IT Management  >   Systems Operations  >   Network Management  >   Network Traffic Management  >   Internet Traffic Management  >  

Network Traffic Shaping

RSS Feed    Add to Google    Add to My Yahoo!
Network Traffic Shaping White Papers (View All Report Types)
 
The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

ECI Apollo: Defining the Next Generation of Optimized Multi-Layer Transport
sponsored by ECI Telecom
WHITE PAPER: Discover the challenges of achieving the new scalability, performance, manageability, and revenue objectives and what you need to meet and overcome them.
Posted: 22 Nov 2011 | Published: 22 Nov 2011

ECI Telecom

Optimizing Visibility, Control and Performance of Network Traffic
sponsored by Ixia
WHITE PAPER: Learn how network monitoring switches can help offload and control your current tools, providing the visibility you need for effective data center network monitoring and management.
Posted: 03 Mar 2014 | Published: 30 Jun 2013

Ixia

RTSP: One of the Foundations of Convergence
sponsored by F5 Networks
WHITE PAPER: Real-Time Streaming Protocol (RTSP) is a foundation for the current convergence of communications. When implementing RTSP, the multiple port and protocol nature of RTSP makes streaming audio/video difficult to manage. This white paper explains it.
Posted: 28 Apr 2008 | Published: 01 Sep 2007

F5 Networks

Introduction to Evolved Packet Core
sponsored by Alcatel-Lucent
WHITE PAPER: This white paper provides a brief introduction to Evolved Packet Core - a new mobile core for LTE. Key concepts and functional elements are outlined, as well as key changes in LTE requirements imposed on the Evolved Packet Core, and the deployment challenges one can expect to encounter.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Alcatel-Lucent

Rising IT Complexity Makes Remote Support Essential in Europe
sponsored by LogMeIn, Inc.
WHITE PAPER: Growing end-user expectations and the increasingly complex IT landscape are creating new challenges and pushing IT support operations to adapt. This white paper analyses a solution that functions quickly and reliably, helping to reduce the time spent resolving individual support tickets by giving support staff ability to prepare support request.
Posted: 28 Nov 2016 | Published: 01 Oct 2016

LogMeIn, Inc.

Getting Down to Business: Reducing the Risk of Restrictive IT
sponsored by Brocade
WHITE PAPER: This white paper explores how to overcome issues with restrictive, legacy IT technologies. Find out how CIOs can implement strategic planning to absorb the growing cost of updating systems, mitigate the impact of a failing network, and more.
Posted: 08 Dec 2016 | Published: 28 Feb 2015

Brocade

Forrester: Boost Application Delivery Speed
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This expert analysis report describes the common adoption patterns that organizations follow on their road to delivering applications faster and with higher quality. It allows you to understand the incremental journey of progress involving the delivery, collaboration, and benefits of this new development in application delivery.
Posted: 28 Nov 2016 | Published: 01 Oct 2016

Hewlett Packard Enterprise

Powering Vital Applications to Gain Competitive Advantage
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Data center modernization is not just a "nice-to-have," today it's a business imperative. Access this resource to examine several approaches to data center modernization, from which you can ensure vital applications run smoothly and prepare for modern software enhancements.
Posted: 08 Dec 2016 | Published: 08 Dec 2016

Hewlett Packard Enterprise

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement