IT Management  >   Systems Operations  >   Network Management  >  

Network Performance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Optimization, Network Tuning, Network Performance Management, Performance
DEFINITION: Network coding is a method of optimizing the flow of digital data in a network by transmitting digital evidence about messages. The "digital evidence" is, itself, a composite of two or more messages. When the bits of digital evidence arrive at the destination, the transmitted message is deduced rather than directly reassembled.The concept of network coding was first introduced by R. W. Yeung  … 
Definition continues below.
Network Performance White Papers (View All Report Types)
76 - 100 of 558 Matches Previous Page  |  Next Page
The Business Case for Hybrid Networks
sponsored by MASERGY
WHITE PAPER: The market for hybrid network services is growing rapidly which is driven by the increase in enterprise bandwidth consumption — growing by 30% a year, according to Gartner market research. Access this white paper now to discover if a hybrid network is right for your business.
Posted: 21 Mar 2016 | Published: 07 Mar 2016

MASERGY

How to Get the Most From Your Global WAN
sponsored by MASERGY
WHITE PAPER: In this white paper, examine areas of technical leadership you'll want your global WAN supplier to possess. Plus, uncover 4 questions you should ask when negotiating your global WAN contract.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

MASERGY

Case Study: Amgen Turns to Hybrid Networking to Support its Global Business
sponsored by MASERGY
WHITE PAPER: Learn how one company adopted a network-as-a-service to connect its remote locations worldwide to its private IP network. Get access now to discover the benefits Amgen experienced after the upgrade, including seamless connections with a universal high performance network, excellent WAN visibility, and more.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

MASERGY

5 Key Business and Technology Needs Being Met by SDN and NFV
sponsored by MASERGY
WHITE PAPER: As the business landscape transforms, IT departments need to understand how emerging technologies like software defined networking and network function virtualization can meet business needs. Access this white paper to discover 5 key business and technology challenges that are being met by SDN and NFV.
Posted: 16 Mar 2016 | Published: 02 Mar 2016

MASERGY

The Enterprise Guide to Managed Services
sponsored by Comcast
WHITE PAPER: Your network is slated to fall victim to BYOD initiatives. Your WAN will need an upgrade, and now it's decision time. This white paper invites you to explore several considerations before you employ network managed services. Access now to examine what managed services are, how they work, and who benefits from them.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

Comcast

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

Does SDN Negate ADCs? Not if Innovators in Virtualization Have Their Way
sponsored by Citrix
WHITE PAPER: This e-guide reveals the advent of virtual application delivery controllers (ADCs) in response to the growth of virtualized systems. Access now to learn about innovative features that enable virtual ADCs on a software-defined (SDN) network.
Posted: 23 Mar 2016 | Published: 18 Mar 2016

Citrix

Anomaly Detection in Periodic Data
sponsored by Prelert
WHITE PAPER: This white paper examines how machine learning anomaly detection can cut through the vast amounts of periodicity to reveal the true abnormal and potentially malicious behavior within your network/systems. Read on and discover how to accurately locate deviations in expected network behavior.
Posted: 05 Feb 2016 | Published: 10 Apr 2015

Prelert

Excluding Frequent from Analysis for Smarter Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief resource delves into the art and science of whitelisting frequent entities to detect abnormalities faster and with greater ease. Read on and learn how to craft a dynamic whitelist for your threat detection strategy to never miss an abnormality or hidden attack again.
Posted: 05 Feb 2016 | Published: 04 May 2015

Prelert

Your Next Digital Security Guard Should be More like RoboCop
sponsored by Prelert
WHITE PAPER: In this white paper, discover how to use machine intelligence to patch major network security vulnerability gaps and mitigate human errors. Continue reading to learn how to identify abnormal and potentially malicious activity as it occurs.
Posted: 05 Feb 2016 | Published: 24 Jun 2015

Prelert

Optimize Anomaly Detection: Insider Tips for Success
sponsored by Prelert
WHITE PAPER: This brief white paper teaches you how to properly backfill historical data to build baseline analyses for ongoing anomaly searches. View now for expert anomaly detection tips and tricks.
Posted: 04 Feb 2016 | Published: 06 Jul 2015

Prelert

Ponemon Study Finds IT Security Not Prepared for Advanced Attacks
sponsored by Prelert
WHITE PAPER: This white paper examines how security vulnerabilities compile when you ignore your organization's threat intelligence strategy. View now to learn the top network threats and how to detect them faster by enhancing threat intelligence.
Posted: 04 Feb 2016 | Published: 28 Oct 2015

Prelert

Trend Estimation for Time Series Anomaly Detection
sponsored by Prelert
WHITE PAPER: This in-depth white paper teaches you how to properly use trend estimation for anomaly detection to improve your network security. Continue reading to learn how to avoid the most common difficulties of accurate automatic anomaly detection.
Posted: 03 Feb 2016 | Published: 05 Jan 2016

Prelert

Partitioning vs. "Split By" Clause in Anomaly Detection
sponsored by Prelert
WHITE PAPER: This white paper points out the finer differences between anomaly detection approaches and how each affects your anomaly score. Read on to learn which strategy will enhance your network security.
Posted: 02 Feb 2016 | Published: 20 Jul 2015

Prelert

Prelert Analytics vs Holt-Winters Filtering
sponsored by Prelert
WHITE PAPER: In this technical brief, explore the comparison between two real time series data modeling and anomaly detection strategies. Learn how anomaly detection on real time series data requires specific modeling capabilities and review the results obtained with each approach.
Posted: 01 Feb 2016 | Published: 30 Dec 2015

Prelert

Detect and Investigate DNS Tunneling with Security Analytics
sponsored by Prelert
WHITE PAPER: In this white paper, discover the benefits of enhancing anomaly detection and why it's imperative your network security leverages it.
Posted: 01 Feb 2016 | Published: 24 Aug 2015

Prelert

Prioritizing IT Monitoring Alerts with Anomaly Severity Scores
sponsored by Prelert
WHITE PAPER: This white paper examines why organizations are turning to behavioral analytics to reduce noise and takes a closer look at one organization's success with the strategy.
Posted: 01 Feb 2016 | Published: 12 Aug 2015

Prelert

A Proactive Approach to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: Discover how to move to a proactive incident response model to stop cyber-attacks before they can steal data or harm your reputation. Read on and learn what steps to take to achieve proactive IR.
Posted: 08 Jan 2016 | Published: 19 Aug 2015

Blue Coat Systems

SSL/TLS Visibility: Determining Your Network Security Blind Spot Cost
sponsored by Blue Coat Systems
WHITE PAPER: This white paper will assist you in calculating the cost of leaving the SSL/TLS network security blind spot open to hackers and presents strategies to mitigate risks.
Posted: 08 Jan 2016 | Published: 16 Dec 2015

Blue Coat Systems

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and describes how encrypted traffic management can help mitigate these risks.
Posted: 07 Jan 2016 | Published: 09 Dec 2013

Blue Coat Systems

Case Study: Save Money and Speed Application Performance
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Learn why failing to make necessary upgrades to slow application performance could threaten business success.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Riverbed Technology, Inc.

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: Learn how to uncover the what, when, and how of security incidents to fortify your security strategy against increasingly sophisticated attacks. Examine the shortcomings of conventional breach investigation approaches and how to build intelligence to navigate investigations faster and easier in this helpful whitepaper.
Posted: 12 Nov 2015 | Published: 14 Apr 2014

IBM

New Buyers of SSL Certificates FAQs
sponsored by Symantec Website Security Solutions
WHITE PAPER: Industry analyst Chris Kissel presents and answers the top FAQs asked by new SSL certificate buyers to ease the purchasing process.
Posted: 09 Nov 2015 | Published: 14 Oct 2015

Symantec Website Security Solutions

Superior Network Service Provisioning and Performance
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: This whitepaper dives into one possible network solution that claims to deliver scalable network capabilities that can gracefully handle even the most demanding applications. Make wait time a thing of the past, and unleash your applications with the right infrastructure to support them.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Cisco Systems, Inc and Citrix

Solidify Your Network Protection with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper you will learn the ins and outs of deploying an ISFW. Learn how to protect your company from the latest advanced security threats and compartmentalize access to sensitive data and apps.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.
76 - 100 of 558 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK PERFORMANCE DEFINITION (continued): …  and Z. Zhang in 1999 as an alternative to routing. In a traditional packet-switched network, data flows in defined, discrete "pieces" from the source to the destination like corpuscles in the bloodstream. At the transmitting station, the outgoing message is broken into packets, each of which contains some of the message data intact. The packets do not necessarily all travel along the same route but they all eventually arrive at the same destination, where the receiving computer reassembles them into the original message. The main problem with this method is that when the overall network … 
Network Performance definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement