IT Management  >   Systems Operations  >   Network Management  >  

Network Performance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Optimization, Network Tuning, Network Performance Management, Performance
DEFINITION: Network coding is a method of optimizing the flow of digital data in a network by transmitting digital evidence about messages. The "digital evidence" is, itself, a composite of two or more messages. When the bits of digital evidence arrive at the destination, the transmitted message is deduced rather than directly reassembled.The concept of network coding was first introduced by R. W. Yeung  … 
Definition continues below.
Network Performance White Papers (View All Report Types)
101 - 125 of 575 Matches Previous Page  |  Next Page
Readying your Infrastructure for the Internet of Things
sponsored by F5 Networks
WHITE PAPER: In this white paper you will discover how the IoT will impact our daily lives moving forward. Read on to learn how early adopters of IoT technology have seen benefits like enhanced customer service and improved use of field assets and devise a strategy to reap similar benefits in your organization.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

F5 Networks

Solidify Your Network Protection with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper you will learn the ins and outs of deploying an ISFW. Learn how to protect your company from the latest advanced security threats and compartmentalize access to sensitive data and apps.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

The State of the Virtualized Data Center: Physical and Virtual Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Find out how your network security peers evaluate network security when implementing new technology, and what they look for when choosing tools to support a virtualized environment, in this survey report.
Posted: 27 Oct 2015 | Published: 27 Oct 2015

Juniper Networks, Inc.

Hybrid Cloud, Network Strategies: Retailer Scales Seamlessly
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this case study, learn how an online-only retailer leveraged advanced hybrid cloud and networking capabilities to speed up online business for its 3.7 million active customers.
Posted: 27 Oct 2015 | Published: 31 Jul 2014

Juniper Networks, Inc.

Choosing a Network Architecture Provider
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper features tips on how to evaluate and select the right data center network architecture. Discover answers to three key questions.
Posted: 22 Oct 2015 | Published: 31 Dec 2014

Juniper Networks, Inc.

Speed Up Incident Response and Reveal Malicious IP Sources
sponsored by OpenDNS
WHITE PAPER: This breif white paper outlines how to gain great visibility and control over network traffic to uncover sophisticated threats.
Posted: 09 Oct 2015 | Published: 30 Sep 2015

OpenDNS

Securing Direct-To-Internet Branch Offices
sponsored by OpenDNS
WHITE PAPER: In this white paper, discover how to protect direct-to-internet traffic in remote/branch offices. Access this resource and examine if as-a-service offerings are the key to bridging the gap between performance and security for remote office workers.
Posted: 08 Oct 2015 | Published: 15 Jul 2015

OpenDNS

Enhance Security Visibility to Improve Incident Response and Compliance
sponsored by OpenDNS
WHITE PAPER: In this white paper, explore the limitations of traditional security log measures such as firewalls, AD, and web proxies and why it's imperative to gain complete visibility over DNS and your network. View now to learn how to eliminate network security blind spots and enable your SIEM to detect masked cybersecurity threats.
Posted: 08 Oct 2015 | Published: 30 Sep 2015

OpenDNS

Understand The Anatomy of Attacks to Stay One Step Ahead
sponsored by OpenDNS
WHITE PAPER: In this white paper, learn the 7 (often repetitive) steps of a cybersecurity attack. View now to learn how to leverage DNS to gain east-west visibility into your network and stop hidden attacks before your data is compromised.
Posted: 08 Oct 2015 | Published: 02 Sep 2015

OpenDNS

Secure Enterprise Applications on All Your Users' Mobile Devices
sponsored by VMware
WHITE PAPER: This white paper highlights a cloud service designed to help organizations leverage O365 on their mobile devices. Discover how to secure all company apps both cloud and on-premise and accelerate enterprise mobility.
Posted: 18 Sep 2015 | Published: 31 Jan 2014

VMware

Transforming the Status Quo of Traditional Networking
sponsored by VMware
WHITE PAPER: Traditional network infrastructures will never deliver the same speed and agility as Amazon and Google. Uncover a new approach to software-defined networking that delivers major advances in these areas as well as automation, security, and availability.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

VMware

Quick Guide to Network Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief white paper details the two types of anomaly scores and how they are manifested. Continue reading now to learn how to use each score as an indicator for proactive alerting.
Posted: 10 Aug 2015 | Published: 30 Jul 2015

Prelert

Detecting Hidden Network Attacks Before a Breach
sponsored by Prelert
WHITE PAPER: This white paper explores a proactive approach to mitigating modern day cyber security threats and detecting attacks as they enter the network.
Posted: 07 Aug 2015 | Published: 15 Jul 2015

Prelert

Analyst Report: Can Broadband Change the WAN?
sponsored by Silver Peak
WHITE PAPER: This white paper looks at the challenges that are facing network managers and reviews a new breed of technology which addresses the problem of WAN performance.
Posted: 30 Jun 2015 | Published: 16 Jun 2015

Silver Peak

Sandboxing: Is it the Network Security Savior?
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores how sandboxing, when combined with next-gen firewalls and endpoint security, mitigates unknown threats.
Posted: 15 Jun 2015 | Published: 27 May 2015

Fortinet, Inc.

How Virtual Network Services Impact the Software-Defined Data Center
sponsored by Silver Peak
WHITE PAPER: Access this white paper to discover how various virtual network services like workload acceleration give you the performance, flexibility and control you need to keep up with the agile business world.
Posted: 05 May 2015 | Published: 05 May 2015

Silver Peak

Application Delivery Optimization
sponsored by F5 Networks
WHITE PAPER: Check out this white paper to learn how implementing Application Delivery Optimization can help you improve application performance in your data center.
Posted: 01 May 2015 | Published: 01 May 2015

F5 Networks

Physical and Virtual Networks: 6 Best Practices for Overcoming Common Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: If you've already realized the benefits of server virtualization, you may be ready to step up to network virtualization. In this white paper highlights 6best practices for breaking through network virtualization roadblocks.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Juniper Networks, Inc.

How to Future Proof Application Delivery
sponsored by F5 Networks
WHITE PAPER: To learn more about the 4 key categories to consider when choosing an ADC platform that will stand the test of time, access this exhaustive white paper. Read now to learn how you can use this information to choose the ADC that's right for your organization.
Posted: 18 Mar 2015 | Published: 31 Dec 2014

F5 Networks

Consider the Whole Picture When Moving Your Network to the Cloud
sponsored by Dimension Data
WHITE PAPER: Access this white paper to find out why network and application performance during your transition to the cloud are tough to maintain for businesses.
Posted: 05 Mar 2015 | Published: 31 Dec 2014

Dimension Data

Networks That Know Automation
sponsored by Juniper Networks, Inc.
WHITE PAPER: Access this white paper to learn how networks are using automation to their advantage, especially with the popularity of software-defined networking (SDN).
Posted: 23 Oct 2014 | Published: 01 Aug 2014

Juniper Networks, Inc.

Turning APM into an IT Detective
sponsored by CA Technologies.
WHITE PAPER: This white paper shows you how you can make sure that your APM solutions are deployed optimally in your network.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

CA Technologies.

The Economics of Defense: Modeling Security Investments
sponsored by Juniper Networks, Inc.
WHITE PAPER: There are a number of factors to take into account when building, or modifying, your strategy - and inside this white paper are the 5 drivers that influence the costs of cybersecurity. Discover a revolutionary heuristic model created by RAND that more accurately demonstrates the economics of security.
Posted: 08 Sep 2015 | Published: 08 Sep 2015

Juniper Networks, Inc.

Long-Distance IT: Driving Efficiency in Remote Offices
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at increasing the efficiency of IT in remote offices. Read on to learn more.
Posted: 02 Jan 2015 | Published: 02 Jan 2015

Citrix
101 - 125 of 575 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK PERFORMANCE DEFINITION (continued): …  and Z. Zhang in 1999 as an alternative to routing. In a traditional packet-switched network, data flows in defined, discrete "pieces" from the source to the destination like corpuscles in the bloodstream. At the transmitting station, the outgoing message is broken into packets, each of which contains some of the message data intact. The packets do not necessarily all travel along the same route but they all eventually arrive at the same destination, where the receiving computer reassembles them into the original message. The main problem with this method is that when the overall network … 
Network Performance definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement