IT Management  >   Systems Operations  >   Network Management  >  

Network Performance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Optimization, Network Tuning, Network Performance Management, Performance
DEFINITION: Network coding is a method of optimizing the flow of digital data in a network by transmitting digital evidence about messages. The "digital evidence" is, itself, a composite of two or more messages. When the bits of digital evidence arrive at the destination, the transmitted message is deduced rather than directly reassembled.The concept of network coding was first introduced by R. W. Yeung  … 
Definition continues below.
Network Performance Reports
176 - 200 of 978 Matches Previous Page  |  Next Page
SD-WAN: Building a Virtual WAN
sponsored by Silver Peak
WEBCAST: Access this short video to learn how a software-defined WAN can improve your ability to connect users to applications in a business driven by cloud and mobile technologies.
Posted: 07 Jul 2015 | Premiered: Jun 15, 2015

Silver Peak

Improve Competitiveness with Software-Defined Wide Area Networks
sponsored by Silver Peak
WHITE PAPER: This white paper outlines the challenges of MPLS–based WANs compared to the benefits of SD-WANs. Read on to learn how you can achieve greater agility, decreased costs, increased performance, and more so that you can be ready for the next generation of IT.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Silver Peak

How Virtual Network Services Impact the Software-Defined Data Center
sponsored by Silver Peak
WHITE PAPER: Access this white paper to discover how various virtual network services like workload acceleration give you the performance, flexibility and control you need to keep up with the agile business world.
Posted: 05 May 2015 | Published: 05 May 2015

Silver Peak

Mission Critical Apps in the Cloudand New Connectivity Challenges
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Learn why any company considering cloud migration needs to closely consider network performance between users, applications and their cloud services. Read now to explore the role of private networks in providing a consistent user experience.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

Level 3 Communications, Inc.

Efficient Cloud Connectivity Ensures Optimal Cloud Computing
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This white paper explains the attraction to the cloud, and why many enterprises are now migrating their internal data center infrastructure and business applications to public and private clouds.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

Level 3 Communications, Inc.

Quickly Scaling Healthcare Applications
sponsored by Array Networks
CASE STUDY: This case study explains how one healthcare organization was able to ensure application availability while consolidating its cloud-hosted application infrastructure in order to improve user experience.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Array Networks

The Economics of Defense: Modeling Security Investments Against Risk
sponsored by Juniper Networks, Inc.
WHITE PAPER: There are a number of factors to take into account when building, or modifying, your cybersecurity strategy – and inside this report, take a look at 5 drivers that influence the costs of cybersecurity.
Posted: 08 Sep 2015 | Published: 08 Sep 2015

Juniper Networks, Inc.

Quick Guide to Network Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief white paper details the two types of anomaly scores and how they are manifested. Continue reading now to learn how to use each score as an indicator for proactive alerting.
Posted: 10 Aug 2015 | Published: 30 Jul 2015

Prelert

Zero-Touch Branch Deployment
sponsored by Fatpipe, Inc.
WHITE PAPER: Looking for easy migration to hybrid WAN? This white paper highlights how to centrally control your WAN, manage branch office configuration and deploy appliances with zero-touch installation.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Fatpipe, Inc.

Detecting Hidden Network Attacks Before a Breach
sponsored by Prelert
WHITE PAPER: This white paper explores a proactive approach to mitigating modern day cyber security threats and detecting attacks as they enter the network.
Posted: 07 Aug 2015 | Published: 15 Jul 2015

Prelert

Sandboxing: Is it the Network Security Savior?
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores how sandboxing, when combined with next-gen firewalls and endpoint security, mitigates unknown threats.
Posted: 15 Jun 2015 | Published: 27 May 2015

Fortinet, Inc.

Computer Weekly – 16 June 2015: What's slowing down your network and how to fix it
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, network performance problems are a common occurrence – we look at the likely causes and the way to fix them. Our latest buyer's guide takes a focus on DevOps, the combining of agile operational and development processes. And we find out how Apache Spark can help with real-time big data analytics. Read the issue now.
Posted: 15 Jun 2015 | Published: 15 Jun 2015

ComputerWeekly.com

Assessing the Potential of Your Private Cloud Network, Inside and Out
sponsored by Dell EMC and Microsoft
EGUIDE: Access this e-guide to review the current trends in network infrastructure and see how to brace for future disaster with failover technologies
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Dell EMC and Microsoft

The WAN Waiting Game: Can You Get New Connections Faster?
sponsored by SearchNetworking.com
EZINE: In this resource, you'll learn to assess your networking resources to see if they are working as well as they possibly can.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

SearchNetworking.com

Get a Closer Look at Security Alerts
sponsored by Prelert
WEBCAST: Watch this webinar to discover how anomaly detection can update your IT for today's security environment.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Long-Distance IT: Driving Efficiency in Remote Offices
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at increasing the efficiency of IT in remote offices. Read on to learn more.
Posted: 02 Jan 2015 | Published: 02 Jan 2015

Citrix

Putting Network Security Into Context
sponsored by SearchNetworking.com
EBOOK: Today's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps. The technology is there to achieve this, but does your team have the skills and resources necessary to configure and maintain it? Access this handbook now to find out.
Posted: 12 Nov 2014 | Published: 14 Nov 2013

SearchNetworking.com

WAN Aggregation: Shaking Enterprise Reliance on MPLS
sponsored by Talari_DON'T USE
EGUIDE: This expert e-guide highlights the capabilities of WAN aggregation tools and how vendors are stepping up their game.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Talari_DON'T USE

Turning Your Network into a Strategic Business Asset
sponsored by Extreme Networks
EBOOK: This eBook introduces a network-based business intelligence solution that captures and analyzes context-based application traffic to deliver meaningful information about applications, users, locations and devices.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Extreme Networks

Expert FAQs: Application Delivery, Optimization and Performance
sponsored by A10 Networks
EGUIDE: In this IT decision center guide, get the expert answers to frequently asked questions about application delivery, optimization and performance and learn how one vendor is addressing this vital market.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

A10 Networks

Resolve Performance Issues Within Your Citrix XenApp Environment
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper introduces an innovative application performance management technology that could be very valuable to IT professionals who frequently troubleshoot performance issues across a Citrix server, saving time and taking the guesswork out of the analysis.
Posted: 04 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Enabling Ubiquitous Visibility in Virtualized Enterprises
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper discusses the lack of visibility in the context of monitoring and troubleshooting end-to-end application performance and introduces one company's network performance management solution.
Posted: 04 Aug 2014 | Published: 31 Dec 2012

Riverbed Technology, Inc.

How to Make Apps Run More Efficiently in the Age of the Cloud
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper details many of the issues that applications operations staff currently face; explains the requirements that today's applications operations groups have for an application performance management solution; and lists a number of suggestions for organizations currently choosing between APM solutions.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

10 Ways for Developers to Benefit from Application Performance Management Solutions
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper covers ten key strategies for developers looking to improve the quality and performance of their software through application management (APM) solutions.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

10 Common Problems that Application Performance Management Helps You Solve
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper breaks down the top ten quality and performance issues that application performance management can help to solve by detecting applications' performance problems and their causes.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.
176 - 200 of 978 Matches Previous Page    6 7 8 9 10 11    Next Page
 
NETWORK PERFORMANCE DEFINITION (continued): …  and Z. Zhang in 1999 as an alternative to routing. In a traditional packet-switched network, data flows in defined, discrete "pieces" from the source to the destination like corpuscles in the bloodstream. At the transmitting station, the outgoing message is broken into packets, each of which contains some of the message data intact. The packets do not necessarily all travel along the same route but they all eventually arrive at the same destination, where the receiving computer reassembles them into the original message. The main problem with this method is that when the overall network … 
Network Performance definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement