IT Management  >   Systems Operations  >   Network Management  >  

Network Performance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Optimization, Network Tuning, Network Performance Management, Performance
DEFINITION: Network coding is a method of optimizing the flow of digital data in a network by transmitting digital evidence about messages. The "digital evidence" is, itself, a composite of two or more messages. When the bits of digital evidence arrive at the destination, the transmitted message is deduced rather than directly reassembled.The concept of network coding was first introduced by R. W. Yeung  … 
Definition continues below.
Network Performance Reports
76 - 100 of 907 Matches Previous Page  |  Next Page
Simplified Network Security  in 90 Seconds
sponsored by OpenDNS
WEBCAST: View this webcast to learn how to protect users on any device in any location from today's top network security threats such as malware and phishing attacks.
Posted: 14 Oct 2015 | Premiered: Jun 30, 2012

OpenDNS

Speed Up Incident Response and Reveal Malicious IP Sources
sponsored by OpenDNS
WHITE PAPER: This breif white paper outlines how to gain great visibility and control over network traffic to uncover sophisticated threats.
Posted: 09 Oct 2015 | Published: 30 Sep 2015

OpenDNS

Securing Direct-To-Internet Branch Offices
sponsored by OpenDNS
WHITE PAPER: In this white paper, discover how to protect direct-to-internet traffic in remote/branch offices. Access this resource and examine if as-a-service offerings are the key to bridging the gap between performance and security for remote office workers.
Posted: 08 Oct 2015 | Published: 15 Jul 2015

OpenDNS

Enhance Security Visibility to Improve Incident Response and Compliance
sponsored by OpenDNS
WHITE PAPER: In this white paper, explore the limitations of traditional security log measures such as firewalls, AD, and web proxies and why it's imperative to gain complete visibility over DNS and your network. View now to learn how to eliminate network security blind spots and enable your SIEM to detect masked cybersecurity threats.
Posted: 08 Oct 2015 | Published: 30 Sep 2015

OpenDNS

Understand The Anatomy of Attacks to Stay One Step Ahead
sponsored by OpenDNS
WHITE PAPER: In this white paper, learn the 7 (often repetitive) steps of a cybersecurity attack. View now to learn how to leverage DNS to gain east-west visibility into your network and stop hidden attacks before your data is compromised.
Posted: 08 Oct 2015 | Published: 02 Sep 2015

OpenDNS

WAN Management and Configuration
sponsored by Citrix
EGUIDE: This e-guide will help you approach enterprise WAN optimization with orchestration in mind, in order to speed up the process and make it more efficient.
Posted: 02 Oct 2015 | Published: 02 Oct 2015

Citrix

SD-WAN’s Impact On the Enterprise and the New Cloud Network
sponsored by Citrix
EGUIDE: Access this expert e-guide to learn how SD-WAN is becoming the next breed of WAN optimization. Discover how this differs from traditional networking and the potential impact on enterprises.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Citrix

Turning APM into an IT Detective
sponsored by CA Technologies.
WHITE PAPER: This white paper shows you how you can make sure that your APM solutions are deployed optimally in your network.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

CA Technologies.

Secure Enterprise Applications on All Your Users' Mobile Devices
sponsored by VMware
WHITE PAPER: This white paper highlights a cloud service designed to help organizations leverage O365 on their mobile devices. Discover how to secure all company apps both cloud and on-premise and accelerate enterprise mobility.
Posted: 18 Sep 2015 | Published: 31 Jan 2014

VMware

Wan Virtualization: Scaling Bandwidth and Increasing Application Reliability
sponsored by Citrix
WHITE PAPER: This white paper provides an overview of a cloud-based, WAN virtualization solution that will improve the performance and reliability of business critical applications such as VDI, application virtualization, VoIP, video conferencing, ERP and CRM. Read on now to increase effective network capacity.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

Citrix

The Top 5 Must-Haves for Updating Your WAN Optimization Solution
sponsored by Citrix
WHITE PAPER: This white paper discusses the WAN optimization tools that can make a big difference for the latest IT trends: virtualization, cloud computing, and other emerging technologies.
Posted: 17 Sep 2015 | Published: 30 Apr 2014

Citrix

The Power of Next-Generation WAN: SD-WAN at the Forefront
sponsored by Citrix
WHITE PAPER: This report explains how and why enterprise application evolution is pushing SD-WAN to the business forefront. Read on now to see how the virtualized WAN can connect the cloud to your branch locations, deliver superior user experience, and more.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

Citrix

Interroll Deploys Silver Peak to Build Hybrid WAN with MPLS and Broadband
sponsored by Silver Peak
CASE STUDY: This case study outlines how one logistics company was able to reduce the cost of and improve the performance of its network by implementing a hybrid WAN using a software-defined network.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

Silver Peak

Deploy Services Faster With a Virtual Network: How to Get Started
sponsored by VMware
VIDEO: The operational efficiency that comes with virtualizing your network is certainly promising, but where do you start? In this video, uncover ways to minimize the complexity and discover methods to greatly reduce provisioning time with automation.
Posted: 19 Aug 2015 | Premiered: 19 Aug 2015

VMware

Transforming the Status Quo of Traditional Networking
sponsored by VMware
WHITE PAPER: Traditional network infrastructures will never deliver the same speed and agility as Amazon and Google. Uncover a new approach to software-defined networking that delivers major advances in these areas as well as automation, security, and availability.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

VMware

Quick Guide to Network Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief white paper details the two types of anomaly scores and how they are manifested. Continue reading now to learn how to use each score as an indicator for proactive alerting.
Posted: 10 Aug 2015 | Published: 30 Jul 2015

Prelert

Zero-Touch Branch Deployment, Centrally Managed Policy Propagation
sponsored by Fatpipe, Inc.
WHITE PAPER: This solution literature discusses a hybrid, software-defined networking product that provides an easy migration to hybrid WAN.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Fatpipe, Inc.

Detecting Hidden Network Attacks Before a Breach
sponsored by Prelert
WHITE PAPER: This white paper explores a proactive approach to mitigating modern day cyber security threats and detecting attacks as they enter the network.
Posted: 07 Aug 2015 | Published: 15 Jul 2015

Prelert

SD-WAN: Building a Virtual WAN
sponsored by Silver Peak
WEBCAST: Access this short video to learn how a software-defined WAN can improve your ability to connect users to applications in a business driven by cloud and mobile technologies.
Posted: 07 Jul 2015 | Premiered: Jun 15, 2015

Silver Peak

Analyst Report: Can Broadband Change the WAN?
sponsored by Silver Peak
WHITE PAPER: This white paper looks at the challenges that are facing network managers and reviews a new breed of technology which addresses the problem of WAN performance.
Posted: 30 Jun 2015 | Published: 16 Jun 2015

Silver Peak

Strengthening Security From the Inside Out
sponsored by Mimecast
WEBCAST: Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.
Posted: 26 Jun 2015 | Premiered: Jun 10, 2015

Mimecast

Improve Competitiveness with Software-Defined Wide Area Networks
sponsored by Silver Peak
WHITE PAPER: This white paper outlines the challenges of MPLS–based WANs compared to the benefits of SD-WANs. Read on to learn how you can achieve greater agility, decreased costs, increased performance, and more so that you can be ready for the next generation of IT.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Silver Peak

What to Look for in Network Monitoring Tools
sponsored by SearchNetworking.com
EZINE: An enterprise network is more complex, and more mission-critical, than ever. Here's how to pick the best network monitoring tool for optimal performance.
Posted: 27 Sep 2015 | Published: 27 Sep 2015

SearchNetworking.com

The Economics of Defense: Modeling Security Investments
sponsored by Juniper Networks, Inc.
WHITE PAPER: There are a number of factors to take into account when building, or modifying, your strategy - and inside this white paper are the 5 drivers that influence the costs of cybersecurity. Discover a revolutionary heuristic model created by RAND that more accurately demonstrates the economics of security.
Posted: 08 Sep 2015 | Published: 08 Sep 2015

Juniper Networks, Inc.

Case Study: VMware NSX and WestJet
sponsored by VMware
VIDEO: This short video shows how one Canadian airline was able to improve its preparedness for "east to west" traffic and the growth of BYOD, using the infrastructure already in place.
Posted: 24 Aug 2015 | Premiered: 31 Jan 2014

VMware
76 - 100 of 907 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK PERFORMANCE DEFINITION (continued): …  and Z. Zhang in 1999 as an alternative to routing. In a traditional packet-switched network, data flows in defined, discrete "pieces" from the source to the destination like corpuscles in the bloodstream. At the transmitting station, the outgoing message is broken into packets, each of which contains some of the message data intact. The packets do not necessarily all travel along the same route but they all eventually arrive at the same destination, where the receiving computer reassembles them into the original message. The main problem with this method is that when the overall network … 
Network Performance definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement