IT Management  >   Systems Operations  >   Configuration Management  >  

Network Change and Configuration Management

RSS Feed    Add to Google    Add to My Yahoo!
Network Change and Configuration Management Reports
 
The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
Posted: 12 May 2014 | Published: 12 May 2014

Dell, Inc.

Data Center Interconnect Solutions for Large Enterprises
sponsored by Alcatel-Lucent
WHITE PAPER: Access this white paper to learn about the optimal technologies for DCI and data center connect solutions.
Posted: 29 Apr 2015 | Published: 31 Dec 2014

Alcatel-Lucent

Cost effective cloud backup and recovery model
sponsored by Asigra
WEBCAST: There's been a lot of talk about the recently launched Recovery License Model (RLM), but how does it work?  What does it mean to someone in the backup and recovery industry?
Posted: 11 Aug 2014 | Premiered: Dec 2, 2013

Asigra

Why SIP Trunking Over Ethernet Makes Sense
sponsored by XO Communications
WHITE PAPER: This exclusive resource discusses how SIP trunking over Ethernet can help you maximize the value of your existing UC tools, improving scalability and efficiency while reducing overall costs.
Posted: 24 Jan 2014 | Published: 24 Jan 2014

XO Communications

Virtualizing the Edge
sponsored by Netsocket
WHITE PAPER: This exclusive resource discusses an cloud-managed virtual network solution designed specifically for edge deployments that can provide top-notch network performance to distributed environments.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Netsocket

Extreme - IndentiFi
sponsored by Extreme Networks
WEBCAST: This exclusive webcast discusses wireless networking solution that allows your organization to provide your users with the wireless performance needed to seamlessly access critical applications and data, even if the workloads are media-intensive.
Posted: 03 Jun 2014 | Premiered: Jun 3, 2014

Extreme Networks

Case Study: Maricopa Region 911
sponsored by Talari Networks
CASE STUDY: This exclusive case study examines how a consortium of local municipalities was able to use a WAN virtualization solution to increase IP network resiliency and predictability, allowing the convergence of data and voice networks.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Talari Networks

How to Maximize Benefits of SIP Trunking for your Business
sponsored by XO Communications
EGUIDE: This expert guide from SearchUnifiedCommunications.com highlights how you can best use SIP trunking to reduce costs, focusing on two methods that are not commonly practiced.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

XO Communications

Wireless Solutions for Tablets and Smartphones
sponsored by Xirrus
WHITE PAPER: This exclusive paper examines a wireless networking solution that is designed to support a large number of end-user devices while providing high performance and connectivity. Read on to learn more.
Posted: 31 Oct 2013 | Published: 31 Oct 2013

Xirrus
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement