IT Management  >   Systems Operations  >   Network Management  >  

Network Performance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Optimization, Network Tuning, Network Performance Management, Performance
DEFINITION: Network coding is a method of optimizing the flow of digital data in a network by transmitting digital evidence about messages. The "digital evidence" is, itself, a composite of two or more messages. When the bits of digital evidence arrive at the destination, the transmitted message is deduced rather than directly reassembled.The concept of network coding was first introduced by R. W. Yeung  … 
Definition continues below.
Network Performance Reports
1 - 25 of 1017 Matches Previous Page  |  Next Page
SD-WAN Securely Delivers a Consistent User Experience
sponsored by Citrix
VIDEO: This short video shows a user maintaining security while demonstrating network performance despite deteriorating conditions. You'll see how an SD-WAN can make up for failures in your MPLS.
Posted: 30 Aug 2016 | Premiered: 19 Aug 2016

Citrix

Point/Counterpoint: YANG versus TOSCA
sponsored by Ciena
APPLICATION NOTE: As SDN and NFV take hold, confusion is growing among developers and network operators. Access this application note to learn about a network virtualization and service orchestration software that removes complexity by leveraging a number of information models and orchestration tools that benefit virtual environments.
Posted: 29 Aug 2016 | Published: 31 May 2016

Ciena

SDN and NFV are Changing the Game
sponsored by Ciena
WHITE PAPER: Network operators are still struggling to meet performance, availability, and bandwidth demands, due to the inherent deficiencies of legacy platforms and technologies. Access this white paper to learn about how you can meet network demands by implementing a SDN and NFV at your business.
Posted: 29 Aug 2016 | Published: 24 May 2016

Ciena

A 6-Step Guide to Getting Started with Network Automation
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper features a six-step guide to getting started with network automation. Read on to find an outline of the processes involved in planning for automation, how different areas of business can benefit, and how to ensure the tools and partners you've selected are the right ones.
Posted: 22 Aug 2016 | Published: 22 Aug 2016

Juniper Networks, Inc.

How to Make Your WAN Architecture Software-Defined
sponsored by Citrix
EGUIDE: This e-guide highlights how to choose the right SD-WAN for your needs. Discover how to analyze the vast array of SD-WAN vendors by isolating your particular needs, and uncover insight into securing and deploying the SD-WAN tool that will meet your goals.
Posted: 18 Aug 2016 | Published: 16 Aug 2016

Citrix

Deliver a Complete NFV Infrastructure through Collaboration, Integration, and Certification
sponsored by Red Hat
EBOOK: Legacy infrastructures can't keep with increasing data traffic demands, creating a major challenge for communications service providers. Explore network functions virtualization as a method for introducing more flexibility, efficiency, and scalability to your infrastructure.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

Red Hat

IT Battles the Top Three Mobile Security Threats
sponsored by Hewlett Packard - Intel Xeon
EGUIDE: Learn about 3 mobile security threats facing IT managers and security experts today. Access now to learn what best practices are being deployed to face the rapidly growing danger to your mobile devices.
Posted: 16 Aug 2016 | Published: 11 Aug 2016

Hewlett Packard - Intel Xeon

SD-WAN Helps Secure Hybrid Networks
sponsored by Citrix
EGUIDE: SD-WAN enables enterprises to create hybrid networks. But many network engineers eyeing hybrid WAN architectures are asking themselves the question: It can't be as safe as running on MPLS, right? Access this expert e-guide to learn about SD-WAN platforms' security features that finally make hybrid networks secure enough for widespread use.
Posted: 15 Aug 2016 | Published: 12 Aug 2016

Citrix

SunRice Reboots Their Cyberthreat Defense & ROBO Network Security
sponsored by Palo Alto Networks
CASE STUDY: In this case study, SunRice illustrates how to leverage a centralized security policy management platform to bolster cyber-threat defense and improve visibility of network infrastructure. Access now to streamline network security management and learn how to consolidate outdated legacy appliances.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

Palo Alto Networks

Incident Response with NetFlow for Dummies
sponsored by Cisco Systems, Inc.
EBOOK: Security incidents are critical times for information security pros, with the time period after the first identifications having a big impact on the incident's severity. Access this e-book to learn how to align your incident response processes with industry-standard practices and how to enhance your technical capabilities.
Posted: 15 Aug 2016 | Published: 31 Dec 2014

Cisco Systems, Inc.

The 11 EMM Providers That Matter Most And How They Stack Up
sponsored by vmware airwatch
WHITE PAPER: Selecting the right partner for your enterprise mobile management (EMM) can be extremely difficult. An array of vendors exists that widely varies in both offerings and overall quality. Access this report that provides an evaluation of the 11 most significant EMM vendors (based on 25-criteria) to ensure you make the best decision.
Posted: 15 Aug 2016 | Published: 31 Dec 2015

vmware airwatch

Simplify your Virtual Data Center Network by Moving to the Cloud
sponsored by Red Hat
WHITE PAPER: To simplify operations, your data center network must be as agile as your virtual server and storage infrastructure. Discover ways software-defined networking-based cloud tools create nimble, flexible networks.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Red Hat

Securing Cloud Environments: Policy-Based Security Automation and Microsegmentation Overview
sponsored by Nokia
WHITE PAPER: If you're not enabling your SDN with a virtualized services platform then you may not be able to meet the networking and security challenges imposed by the cloud. Access this white paper that highlights how you can extend the benefits of SDN from networking to security policy management and orchestration, ensuring success in the cloud.
Posted: 10 Aug 2016 | Published: 31 Dec 2015

Nokia

Centuries Young Bank Readies for Another Century of Progress
sponsored by Nokia
CASE STUDY: Centuries Young Bank's long-term vision could only be realized with a move to a private cloud. This case study details the construction of their new network architecture through strategic vendors to make the transition. Access now to learn about these vendors and the virtualized services platform that overlays and unifies Century Young's cloud.
Posted: 10 Aug 2016 | Published: 31 Dec 2015

Nokia

Korean Company “Conglomerates” a Private Cloud
sponsored by Nokia
CASE STUDY: A company that is part of the third-largest conglomerate in South Korea wanted to transition from hosting to a private cloud environment. Access this case study to learn how this company was able to take a new approach to cloud hosting by employing virtualized services that enabled full software-defined networking capabilities.
Posted: 10 Aug 2016 | Published: 31 Dec 2015

Nokia

The Most Important Things You Need to Know About Enterprise Mobility Management
sponsored by IBM MaaS360
WEBCAST: Today, employees are using their devices to access corporate data and using company devices to access personal data. This usage presents new security risks that call for an integrated, comprehensive policy for managing mobile devices. View this webinar that discusses the mobile workplace and how to construct an effective and secure mobile policy.
Posted: 09 Aug 2016 | Premiered: Jun 30, 2016

IBM MaaS360

Enterprise Mobility: How Mobile Device Management Exploded to Include Devices, Apps and Content
sponsored by IBM MaaS360
WHITE PAPER: Today, nearly every enterprise works with mobile devices, but few know how to maximize their potential. So, how do you turn mobility into a valued asset? Access this white paper to learn about workplace mobility and how to successfully implement a unified mobile policy.
Posted: 09 Aug 2016 | Published: 31 Mar 2016

IBM MaaS360

Common Hyper-Converged Network Concerns and Solutions
sponsored by NTT ICT
EGUIDE: Do your apps require either very high or very specific performance? Discover in this expert guide how to identify and resolve hyper-converged networking bottlenecks by implementing a dedicated storage network and examining how data is stored within your architecture.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

NTT ICT

Why Micro-Segmentation Matters Now
sponsored by VMware
WHITE PAPER: Cybercriminals count on the fact that data center security is still based on a penetrable, hardware-centric model. Access this white paper to learn how the advent of network virtualization empowered by micro-segmentation changes the economics, ease and speed of data center security, eliminating long-standing vulnerabilities.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

VMware

Understanding the Differences Between Network Virtualization and Software-Defined Networking
sponsored by VMware
ESSENTIAL GUIDE: If you've been researching how to make changes to your network, then you've heard about software-defined networking (SDN) and network virtualization.They might sound alike—but they aren't the same thing. Access this essential guide to learn about these two approaches to networking and their key differences.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

VMware

What is Network Virtualization and Why Do You Need It Now?
sponsored by VMware
WHITE PAPER: 88% of survey respondents insist that it's "important" or "mission critical" to adopt a network virtualization solution in the next 2 to 5 years. Access this white paper to learn about network virtualization and why it has become an enterprise necessity.
Posted: 05 Aug 2016 | Published: 01 Jul 2016

VMware

The True Impact of Tags: IT’s Guide to Third Party Monitoring
sponsored by Catchpoint Systems Inc.
WHITE PAPER: This resource addresses the impact various third parties have on enterprise sites. You'll learn about the challenges IT/Ops faces in order to meet both business and performance expectations.
Posted: 05 Aug 2016 | Published: 05 Aug 2016

Catchpoint Systems Inc.

Computer Weekly – 9 August 2016: Will Rio's 4G sink or swim?
sponsored by ComputerWeekly.com
EZINE: The Rio Olympic games are meant to be the fastest Games ever – not just for the athletes, but also for mobile data speeds. Users will want to upload photos and videos in real time. In this week's Computer Weekly, we investigate how operators are working round Brazil's patchy 4G. We also find out how Glasgow's smart city initiatives are evolving.
Posted: 05 Aug 2016 | Published: 09 Aug 2016

ComputerWeekly.com

Test Report: CloudBridge WAN Optimization Evaluation
sponsored by Citrix
WHITE PAPER: Discover the capacity of one WAN optimization tool in this third-party test report. Inside you'll learn specifically about how you can master your WAN environment.
Posted: 29 Jul 2016 | Published: 29 Jul 2016

Citrix

The New WAN: How SDN Changes Wide Area Network Operations
sponsored by Citrix
EGUIDE: This e-guide discusses why network professionals should be rethinking the functions of their WAN, and how to approach the new technology coming to remake the WAN landscape.
Posted: 16 Aug 2016 | Published: 12 Aug 2016

Citrix
1 - 25 of 1017 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK PERFORMANCE DEFINITION (continued): …  and Z. Zhang in 1999 as an alternative to routing. In a traditional packet-switched network, data flows in defined, discrete "pieces" from the source to the destination like corpuscles in the bloodstream. At the transmitting station, the outgoing message is broken into packets, each of which contains some of the message data intact. The packets do not necessarily all travel along the same route but they all eventually arrive at the same destination, where the receiving computer reassembles them into the original message. The main problem with this method is that when the overall network … 
Network Performance definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement