IT Management  >   Systems Operations  >   Network Management  >  

Network Performance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Optimization, Network Tuning, Network Performance Management, Performance
DEFINITION: Network coding is a method of optimizing the flow of digital data in a network by transmitting digital evidence about messages. The "digital evidence" is, itself, a composite of two or more messages. When the bits of digital evidence arrive at the destination, the transmitted message is deduced rather than directly reassembled.The concept of network coding was first introduced by R. W. Yeung  … 
Definition continues below.
Network Performance Reports
126 - 150 of 1024 Matches Previous Page  |  Next Page
Assuring Performance of Your F5 Infrastructure
sponsored by SevOne
WEBCAST: This video contains a simple explanation of how you can ensure the network performance of your F5 implementation.
Posted: 08 Mar 2016 | Premiered: Mar 8, 2016

SevOne

Why Most Performance Monitoring Architectures Don't Scale
sponsored by SevOne
WEBCAST: This webcast discusses the history of network performance management architectures, how the technology has evolved, where it's going, and the dangers of sticking with legacy monitoring technology.
Posted: 06 Mar 2016 | Premiered: Mar 4, 2016

SevOne

Keeping Quality of Service High Despite LTE Traffic Increases
sponsored by SevOne
WHITE PAPER: This white paper discusses ways that you can keep network costs down, even as the service you provide requires network speed to remain brisk while demands increase.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

SevOne

Threat Intelligence Services eGuide
sponsored by OpenDNS
EGUIDE: This guide introduces threat intelligence services in the enterprise, including typical models and features, and also deconstructs the incident response (IR) process to share what you can expect when you hire an IR provider to handle your ongoing crisis.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

OpenDNS

10 Metrics to Monitor in the LTE Network
sponsored by SevOne
WHITE PAPER: This white paper discusses the 10 metrics that you can monitor and collect in your LTE environment to ensure efficient delivery of services to your customers.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

SevOne

New Requirements for Performance Management Vendors
sponsored by SevOne
WHITE PAPER: This white paper discusses the next-generation performance monitoring tools that are providing data on every aspect of the application delivery chain, including network equipment, web servers, storage devices, and more.
Posted: 29 Feb 2016 | Published: 30 Sep 2015

SevOne

Achieving Operational Insight in SDN & NFV Environments
sponsored by SevOne
WHITE PAPER: This white paper addresses the new requirements for performance management, and explains why the traditional tools no longer apply to SDN and NFV infrastructures.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

SevOne

Analyze Bigger Data with Summarized Input
sponsored by Prelert
RESOURCE: This detailed blog post describes how an API engine for anomaly detection can achieve high performance with summarized input. Read on to find examples of how to write job configurations to send pre-summarized data to this API.
Posted: 25 Feb 2016 | Published: 17 Mar 2015

Prelert

Bringing Alert Management to the Present with Advanced Analytics
sponsored by Prelert
RESOURCE: This brief blog post explains how advanced machine learning analytics can filter out the background noise to identify and prioritize anomalies. Learn how this advanced analytics approach can empower you to identify problems before they impact the user experience.
Posted: 25 Feb 2016 | Published: 12 May 2015

Prelert

How Mobility is Affecting Wider Business Strategies
sponsored by Lenovo
RESOURCE: Recognizing the most popular choice for online browsing is the first step toward strategizing it. Learn how to align your mobile and business goals when you form clear deliverables and goals, create metrics, and more.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Lenovo

Top 5 Solution Requirements for Account Takeover Protection
sponsored by Imperva
WHITE PAPER: Download this playbook and learn five solution requirements for effective account takeover protection.
Posted: 12 Feb 2016 | Published: 30 Dec 2015

Imperva

Making the Internet Perform Like a Private Line
sponsored by Silver Peak
VIDEO: Discover a broadband WAN deployment strategy that provides private-line-like performance over the public Internet, giving you the reliability of a private MPLS network and the economics of broadband. Watch now to learn how you can experience the best of both worlds and cut costs by up to 90%.
Posted: 12 Feb 2016 | Premiered: 12 Feb 2016

Silver Peak

How to Modernize Your Branch and Remote Networks
sponsored by Aruba Networks
WHITE PAPER: This white paper explores how to evolve your remote and branch networks using integrated wireless, switching, and SD-WAN services. Learn how this strategy can help you cut down on complexity and costs, gain best possible performance, enable the move toward mobility, and more.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

Aruba Networks

A Case for Enterprise SDN: Making Your Network Programmable
sponsored by F5 Networks
WHITE PAPER: A software-defined network (SDN) can help you spend less time managing complexities. Access this infographic and discover the steps to a seamless integration between operations and the network.
Posted: 09 Feb 2016 | Published: 31 Mar 2014

F5 Networks

Why Manufacturers are Using the Cloud to Deliver Infosec
sponsored by OpenDNS
WEBCAST: In this webcast, review how Chart Industries, a global manufacturer with 5,000 employees and 45 locations, faced malicious activities every day and struggled to firefight data breaches.
Posted: 08 Feb 2016 | Premiered: Nov 20, 2015

OpenDNS

Anomaly Detection in Periodic Data
sponsored by Prelert
WHITE PAPER: This white paper examines how machine learning anomaly detection can cut through the vast amounts of periodicity to reveal the true abnormal and potentially malicious behavior within your network/systems. Read on and discover how to accurately locate deviations in expected network behavior.
Posted: 05 Feb 2016 | Published: 10 Apr 2015

Prelert

Excluding Frequent from Analysis for Smarter Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief resource delves into the art and science of whitelisting frequent entities to detect abnormalities faster and with greater ease. Read on and learn how to craft a dynamic whitelist for your threat detection strategy to never miss an abnormality or hidden attack again.
Posted: 05 Feb 2016 | Published: 04 May 2015

Prelert

Your Next Digital Security Guard Should be More like RoboCop
sponsored by Prelert
WHITE PAPER: In this white paper, discover how to use machine intelligence to patch major network security vulnerability gaps and mitigate human errors. Continue reading to learn how to identify abnormal and potentially malicious activity as it occurs.
Posted: 05 Feb 2016 | Published: 24 Jun 2015

Prelert

Making Software-Defined Security Work for Your Data Center
sponsored by NTT Com Security (UK) Ltd
WHITE PAPER: This white paper shows you the security advantages that micro-segmentation can offer your business. Learn the distinct advantages micro-segmentation delivered by virtualization has over physical data center networks.
Posted: 05 Feb 2016 | Published: 30 Dec 2015

NTT Com Security (UK) Ltd

Optimize Anomaly Detection: Insider Tips for Success
sponsored by Prelert
WHITE PAPER: This brief white paper teaches you how to properly backfill historical data to build baseline analyses for ongoing anomaly searches. View now for expert anomaly detection tips and tricks.
Posted: 04 Feb 2016 | Published: 06 Jul 2015

Prelert

Top UC Trends Impacting 2016
sponsored by Dimension Data
EGUIDE: This guide discusses the top 5 unified communications (UC) trends to watch in 2016. UC has undoubtedly entered the mainstream, but knowing the shape that deployments will take moving forward will lead to competitive advantage.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

Dimension Data

Maximize Cloud Benefits with Five Keys to Private Cloud Automation
sponsored by SPS Commerce, Inc.
EGUIDE: In this expert e-guide, discover how to maximize cloud benefits in your organization by uncovering the 5 keys to private cloud automation. Read on to access two bonus articles: learn how to maintain excellent private cloud network performance and application performance monitoring, as well as how to adopt a successful private cloud strategy.
Posted: 01 Mar 2016 | Published: 24 Feb 2016


Deploying Nagios Monitoring
sponsored by BigPanda
EGUIDE: In this technical guide you will learn how to integrate monitoring into your existing Nagios environment, and specifically how to set up remote server monitoring using remote host definitions that contain a specification for each individual service that needs monitoring. The advantage of this approach is the ease of deployment.
Posted: 24 Feb 2016 | Published: 18 Feb 2016

BigPanda

Case Study: Increasing Bandwidth and Security with Next-Gen Firewalls
sponsored by Fortinet, Inc.
CASE STUDY: In this white paper, learn how one leading UK university with 26,000 students increased network security protection with a next-gen firewall (NGFW).
Posted: 11 Feb 2016 | Published: 30 Dec 2014

Fortinet, Inc.

Protect Revenue and Emphasize User Experience with APM Tools
sponsored by eG Innovations, Inc.
EGUIDE: Looking to boost revenue and keep your customers happy with an improved user experience? Access this expert guide to learn how to leverage the latest in application performance management (APM) tools and discover a host of approaches to evaluate end-user experience across all channels.
Posted: 05 Feb 2016 | Published: 04 Feb 2016

eG Innovations, Inc.
126 - 150 of 1024 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORK PERFORMANCE DEFINITION (continued): …  and Z. Zhang in 1999 as an alternative to routing. In a traditional packet-switched network, data flows in defined, discrete "pieces" from the source to the destination like corpuscles in the bloodstream. At the transmitting station, the outgoing message is broken into packets, each of which contains some of the message data intact. The packets do not necessarily all travel along the same route but they all eventually arrive at the same destination, where the receiving computer reassembles them into the original message. The main problem with this method is that when the overall network … 
Network Performance definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement