IT Management  >   Systems Operations  >   Network Management  >  

Network Performance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Optimization, Network Tuning, Network Performance Management, Performance
DEFINITION: Network coding is a method of optimizing the flow of digital data in a network by transmitting digital evidence about messages. The "digital evidence" is, itself, a composite of two or more messages. When the bits of digital evidence arrive at the destination, the transmitted message is deduced rather than directly reassembled.The concept of network coding was first introduced by R. W. Yeung  … 
Definition continues below.
Network Performance Reports
101 - 125 of 976 Matches Previous Page  |  Next Page
10 Metrics to Monitor in the LTE Network
sponsored by SevOne
WHITE PAPER: Did you know that deployment of LTE increases dependency on your underlying network? Discover in this white paper the 10 metrics which you should monitor and collect in your LTE network to ensure efficient delivery of services to your customers.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

SevOne

New Requirements for Performance Management Vendors
sponsored by SevOne
WHITE PAPER: This white paper discusses the next-generation performance monitoring tools that are providing data on every aspect of the application delivery chain, including network equipment, web servers, storage devices, and more.
Posted: 29 Feb 2016 | Published: 30 Sep 2015

SevOne

Achieving Operational Insight in SDN & NFV Environments
sponsored by SevOne
WHITE PAPER: This white paper addresses the new requirements for performance management, and explains why the traditional tools no longer apply to SDN and NFV infrastructures.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

SevOne

Analyze Bigger Data with Summarized Input
sponsored by Prelert
RESOURCE: This detailed blog post describes how an API engine for anomaly detection can achieve high performance with summarized input. Read on to find examples of how to write job configurations to send pre-summarized data to this API.
Posted: 25 Feb 2016 | Published: 17 Mar 2015

Prelert

Bringing Alert Management to the Present with Advanced Analytics
sponsored by Prelert
RESOURCE: This brief blog post explains how advanced machine learning analytics can filter out the background noise to identify and prioritize anomalies. Learn how this advanced analytics approach can empower you to identify problems before they impact the user experience.
Posted: 25 Feb 2016 | Published: 12 May 2015

Prelert

How Mobility is Affecting Wider Business Strategies
sponsored by Lenovo
RESOURCE: Recognizing the most popular choice for online browsing is the first step toward strategizing it. Learn how to align your mobile and business goals when you form clear deliverables and goals, create metrics, and more.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Lenovo

How to Modernize Your Branch and Remote Networks
sponsored by Aruba Networks
WHITE PAPER: This white paper explores how to evolve your remote and branch networks using integrated wireless, switching, and SD-WAN services. Learn how this strategy can help you cut down on complexity and costs, gain best possible performance, enable the move toward mobility, and more.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

Aruba Networks

A Case for Enterprise SDN: Making Your Network Programmable
sponsored by F5 Networks
WHITE PAPER: A software-defined network (SDN) can help you spend less time managing complexities. Access this infographic and discover the steps to a seamless integration between operations and the network.
Posted: 09 Feb 2016 | Published: 31 Mar 2014

F5 Networks

Anomaly Detection in Periodic Data
sponsored by Prelert
WHITE PAPER: This white paper examines how machine learning anomaly detection can cut through the vast amounts of periodicity to reveal the true abnormal and potentially malicious behavior within your network/systems. Read on and discover how to accurately locate deviations in expected network behavior.
Posted: 05 Feb 2016 | Published: 10 Apr 2015

Prelert

Excluding Frequent from Analysis for Smarter Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief resource delves into the art and science of whitelisting frequent entities to detect abnormalities faster and with greater ease. Read on and learn how to craft a dynamic whitelist for your threat detection strategy to never miss an abnormality or hidden attack again.
Posted: 05 Feb 2016 | Published: 04 May 2015

Prelert

Your Next Digital Security Guard Should be More like RoboCop
sponsored by Prelert
WHITE PAPER: In this white paper, discover how to use machine intelligence to patch major network security vulnerability gaps and mitigate human errors. Continue reading to learn how to identify abnormal and potentially malicious activity as it occurs.
Posted: 05 Feb 2016 | Published: 24 Jun 2015

Prelert

Making Software-Defined Security Work for Your Data Center
sponsored by NTT Com Security (UK) Ltd
WHITE PAPER: This white paper shows you the security advantages that micro-segmentation can offer your business. Learn the distinct advantages micro-segmentation delivered by virtualization has over physical data center networks.
Posted: 05 Feb 2016 | Published: 30 Dec 2015

NTT Com Security (UK) Ltd

Optimize Anomaly Detection: Insider Tips for Success
sponsored by Prelert
WHITE PAPER: This brief white paper teaches you how to properly backfill historical data to build baseline analyses for ongoing anomaly searches. View now for expert anomaly detection tips and tricks.
Posted: 04 Feb 2016 | Published: 06 Jul 2015

Prelert

Ponemon Study Finds IT Security Not Prepared for Advanced Attacks
sponsored by Prelert
WHITE PAPER: This white paper examines how security vulnerabilities compile when you ignore your organization's threat intelligence strategy. View now to learn the top network threats and how to detect them faster by enhancing threat intelligence.
Posted: 04 Feb 2016 | Published: 28 Oct 2015

Prelert

Trend Estimation for Time Series Anomaly Detection
sponsored by Prelert
WHITE PAPER: This in-depth white paper teaches you how to properly use trend estimation for anomaly detection to improve your network security. Continue reading to learn how to avoid the most common difficulties of accurate automatic anomaly detection.
Posted: 03 Feb 2016 | Published: 05 Jan 2016

Prelert

Cyberthreat Defense Report: Malware Tops the Charts
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, find out how to identify, contain, and remediate unknown threats through real-time analysis. Discover how to close SSL blind spots and secure mobile devices and remote access endpoints inside.
Posted: 03 Feb 2016 | Published: 25 Feb 2015

Blue Coat Systems

See, Understand, and Swiftly Respond to Advance Threats
sponsored by Blue Coat Systems
WHITE PAPER: With more than 200,000 new malware samples appearing every day, it is imperative that you have the ability to see everything going in and out of your network. This white paper stresses the importance of network visibility and how real-time analysis enables you to see, understand, and respond to emerging and incoming security threats.
Posted: 03 Feb 2016 | Published: 16 Apr 2014

Blue Coat Systems

Protect your Network with Effective Incident Response
sponsored by Blue Coat Systems
WEBCAST: For a holistic view of security, organizations need effective incident response. Watch this videocast to find a demo on comprehensive network forensics.
Posted: 02 Feb 2016 | Premiered: Dec 8, 2015

Blue Coat Systems

Major Government Defense Contractor Speeds Incident Response
sponsored by Blue Coat Systems
CASE STUDY: This case study details how one major government defense contractor lacked network visibility and continuously suffered from security incidents and closed their gaps by implementing analytics. Are analytics necessary for your organization? Read on to find out.
Posted: 02 Feb 2016 | Published: 20 Aug 2015

Blue Coat Systems

Partitioning vs. "Split By" Clause in Anomaly Detection
sponsored by Prelert
WHITE PAPER: This white paper points out the finer differences between anomaly detection approaches and how each affects your anomaly score. Read on to learn which strategy will enhance your network security.
Posted: 02 Feb 2016 | Published: 20 Jul 2015

Prelert

Behavioral Analytics: Telling the Stories Hidden in IT Security and Operations Data
sponsored by Prelert
WEBCAST: In this webcast, learn how to go beyond anomaly detection with behavioral analytics and insights. Discover how to investigate commonalities between anomalies to better understand and identify potential threats.
Posted: 02 Feb 2016 | Premiered: Jan 27, 2016

Prelert

Behavioral Analytics: Let Your Data Tell the Story
sponsored by Prelert
WEBCAST: In this brief webcast, learn how to analyze log data, find anomalies, and like them together faster. Uncover the steps to understand not only what happened in an incident, but how it happened as well. View now to learn more.
Posted: 02 Feb 2016 | Premiered: Jan 20, 2016

Prelert

Deploying Nagios Monitoring
sponsored by BigPanda
EGUIDE: In this technical guide you will learn how to integrate monitoring into your existing Nagios environment, and specifically how to set up remote server monitoring using remote host definitions that contain a specification for each individual service that needs monitoring. The advantage of this approach is the ease of deployment.
Posted: 24 Feb 2016 | Published: 18 Feb 2016

BigPanda

Case Study: Increasing Bandwidth and Security with Next-Gen Firewalls
sponsored by Fortinet, Inc.
CASE STUDY: In this white paper, learn how one leading UK university with 26,000 students increased network security protection with a next-gen firewall (NGFW).
Posted: 11 Feb 2016 | Published: 30 Dec 2014

Fortinet, Inc.

Protect Revenue and Emphasize User Experience with APM Tools
sponsored by eG Innovations, Inc.
EGUIDE: Looking to boost revenue and keep your customers happy with an improved user experience? Access this expert guide to learn how to leverage the latest in application performance management (APM) tools and discover a host of approaches to evaluate end-user experience across all channels.
Posted: 05 Feb 2016 | Published: 04 Feb 2016

eG Innovations, Inc.
101 - 125 of 976 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK PERFORMANCE DEFINITION (continued): …  and Z. Zhang in 1999 as an alternative to routing. In a traditional packet-switched network, data flows in defined, discrete "pieces" from the source to the destination like corpuscles in the bloodstream. At the transmitting station, the outgoing message is broken into packets, each of which contains some of the message data intact. The packets do not necessarily all travel along the same route but they all eventually arrive at the same destination, where the receiving computer reassembles them into the original message. The main problem with this method is that when the overall network … 
Network Performance definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement