IT Management  >   Systems Operations  >   Network Management  >   Network Performance  >  

TCP IP Optimization

RSS Feed    Add to Google    Add to My Yahoo!
TCP IP OptimizationWhite Papers (View All Report Types)
 
The ROI of Application Delivery Controllers in Traditional and Virtualized Environments
sponsored by F5 Networks
WHITE PAPER: How modern offload technologies in Application Delivery Controllers can drastically reduce expenses in traditional and virtualized architectures, with a fast ROI.
Posted: 10 Dec 2009 | Published: 10 Dec 2009

F5 Networks

Bay Cove Human Services Achieves HIPAA Compliance on Google Apps & BYOD
sponsored by BitGlass
WHITE PAPER: This short white paper details how Bay Cove Human Services collaborated with BitGlass to achieve HIPAA compliance while still enabling the company to utilize Google Apps as their productivity backbone.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


Five Secrets of Highly Effective Data Centers
sponsored by CISCO & INTELĀ®
WHITE PAPER: This white paper examines 5 important strategies that organizations have adopted to overcome the limits of traditional IT infrastructure and transform their data centers to support innovation and growth.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CISCO & INTELĀ®

Gartner Predicts 2014: Identity and Access Management
sponsored by IBM
WHITE PAPER: Find out what Gartner's security analysts predict for the identity and access management space for 2014 and beyond.
Posted: 08 Oct 2014 | Published: 26 Nov 2013

IBM

Carrier Grade Reliability: What a Difference a '9' Makes!
sponsored by Wind River Systems, Inc.
WHITE PAPER: This white paper discusses the challenges that telecom service providers grapple with as they attempt to maintain service and network availability while continuing to refine their networks and introducing new network-based functions, such as network function virtualization.
Posted: 03 Oct 2014 | Published: 29 Sep 2014

Wind River Systems, Inc.

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Next-Generation Cost Transparency
sponsored by VMware
WHITE PAPER: This exclusive whitepaper explores how choosing the right technology and enabling complete cost transparency can turn IT into a trusted advisor and strategic partner, allowing them to focus spending on those applications and services with high business value.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

VMware

How We Define a Network is About to Change, Again
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn how VMware NSX changes the way that you build, manage, and secure your network.
Posted: 06 Oct 2014 | Published: 25 Sep 2014

Global Knowledge

Why You Should Think of the F5/ADC as a "Platform," Not a "Product"
sponsored by F5 Networks
WHITE PAPER: This white paper explains that application delivery controllers (ADCs) must be thought of as a platform, not a product, and also introduces one company's innovative application delivery platform.
Posted: 21 Oct 2014 | Published: 18 Jun 2013

F5 Networks

Cisco UCS Mini: Edge-Scale Computing with Enterprise Capabilities
sponsored by Zones, Inc.
WHITE PAPER: This white paper introduces Cisco UCS Mini, which delivers servers, storage, and 10GbE networking in an easy-to-deploy, compact form factor, specially optimized for branch and remote offices and smaller IT environments.
Posted: 03 Oct 2014 | Published: 30 Sep 2014

Zones, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement