | Published: 05 Jan 2016

Prelert

Cyberthreat Defence Report: Malware Tops the Charts
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, find out how to identify, contain, and remediate unknown threats through real-time analysis. Discover how to close SSL blind spots and secure mobile devices and remote access endpoints inside.
Posted: 03 Feb 2016 | Published: 25 Feb 2015

Blue Coat Systems

See, Understand, and Swiftly Respond to Advance Threats
sponsored by Blue Coat Systems
WHITE PAPER: This white paper stresses the imprtance of network visibility and how real-time analysis enables you to see, understand, and respond to emerging and incoming security threats.
Posted: 03 Feb 2016 | Published: 16 Apr 2014

Blue Coat Systems

The Alternative to a Flood of Alerts
sponsored by Big Panda
WHITE PAPER: This short white paper discusses how an alert correlation strategy can reduce the number of alerts you receive without sacrificing crucial network information.
Posted: 03 Feb 2016 | Published: 03 Feb 2016

Big Panda

Virtualization Transforms the Ground Rules For IT Performance Management
sponsored by eG Innovations, Inc.
WHITE PAPER: In this white paper, you will learn how to expand your on-demand IT services and discover the significant impact virtualization has on application and IT infrastructure performance. Read on access 5 approaches for making your performance management virtualization-aware.
Posted: 03 Feb 2016 | Published: 03 Feb 2016

eG Innovations, Inc.

Partitioning vs. "Split By" Clause in Anomaly Detection
sponsored by Prelert
WHITE PAPER: This white paper points out the finer differences between anomaly detection approaches and how each affects your anomaly score. Read on to learn which strategy will enhance your network security.
Posted: 02 Feb 2016 | Published: 20 Jul 2015

Prelert

Top Challenges and Best Practices for Virtualizing Citrix XenApp On VMware Vsphere
sponsored by eG Innovations, Inc.
WHITE PAPER: In this white paper, you will discover how a virtualized platform can offer maximum reliability, performance and scalability. Continue reading to discover five recommendations for fine-tuning your software applications.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

eG Innovations, Inc.

A Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: This white paper describes how to find a solution that addresses two main drivers of incident response (IR) costs. Discover key strategies for lowering costs and maximizing ROI when performing IR, with details on three maturity models.
Posted: 01 Feb 2016 | Published: 19 Aug 2015

Blue Coat Systems

Prelert Analytics vs Holt-Winters Filtering
sponsored by Prelert
WHITE PAPER: In this technical brief, explore the comparison between two real time series data modeling and anomaly detection strategies. Learn how anomaly detection on real time series data requires specific modeling capabilities and review the results obtained with each approach.
Posted: 01 Feb 2016 | Published: 30 Dec 2015

Prelert

Detect and Investigate DNS Tunneling with Security Analytics
sponsored by Prelert
WHITE PAPER: In this white paper, discover the benefits of enhancing anomaly detection and why it's imperative your network security leverages it.
Posted: 01 Feb 2016 | Published: 24 Aug 2015

Prelert

Can Broadband Change the WAN?
sponsored by Silver Peak
WHITE PAPER: This paper discusses how you can leverage SD-WAN applications to enable hybrid WANs for better efficiency, and get the most out of your MPLS by bridging a link with broadband Internet.
Posted: 21 Jan 2016 | Published: 31 Dec 2015

Silver Peak

Unlocking the Promise of UTM-Enabled Network Protection
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper compares the efficacy of network security tools vs. unified threat management. Read more about the roadblocks to UTM adoption and if it's necessary for your organization in order to block malicious network threats.
Posted: 15 Jan 2016 | Published: 02 Dec 2015

WatchGuard Technologies, Inc.

Gartner Report: The Five Characteristics of an Intelligence-Driven Security Operations Center
sponsored by ThreatConnect
WHITE PAPER: Develop an intelligence-driven security operations center (SOC) approach by learning these 5 requirements and modify your security strategy from an exception-based process to a continuous one.
Posted: 13 Jan 2016 | Published: 02 Nov 2015

ThreatConnect

A Proactive Approach to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: Discover how to move to a proactive incident response model to stop cyber-attacks before they can steal data or harm your reputation. Read on and learn what steps to take to achieve proactive IR.
Posted: 08 Jan 2016 | Published: 19 Aug 2015

Blue Coat Systems

SSL/TLS Visibility: Determining Your Network Security Blind Spot Cost
sponsored by Blue Coat Systems
WHITE PAPER: This white paper will assist you in calculating the cost of leaving the SSL/TLS network security blind spot open to hackers and presents strategies to mitigate risks.
Posted: 08 Jan 2016 | Published: 16 Dec 2015

Blue Coat Systems

How to Overcome Application Performance Pitfalls
sponsored by CA Technologies
WHITE PAPER: This white paper examines the top changes and challenges in application performance management to help your enterprise overcome them. Get access now to learn how APM is evolving rapidly and how to solve perennial APM issues.
Posted: 08 Jan 2016 | Published: 08 Jan 2016

CA Technologies

Prioritizing IT Monitoring Alerts with Anomaly Severity Scores
sponsored by Prelert
WHITE PAPER: This white paper examines why organizations are turning to behavioral analytics to reduce noise and takes a closer look at one organization's success with the strategy.
Posted: 01 Feb 2016 | Published: 12 Aug 2015

Prelert
1 - 25 of 508 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK PERFORMANCE DEFINITION (continued): …  and Z. Zhang in 1999 as an alternative to routing. In a traditional packet-switched network, data flows in defined, discrete "pieces" from the source to the destination like corpuscles in the bloodstream. At the transmitting station, the outgoing message is broken into packets, each of which contains some of the message data intact. The packets do not necessarily all travel along the same route but they all eventually arrive at the same destination, where the receiving computer reassembles them into the original message. The main problem with this method is that when the overall network … 
Network Performance definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement