IT Management  >   Systems Design and Development  >   Architectures  >  

Network Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networking Architecture, Networking Architectures, WLAN Architectures, Network Architecture, Computer Network Architectures
DEFINITION: The design of a computer network that includes the hardware, software, access methods and protocols used.
Network ArchitecturesReports
176 - 200 of 623 Matches Previous Page  | Next Page
Economic Value Validation of Riverbed Performance Management Cascade
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Businesses continue to change their data centers and networks to better adapt to the global marketplace. This guide explores the role of the data center in the ever-changing IT landscape and how IT professionals are dealing with these changes.
Posted: 23 Jan 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Overcoming the Three Pitfalls of Ineffective Monitoring Solutions
sponsored by CA Technologies.
WHITE PAPER: Delivering high service levels while maintaining a strict budget is a challenge many IT departments have to face. This guide explores 3 key pitfalls when organizations fail to utilize IT management and monitoring across networks, servers, storage, and applications.
Posted: 22 Jan 2014 | Published: 31 Dec 2013

CA Technologies.

The F5 Intelligent DNS Scale Reference Architecture
sponsored by F5 Networks
WHITE PAPER: The Domain Name System (DNS) is arguably the primary technology enabling the internet. This guide explores why DNS architecture is essential to your network and how you can build an available, intelligent, secure, and scalable infrastructure.
Posted: 22 Jan 2014 | Published: 30 Nov 2013

F5 Networks

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Special Report on Cisco
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This special nine-page report from Computer Weekly, updated for 2014, analyses the challenges facing Cisco, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Case Study: Implementing BYOD at Wittenberg University
sponsored by Extreme Networks
CASE STUDY: This exclusive case study discusses how a university with limited resources was able to use a series of networking tools to centralize mobile management while providing the performance needed to support BYOD.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Extreme Networks

WiFi Buyer's Guide
sponsored by Extreme Networks
WHITE PAPER: This informative paper takes an in-depth look at the five key areas to scrutinize when considering an enterprise-grade Wi-Fi solution, analyzing everything from cost to customer support.
Posted: 13 Jan 2014 | Published: 13 Jan 2014

Extreme Networks

Wi-Fi Deployment in Large Venues
sponsored by Extreme Networks
WHITE PAPER: This informative paper examines a Wi-Fi solution that can provide effective wireless network access for high-density areas and discusses how you can best use this Wi-Fi to drive new sources of revenue.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

Extreme Networks

Innovation in Mobility: Improving the Fan Experience
sponsored by Extreme Networks
CASE STUDY: This exclusive paper examines how the New England Patriots organization was able to provide a seamless Wi-Fi service to several thousand mobile users in a densely populated area—a feat that many once thought to be impossible.
Posted: 08 Jan 2014 | Published: 03 Jan 2014

Extreme Networks

5 Ways to Reduce Advertising Network Latency
sponsored by Dyn
WHITE PAPER: This guide outlines 5 guidelines used for reducing your overall network latency.
Posted: 06 Jan 2014 | Published: 06 Jan 2014

Dyn

Why Application Delivery Controllers are an Essential Piece to your Network Puzzle
sponsored by Citrix
WHITE PAPER: When it comes to the new demands of network infrastructure, it is critical to have an effective application device controller (ADC). This brief guide explores an effective ADC that can help improve your network performance and provide you with effective scalability solutions.
Posted: 06 Jan 2014 | Published: 06 Jan 2014

Citrix

The Active Advantage: Why Networking Leaders Are Embracing ADC Clustering
sponsored by Citrix
WHITE PAPER: One of the most critical parts of your network and data center are application delivery controllers. This guide explores the unique role that ADC plays for networking professionals and how they are utilizing them for their networks.
Posted: 03 Jan 2014 | Published: 03 Jan 2014

Citrix

9 reasons why Citrix NetScaler beats the competition
sponsored by Citrix
WHITE PAPER: Application delivery controllers (ADC) are a necessary tool for many IT departments today. This guide explores the Citrix NetScaler and 9 ways it can benefit your business.
Posted: 02 Jan 2014 | Published: 31 Dec 2012

Citrix

Achieve Mobile Delivery with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: This guide explores the importance of transmission control protocol, application delivery controllers and how they can boost your network performance, availability and security.
Posted: 02 Jan 2014 | Published: 31 Dec 2013

Citrix

A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Citrix

Why SIP Trunking Over Ethernet Makes Sense
sponsored by XO Communications
WHITE PAPER: This exclusive resource discusses how SIP trunking over Ethernet can help you maximize the value of your existing UC tools, improving scalability and efficiency while reducing overall costs.
Posted: 24 Jan 2014 | Published: 24 Jan 2014

XO Communications

Case Study: Norton Rose Fullbright Law Uses UC to Drive Collaboration
sponsored by NextPlane
CASE STUDY: This exclusive case study examines how a law firm was able to create a common platform that would support and enable immediate communications between partners and employees.
Posted: 23 Jan 2014 | Published: 23 Jan 2014

NextPlane

Managing Virtual Network Services: Lessons from Implementations
sponsored by Netsocket
EGUIDE: This expert guide from SearchCloudProvider.com highlights lessons from implementations and outlines three models of software-defined networking (SDN) as well as their basic goals, benefits and drawbacks.
Posted: 21 Jan 2014 | Published: 21 Jan 2014

Netsocket

Case Study - Stomo
sponsored by Riverbed Technology, Inc.
CASE STUDY: When STOMO underwent expansion, the additional data traffic generated put pressure on the company's wide area network. By deploying Steelhead appliances, STOMO has achieved annual savings of $13,000 by avoiding bandwidth upgrades, increased its optimized bandwidth capacity three-fold, and reduced network traffic by more than 70%.
Posted: 20 Jan 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Why IT Performance Is Strategic for Data Center Transformations
sponsored by Riverbed Technology, Inc.
WHITE PAPER: The reality today is that organizations have to transition their data center environments in order to remain competitive in a highly dynamic global market. It will be important to understand that the network will play a critical role in determining the success or failure of this process. Download now to learn more.
Posted: 20 Jan 2014 | Published: 28 Feb 2013

Riverbed Technology, Inc.

The Modes of Server Load Balancing
sponsored by A10 Networks
WEBCAST: Watch this webcast to uncover the 4 types of server load balancer integration methods, as well as the pros and cons for each, to help you decide which way best fits your organization's needs.
Posted: 14 Jan 2014 | Premiered: Jan 14, 2014

A10 Networks

Volvo IT Provides Fast Response on its WAN
sponsored by ORSYP
CASE STUDY: This exclusive case study discusses how an automobile company utilized a solution to reveal the attenuation of WAN links that increased latency on the IT network, allowing them to address the problem quickly and effectively. Read on to learn how you can achieve similar results.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

ORSYP

A Full-Service Network With Secure, Encrypted Communications
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this guide, discover how to design a full-service network with secure, encrypted communications with VPN technology.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Cisco Systems, Inc.

Application-Centric Networking
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this Lippis Report, learn how the Cisco ISR Application Experience Router helps you improve application speed, security, and control.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Cisco Systems, Inc.

Frost & Sullivan: Continuous Compliance and Next Generation NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Let's face it, cybercrime is growing and attacks are becoming far more prevalent. This guide explores the role of NAC in securing your network and how it is important to keep your network up-to-date as BYOD and mobility continue to rise.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

ForeScout Technologies, Inc.
176 - 200 of 623 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement