IT Management  >   Systems Operations  >   Network Management  >  

Network Performance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Optimization, Network Tuning, Network Performance Management, Performance
DEFINITION: Network coding is a method of optimizing the flow of digital data in a network by transmitting digital evidence about messages. The "digital evidence" is, itself, a composite of two or more messages. When the bits of digital evidence arrive at the destination, the transmitted message is deduced rather than directly reassembled.The concept of network coding was first introduced by R. W. Yeung  … 
Definition continues below.
Network Performance White Papers (View All Report Types)
1 - 25 of 495 Matches Previous Page  |  Next Page
Industry Best DNS-Based DDoS Protections
sponsored by Nominum, Inc.
WHITE PAPER: In this white paper, you'll learn why better DNS defenses are needed to mitigate advanced and evolving bot-based malware and DDoS attacks.
Posted: 28 Aug 2015 | Published: 19 Aug 2015

Nominum, Inc.

Case Study: Solving a Load Management Crisis
sponsored by F5 Networks
WHITE PAPER: This case study explains how one organization replaced an overloaded, failing load balancer with one that provided greater capacity, on-demand scalability, and more.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

F5 Networks

Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: This white paper outlines the 6-point anatomy of APTs and how they evade traditional cybersecurity architectures.
Posted: 24 Aug 2015 | Published: 29 Jul 2015

Gigamon

Transforming the Status Quo of Traditional Networking
sponsored by VMware
WHITE PAPER: This white paper outlines a new approach to software-defined networking that delivers the agility, flexibility, and security you need to succeed in today's business world.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

VMware

The Business Value of Software Defined Networking
sponsored by NEC
WHITE PAPER: This white paper shows you the businesses value of software-defined networking. Read on to learn about its benefits
Posted: 14 Aug 2015 | Published: 14 Aug 2015

NEC

Quick Guide to Network Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief white paper details the two types of anomaly scores and how they are manifested. Continue reading now to learn how to use each score as an indicator for proactive alerting.
Posted: 10 Aug 2015 | Published: 30 Jul 2015

Prelert

Zero-Touch Branch Deployment, Centrally Managed Policy Propagation
sponsored by Fatpipe, Inc.
WHITE PAPER: This solution literature discusses a hybrid, software-defined networking product that provides an easy migration to hybrid WAN.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Fatpipe, Inc.

Detecting Hidden Network Attacks Before a Breach
sponsored by Prelert
WHITE PAPER: This white paper explores a proactive approach to mitigating modern day cyber security threats and detecting attacks as they enter the network.
Posted: 07 Aug 2015 | Published: 15 Jul 2015

Prelert

Inflection Points The New World of Enterprise IT
sponsored by Alcatel-Lucent
WHITE PAPER: This strategic white paper discusses the inflection points that are capable of helping you manage your IT infrastructure, improve your network, and optimize your communications.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

Alcatel-Lucent

Top Ten Criteria for Evaluating Network Packet Broker Solutions
sponsored by VSS Monitoring
WHITE PAPER: This white paper discusses ten ways that you should evaluate your choice for a network packet broker solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

VSS Monitoring

Fast IT Evaluation Guide
sponsored by VSS Monitoring
WHITE PAPER: This white paper discusses the changes coming to IT networks and the increasingly popular "Fast IT".
Posted: 04 Aug 2015 | Published: 04 Aug 2015

VSS Monitoring

Hardware Acceleration in Traffic Aggregation and Packet Brokering
sponsored by VSS Monitoring
WHITE PAPER: In this white paper you will find a brief overview of merchant silicon, software on general-purpose computing devices, Application Specific Integrated Circuits (ASICs), and purpose built reprogrammable hardware approaches.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

VSS Monitoring

Delivering Workplace Network Bandwidth
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper discusses bringing the bandwidth you need to your network.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Hewlett-Packard Company

Fortune 500 Firm Redesigns Network to Support its Growing User Base
sponsored by Equinix
WHITE PAPER: This case study delves into how a Fortune 500 financial firm redesigned its network to provide superior app performance to its growing number of users (and their multiple devices) spread across the country.
Posted: 23 Jul 2015 | Published: 31 Dec 2014

Equinix

Understanding Valdation: Understanding the Art and Science of SSL Certificate Validation
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper acts as a buyer's guide to choosing the right level of SSL certificate validation for your organization.
Posted: 16 Jul 2015 | Published: 15 Jan 2014

GeoTrust, Inc.

Why Always-on SSL is Critical for Company Websites Today
sponsored by GeoTrust, Inc.
WHITE PAPER: This paper discusses how always-on SSL offers enhanced security to protect against these attacks, while delivering several additional business benefits.
Posted: 16 Jul 2015 | Published: 01 Jul 2015

GeoTrust, Inc.

Update to the Status of Cloud DNS
sponsored by Neustar®
WHITE PAPER: This in-depth white paper explores the finer points of DNS and traffic management.
Posted: 16 Jul 2015 | Published: 08 Jul 2015

Neustar®

Best Practices for Building a Mobility Strategy
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, explore the challenges associated with implementing a mobile workspace and get best practices for building a mobility strategy.
Posted: 15 Jul 2015 | Published: 31 May 2014

Cisco Systems, Inc.

DDoS Extortion and Bitcoin: New Security Threat on the Horizon
sponsored by Neustar®
WHITE PAPER: This white paper profiles DD4BC and how to protect your network and organization from the attack.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

Neustar®

5 Ways Technology Can Accelerate Your Growth
sponsored by Verizon
WHITE PAPER: Inside this resource you will learn the five ways that you can use innovative technology solutions to radically accelerate and facilitate your growth.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Verizon

Improve Competitiveness with Software-Defined Wide Area Networks
sponsored by Silver Peak
WHITE PAPER: This white paper outlines the challenges of MPLS –based WANs compared to the benefits of SD- WANs. Read on to learn how you can achieve greater agility, lower costs, increased performance, and more so that you can be ready for the next generation of IT.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Silver Peak

Software Defined WAN Decreases Costs While Improving Network Performance, Availability, and Reliability
sponsored by Talari Networks
WHITE PAPER: Access this resource to learn how companies like Benevis, LLC are implementing software defined WANs to decrease costs while improving network performance and availability for the modern business world.
Posted: 15 Jun 2015 | Published: 11 Mar 2015

Talari Networks

4 Ways To Strengthen Your DNS Security
sponsored by Neustar®
WHITE PAPER: This white paper presents the four steps to strengthening DNS security to block today's constant dynamic attacks.
Posted: 02 Jun 2015 | Published: 27 May 2015

Neustar®

SDN and the enterprise campus network
sponsored by Dell, Inc.
WHITE PAPER: Access this resource to learn how SDN will redefine the underpinnings and low-level architecture of the LAN to provide greater flexibility and programmability, leading to smooth app integration, better control over user access and more.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

Dell, Inc.

Critical Role of DNS Calls for Vulnerability Mitigation
sponsored by Neustar®
WHITE PAPER: This white paper explores the current state of DNS threats, vulnerabilities, and 3 most common attacks.
Posted: 29 May 2015 | Published: 13 May 2015

Neustar®
1 - 25 of 495 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK PERFORMANCE DEFINITION (continued): …  and Z. Zhang in 1999 as an alternative to routing. In a traditional packet-switched network, data flows in defined, discrete "pieces" from the source to the destination like corpuscles in the bloodstream. At the transmitting station, the outgoing message is broken into packets, each of which contains some of the message data intact. The packets do not necessarily all travel along the same route but they all eventually arrive at the same destination, where the receiving computer reassembles them into the original message. The main problem with this method is that when the overall network … 
Network Performance definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement