IT Management  >   Systems Operations  >   Network Management  >  

Network Performance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Optimization, Network Tuning, Network Performance Management, Performance
DEFINITION: Network coding is a method of optimizing the flow of digital data in a network by transmitting digital evidence about messages. The "digital evidence" is, itself, a composite of two or more messages. When the bits of digital evidence arrive at the destination, the transmitted message is deduced rather than directly reassembled.The concept of network coding was first introduced by R. W. Yeung  … 
Definition continues below.
Network Performance White Papers (View All Report Types)
76 - 100 of 552 Matches Previous Page  |  Next Page
Can Broadband Change the WAN?
sponsored by Silver Peak
WHITE PAPER: This paper discusses how you can leverage SD-WAN applications to enable hybrid WANs for better efficiency, and get the most out of your MPLS by bridging a link with broadband Internet.
Posted: 21 Jan 2016 | Published: 31 Dec 2015

Silver Peak

Readying your Infrastructure for the Internet of Things
sponsored by F5 Networks
WHITE PAPER: In this white paper you will discover how the IoT will impact our daily lives moving forward. Read on to learn how early adopters of IoT technology have seen benefits like enhanced customer service and improved use of field assets and devise a strategy to reap similar benefits in your organization.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

F5 Networks

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

Secure Enterprise Applications on All Your Users' Mobile Devices
sponsored by vmware airwatch
WHITE PAPER: This white paper highlights a cloud service designed to help organizations leverage Office 365 on their mobile devices. Discover how to secure all company apps both cloud and on-premise and accelerate enterprise mobility.
Posted: 18 Sep 2015 | Published: 31 Jan 2014

vmware airwatch

The Power of Next-Generation WAN: SD-WAN at the Forefront
sponsored by Citrix
WHITE PAPER: This report explains how and why enterprise application evolution is pushing SD-WAN to the business forefront. Read on now to see how the virtualized WAN can connect the cloud to your branch locations, deliver superior user experience, and more.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

Citrix

The Economics of Defense: Modeling Security Investments
sponsored by Juniper Networks, Inc.
WHITE PAPER: There are a number of factors to take into account when building, or modifying, your cybersecurity strategy – and inside this report, take a look at 5 drivers that influence the costs of cybersecurity.
Posted: 08 Sep 2015 | Published: 08 Sep 2015

Juniper Networks, Inc.

Zero-Touch Branch Deployment, Centrally Managed Policy Propagation
sponsored by Fatpipe, Inc.
WHITE PAPER: Looking for easy migration to hybrid WAN? This white paper highlights how to centrally control your WAN, manage branch office configuration and deploy appliances with zero-touch installation.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Fatpipe, Inc.

Analyst Report: Can Broadband Change the WAN?
sponsored by Silver Peak
WHITE PAPER: This white paper looks at the challenges that are facing network managers and reviews a new breed of technology which addresses the problem of WAN performance.
Posted: 30 Jun 2015 | Published: 16 Jun 2015

Silver Peak

Improve Competitiveness with Software-Defined Wide Area Networks
sponsored by Silver Peak
WHITE PAPER: This white paper outlines the challenges of MPLS–based WANs compared to the benefits of SD-WANs. Read on to learn how you can achieve greater agility, decreased costs, increased performance, and more so that you can be ready for the next generation of IT.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Silver Peak

How Virtual Network Services Impact the Software-Defined Data Center
sponsored by Silver Peak
WHITE PAPER: Access this white paper to discover how various virtual network services like workload acceleration give you the performance, flexibility and control you need to keep up with the agile business world.
Posted: 05 May 2015 | Published: 05 May 2015

Silver Peak

Application Delivery Optimization
sponsored by F5 Networks
WHITE PAPER: Check out this white paper to learn how implementing Application Delivery Optimization can help you improve application performance in your data center.
Posted: 01 May 2015 | Published: 01 May 2015

F5 Networks

Mission Critical Apps in the Cloudand New Connectivity Challenges
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Learn why any company considering cloud migration needs to closely consider network performance between users, applications and their cloud services. Read now to explore the role of private networks in providing a consistent user experience.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

Level 3 Communications, Inc.

Prioritizing IT Monitoring Alerts with Anomaly Severity Scores
sponsored by Prelert
WHITE PAPER: This white paper examines why organizations are turning to behavioral analytics to reduce noise and takes a closer look at one organization's success with the strategy.
Posted: 01 Feb 2016 | Published: 12 Aug 2015

Prelert

A Proactive Approach to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: Discover how to move to a proactive incident response model to stop cyber-attacks before they can steal data or harm your reputation. Read on and learn what steps to take to achieve proactive IR.
Posted: 08 Jan 2016 | Published: 19 Aug 2015

Blue Coat Systems

SSL/TLS Visibility: Determining Your Network Security Blind Spot Cost
sponsored by Blue Coat Systems
WHITE PAPER: This white paper will assist you in calculating the cost of leaving the SSL/TLS network security blind spot open to hackers and presents strategies to mitigate risks.
Posted: 08 Jan 2016 | Published: 16 Dec 2015

Blue Coat Systems

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and describes how encrypted traffic management can help mitigate these risks.
Posted: 07 Jan 2016 | Published: 09 Dec 2013

Blue Coat Systems

Case Study: Save Money and Speed Application Performance
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Learn why failing to make necessary upgrades to slow application performance could threaten business success.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Riverbed Technology, Inc.

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: Learn how to uncover the what, when, and how of security incidents to fortify your security strategy against increasingly sophisticated attacks. Examine the shortcomings of conventional breach investigation approaches and how to build intelligence to navigate investigations faster and easier in this helpful whitepaper.
Posted: 12 Nov 2015 | Published: 14 Apr 2014

IBM

New Buyers of SSL Certificates FAQs
sponsored by Symantec Website Security Solutions
WHITE PAPER: Industry analyst Chris Kissel presents and answers the top FAQs asked by new SSL certificate buyers to ease the purchasing process.
Posted: 09 Nov 2015 | Published: 14 Oct 2015

Symantec Website Security Solutions

Superior Network Service Provisioning and Performance
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: This whitepaper dives into one possible network solution that claims to deliver scalable network capabilities that can gracefully handle even the most demanding applications. Make wait time a thing of the past, and unleash your applications with the right infrastructure to support them.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Cisco Systems, Inc and Citrix

Solidify Your Network Protection with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper you will learn the ins and outs of deploying an ISFW. Learn how to protect your company from the latest advanced security threats and compartmentalize access to sensitive data and apps.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

Turning APM into an IT Detective
sponsored by CA Technologies.
WHITE PAPER: This white paper shows you how you can make sure that your APM solutions are deployed optimally in your network.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

CA Technologies.

Quick Guide to Network Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief white paper details the two types of anomaly scores and how they are manifested. Continue reading now to learn how to use each score as an indicator for proactive alerting.
Posted: 10 Aug 2015 | Published: 30 Jul 2015

Prelert

Detecting Hidden Network Attacks Before a Breach
sponsored by Prelert
WHITE PAPER: This white paper explores a proactive approach to mitigating modern day cyber security threats and detecting attacks as they enter the network.
Posted: 07 Aug 2015 | Published: 15 Jul 2015

Prelert

Sandboxing: Is it the Network Security Savior?
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores how sandboxing, when combined with next-gen firewalls and endpoint security, mitigates unknown threats.
Posted: 15 Jun 2015 | Published: 27 May 2015

Fortinet, Inc.
76 - 100 of 552 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK PERFORMANCE DEFINITION (continued): …  and Z. Zhang in 1999 as an alternative to routing. In a traditional packet-switched network, data flows in defined, discrete "pieces" from the source to the destination like corpuscles in the bloodstream. At the transmitting station, the outgoing message is broken into packets, each of which contains some of the message data intact. The packets do not necessarily all travel along the same route but they all eventually arrive at the same destination, where the receiving computer reassembles them into the original message. The main problem with this method is that when the overall network … 
Network Performance definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement