IT Management  >   Systems Operations  >   Network Management  >  

Network Performance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Optimization, Network Tuning, Network Performance Management, Performance
DEFINITION: Network coding is a method of optimizing the flow of digital data in a network by transmitting digital evidence about messages. The "digital evidence" is, itself, a composite of two or more messages. When the bits of digital evidence arrive at the destination, the transmitted message is deduced rather than directly reassembled.The concept of network coding was first introduced by R. W. Yeung  … 
Definition continues below.
Network Performance Reports
151 - 175 of 1006 Matches Previous Page  |  Next Page
Interroll Deploys Hybrid WAN with MPLS and Broadband
sponsored by Silver Peak
CASE STUDY: This case study discusses how one enterprise built a hybrid WAN with MPLS and broadband in order to dramatically reduce WAN costs and improve SaaS application performance.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

Silver Peak

2016 Security Predictions eBook
sponsored by WatchGuard Technologies, Inc.
EBOOK: Examine the 10 cybersecurity predictions for 2016 to prepare yourself for the attacks that are coming.
Posted: 15 Jan 2016 | Published: 15 Dec 2015

WatchGuard Technologies, Inc.

SD-WAN CIO Solution Brief
sponsored by Silver Peak
RESOURCE: This resource describes how you can implement a software-defined WAN as a way to revolutionize your existing network infrastructure and keep up with the pressures of the cloud.
Posted: 15 Jan 2016 | Published: 15 Jan 2016

Silver Peak

Assessing the Benefits of Application Delivery Optimization: An Expert E-Guide
sponsored by Citrix
EGUIDE: In this expert e-guide, you will discover how to meet your service-level agreements by optimizing your application delivery processes. Access this exclusive guide to improve throughput by preventing numerous round trips and multiplex multiple connections, and accelerate your app delivery to meet SLAs.
Posted: 14 Jan 2016 | Published: 14 Jan 2016

Citrix

Application Performance Management
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom will cover the evolution of application performance management and discuss how it can help networking managers avoid performance problems that reduces the productivity of both remote and office workers.
Posted: 30 Dec 2015 | Premiered: 09 Dec 2015

SearchNetworking.com

Extortion by DDoS Attacks
sponsored by IBM
WHITE PAPER: This white paper explores why DDoS attacks are a hacker's favorite, the types of DDoS attacks commonly used, how to recognize a DDoS extortion attack, and whether or not you should pay the ransom. Read on now to learn how to protect your enterprise with proven recommendations and mitigation techniques.
Posted: 18 Dec 2015 | Published: 09 Dec 2015

IBM

How to Assure Application Performance and QoS at Scale
sponsored by VMTurbo
WHITE PAPER: In this white paper, you will learn the benefits gained from incorporating network traffic and topology information in VM placement decisions—including increased application performance and enhanced QoS.
Posted: 03 Dec 2015 | Published: 03 Dec 2015

VMTurbo

New Buyers of SSL Certificates FAQs
sponsored by Symantec Website Security Solutions
WHITE PAPER: Industry analyst Chris Kissel presents and answers the top FAQs asked by new SSL certificate buyers to ease the purchasing process.
Posted: 09 Nov 2015 | Published: 14 Oct 2015

Symantec Website Security Solutions

Readying your Infrastructure for the Internet of Things
sponsored by F5 Networks
WHITE PAPER: In this white paper you will discover how the IoT will impact our daily lives moving forward. Read on to learn how early adopters of IoT technology have seen benefits like enhanced customer service and improved use of field assets and devise a strategy to reap similar benefits in your organization.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

F5 Networks

A Proactive Approach to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: Discover how to move to a proactive incident response model to stop cyber-attacks before they can steal data or harm your reputation. Read on and learn what steps to take to achieve proactive IR.
Posted: 08 Jan 2016 | Published: 19 Aug 2015

Blue Coat Systems

SSL/TLS Visibility: Determining Your Network Security Blind Spot Cost
sponsored by Blue Coat Systems
WHITE PAPER: This white paper will assist you in calculating the cost of leaving the SSL/TLS network security blind spot open to hackers and presents strategies to mitigate risks.
Posted: 08 Jan 2016 | Published: 16 Dec 2015

Blue Coat Systems

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and describes how encrypted traffic management can help mitigate these risks.
Posted: 07 Jan 2016 | Published: 09 Dec 2013

Blue Coat Systems

Assure Your Delivery of Quality UC Service with Network and Data Center Visibility
sponsored by NetScout Systems, Inc.
VIDEO: In this webcast, you will discover how to swiftly resolve problems that affect your UC with a service assurance platform that offers end-to-end networking and data center visibility. Tune in to pinpoint the cause of your UC problems by addressing voice and video media impairments.
Posted: 21 Dec 2015 | Premiered: 21 Dec 2015

NetScout Systems, Inc.

How to Analyze the SIP Failures in Your Network
sponsored by NetScout Systems, Inc.
VIDEO: VoIP is commonly thought of as making external connections via simple paths. The truth is that these paths are often complex. This brief video demonstrates how to improve visibility, drill into network issues and triage SIP failures.
Posted: 11 Dec 2015 | Premiered: 11 Dec 2015

NetScout Systems, Inc.

Analyzing WAN Congestion in UC & Converged Environments
sponsored by NetScout Systems, Inc.
WEBCAST: In this webcast, you will learn how to analyze and mitigate WAN congestion in your UC and converged communications environments via a service platform. View now to access a network application monitoring platform that will allow you to visualize link performance, identify service quality degradation, and more.
Posted: 04 Dec 2015 | Premiered: Dec 4, 2015

NetScout Systems, Inc.

An Introduction to Triaging Voice and Video Quality of Service Issues
sponsored by NetScout Systems, Inc.
WEBCAST: In this brief webcast, you will experience a short demonstration of a reactive network workflow, illustrating how to triage voice and video problems. Tune in now to get a first-hand look at solving your VoIP and video QoS issues, and restore your service to premium quality without misstep.
Posted: 03 Dec 2015 | Premiered: Dec 3, 2015

NetScout Systems, Inc.

Transcript: Continuous Testing: How to streamline Citrix Performance, Regression, and Security Testing
sponsored by Citrix and NRG Global
TRANSCRIPT: This transcript reveals how you can use a continuous testing strategy to incorporate any alterations into your environment quickly and with confidence.
Posted: 01 Dec 2015 | Published: 01 Dec 2015

Citrix and NRG Global

Case Study: Save Money and Speed Application Performance
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Learn why failing to make necessary upgrades to slow application performance could threaten business success.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Riverbed Technology, Inc.

How to Provide Accelerated Triage for Cisco UC/Jabber
sponsored by NetScout Systems, Inc.
PRODUCT OVERVIEW: In this brief resource, you will learn how to improve your UC service delivery and IT collaboration with a UC server, complete with real-time call quality performance monitoring.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

NetScout Systems, Inc.

Enable Your IT to Ensure Signaling and Voice Quality for UC and Collaboration
sponsored by NetScout Systems, Inc.
CASE STUDY: In this case study, discover how a national insurance company leveraged advanced voice statistics to uncover QoS configuration errors in their unified communications and optimized Microsoft Lync delivery.
Posted: 18 Nov 2015 | Published: 18 Nov 2015

NetScout Systems, Inc.

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: Learn how to uncover the what, when, and how of security incidents to fortify your security strategy against increasingly sophisticated attacks. Examine the shortcomings of conventional breach investigation approaches and how to build intelligence to navigate investigations faster and easier in this helpful whitepaper.
Posted: 12 Nov 2015 | Published: 14 Apr 2014

IBM

Superior Network Service Provisioning and Performance
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: This whitepaper dives into one possible network solution that claims to deliver scalable network capabilities that can gracefully handle even the most demanding applications. Make wait time a thing of the past, and unleash your applications with the right infrastructure to support them.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Cisco Systems, Inc and Citrix

Application Infrastructures That Make Updates Easy
sponsored by Cisco Systems, Inc and Citrix
VIDEO: This in-depth video discusses the advantages of one system that steps up to the plate when it comes to scalable networking and application upgrading. Access now to learn how you can streamline and simplify your processes, ultimately slashing project costs.
Posted: 05 Nov 2015 | Premiered: 05 Nov 2015

Cisco Systems, Inc and Citrix

Solidify Your Network Protection with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper you will learn the ins and outs of deploying an ISFW. Learn how to protect your company from the latest advanced security threats and compartmentalize access to sensitive data and apps.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.
151 - 175 of 1006 Matches Previous Page    5 6 7 8 9 10    Next Page
 
NETWORK PERFORMANCE DEFINITION (continued): …  and Z. Zhang in 1999 as an alternative to routing. In a traditional packet-switched network, data flows in defined, discrete "pieces" from the source to the destination like corpuscles in the bloodstream. At the transmitting station, the outgoing message is broken into packets, each of which contains some of the message data intact. The packets do not necessarily all travel along the same route but they all eventually arrive at the same destination, where the receiving computer reassembles them into the original message. The main problem with this method is that when the overall network … 
Network Performance definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement