Software  >   Systems Software  >   Network Management Software  >  

Policy-Based Network Software

RSS Feed    Add to Google    Add to My Yahoo!
Policy-Based Network Software White Papers (View All Report Types)
 
Longhorn Server and New Group Policy Settings
sponsored by Global Knowledge
WHITE PAPER: With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

7 Ways to Make Yourself Harder to Hack
sponsored by Solarwinds MSP
WHITE PAPER: Whether you call it layered security or defense in depth, layers of control buys you time to respond effectively. Access now to learn more about integrated tools that cover security and network management for MSPs.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Solarwinds MSP

VMware® Virtual SAN™ 6.2 Network Design Guide
sponsored by VMware
WHITE PAPER: This white paper gives a technology overview of a new policy-driven hypervisor-converged storage product for your software-defined data center. It provides the best network design and configuration best practices for deploying this highly available and scalable virtual solution.
Posted: 29 Dec 2016 | Published: 01 Apr 2016

VMware

Behavior Driven Development for Continuous Testing
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Explore the concept of behavior driven development, an Agile software development technique that promotes collaboration between QA, development, and business stakeholders. Find out how this user behavior-oriented approach will help you satisfy the need for both speed and quality.
Posted: 12 Sep 2016 | Published: 31 Dec 2015

Hewlett Packard Enterprise

Top Reasons for Implementing App Delivery on Hyperconverged Infrastructure
sponsored by Array Networks
WHITE PAPER: Whether you're refreshing your current infrastructure or scaling for new growth, make your infrastructure invisible. Learn the top 10 reasons for deploying an invisible infrastructure at your business.
Posted: 29 Jun 2016 | Published: 28 Jun 2016

Array Networks

How to Get ALM Data Ready with Predictive Analytics
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Find out how you can leverage predictive analytics to create "predictive development" best practices by approaching ALM as a big data repository. You'll discover how to boost data management for software requirements, testing, and every other step of the development lifecycle.
Posted: 11 Jan 2017 | Published: 31 Dec 2015

Hewlett-Packard Enterprise

Getting Down to Business: Reducing the Risk of Restrictive IT
sponsored by Brocade
WHITE PAPER: This white paper explores how to overcome issues with restrictive, legacy IT technologies. Find out how CIOs can implement strategic planning to absorb the growing cost of updating systems, mitigate the impact of a failing network, and more.
Posted: 08 Dec 2016 | Published: 28 Feb 2015

Brocade

Forget Hand-Coding: 5 Development Challenges to Consider
sponsored by OutSystems
WHITE PAPER: In this white paper, you'll explore 5 development challenges to consider when using hand coding over a RAD platform as a development method. Learn why apps typically require 10x more work today, and tools that make development times faster and more simplified.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

OutSystems

Leverage the Network Infrastructure for Competitive Success
sponsored by Cisco Systems, Inc.
WHITE PAPER: This IDC report examines the opportunity midmarket firms have in leveraging network infrastructure for competitive success in the new cloud and mobility era. Inside, learn how midmarket firms can improve their competitive position by providing more efficient access to advanced productivity resources.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

The Enterprise Mobile Security Technology Buyer's Guide
sponsored by Dropbox for Business
WHITE PAPER: In this research report, Forrester Research, Inc., defines the use cases, business value, and outlook for the 14 technologies at the heart of mobile security.
Posted: 30 Mar 2015 | Published: 13 Dec 2013

Dropbox for Business
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement