IT Management  >   Systems Operations  >   Network Management  >  

Network Performance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Optimization, Network Tuning, Network Performance Management, Performance
DEFINITION: Network coding is a method of optimizing the flow of digital data in a network by transmitting digital evidence about messages. The "digital evidence" is, itself, a composite of two or more messages. When the bits of digital evidence arrive at the destination, the transmitted message is deduced rather than directly reassembled.The concept of network coding was first introduced by R. W. Yeung  … 
Definition continues below.
Network Performance Reports
76 - 100 of 979 Matches Previous Page  |  Next Page
SD-WAN: Driving Business Benefits
sponsored by Silver Peak
WHITE PAPER: Traditional WAN technologies cannot keep pace with the changes and expansion that businesses require to stay competitive. Today's WANs require more diverse connectivity options, improved visibility, more control, better automation, and faster deployment time. SD-WANs are enabling businesses the flexibility to drive their businesses forward.
Posted: 10 Mar 2016 | Published: 08 Sep 2015

Silver Peak

Visualizing Your World
sponsored by SevOne
WEBCAST: This video demonstrates how you can monitor and see the live topology of your entire virtual infrastructure. You'll also see how multiple metrics can be viewed through a single dashboard.
Posted: 10 Mar 2016 | Premiered: Mar 10, 2016

SevOne

Why Hybrid WAN and SD-WANs are Replacing the Traditional Model
sponsored by Silver Peak
WHITE PAPER: Traditional WAN architectures are feeling the strain being put on them by the increasing need for mobile and remote computing. The balance between Internet and data center service traffic is shifting. The solution is to move to a hybrid WAN architecture. See how one company is overcoming the challenges presented by changing models.
Posted: 10 Mar 2016 | Published: 28 Dec 2015

Silver Peak

Wi-Fi Network Design & Optimization
sponsored by Extreme Networks
WEBCAST: Designing your Wi-Fi network is a complicated process. It will not be perfect on the first try. Optimizing your network may take many iterations. This video will enable you to cut down the amount of guesswork that goes into optimization and shorten the process.
Posted: 09 Mar 2016 | Premiered: Dec 9, 2015

Extreme Networks

Optimizing Your Network
sponsored by Extreme Networks
WEBCAST: The Internet of Things (IoT) is bigger than most people realize and growing constantly. Interconnectivity is the way of the future and is going to rapidly become the way of life. As "smart" technology becomes more available, more technology and machines will become connected, continuing the growth of the IoT.
Posted: 09 Mar 2016 | Premiered: Mar 9, 2016, 16:31 EST (21:31 GMT)

Extreme Networks

How to Improve Service Delivery with Integrated Metric, Flow, and Log Monitoring
sponsored by SevOne
WEBCAST: This resource displays how one tool can help you monitor your network and application infrastructure and how to respond to a hypothetical degradation in performance from one of your applications.
Posted: 09 Mar 2016 | Premiered: Mar 9, 2016

SevOne

Connecting a School Whose Network "Never Stands Still"
sponsored by Extreme Networks
WHITE PAPER: This case study will show how one school was able to leverage technology to enhance student learning, boost staff productivity, lower the cost of education, and improve instruction and retention rates.
Posted: 09 Mar 2016 | Published: 24 Feb 2016

Extreme Networks

Assuring Performance of Your F5 Infrastructure
sponsored by SevOne
WEBCAST: This video contains a simple explanation of how you can ensure the network performance of your F5 implementation.
Posted: 08 Mar 2016 | Premiered: Mar 8, 2016

SevOne

A Shift to the Hybrid Cloud
sponsored by Dimension Data
WEBCAST: This short video shows how enterprises can deal with the end of life for Windows Server 2003 and other legacy applications by moving information safely and securely to a hybrid cloud environment.
Posted: 07 Mar 2016 | Premiered: Mar 7, 2016

Dimension Data

WAN Optimization Evaluation Test Report
sponsored by Citrix
RESEARCH CONTENT: This research report discusses how one WAN optimization tool allows smaller leased circuits to be used, or else accommodates more users before a necessitating a jump to larger WAN connections.
Posted: 07 Mar 2016 | Published: 30 May 2014

Citrix

Why Most Performance Monitoring Architectures Don't Scale
sponsored by SevOne
WEBCAST: This webcast discusses the history of network performance management architectures, how the technology has evolved, where it's going, and the dangers of sticking with legacy monitoring technology.
Posted: 06 Mar 2016 | Premiered: Mar 4, 2016

SevOne

Keeping Quality of Service High Despite LTE Traffic Increases
sponsored by SevOne
WHITE PAPER: This white paper discusses ways that you can keep network costs down, even as the service you provide requires network speed to remain brisk while demands increase.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

SevOne

Network World Paper: The Power of Next-Generation WAN
sponsored by Citrix
WHITE PAPER: This resource discusses how business leaders are improving network flexibility and lowering costs by embracing as-a-service technology. With more dynamic networking, business managers can keep up with customer expectations and lower your overhead.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

Citrix

Market Guide for Software-Defined WAN
sponsored by Citrix
RESOURCE: This Gartner report discusses the emerging SD-WAN market and the vendors that have viable offerings in that space. Access now to create a shortlist of vendors to engage with when seeking an SD-WAN solution.
Posted: 03 Mar 2016 | Published: 01 Dec 2015

Citrix

Threat Intelligence Services eGuide
sponsored by OpenDNS
EGUIDE: This guide introduces threat intelligence services in the enterprise, including typical models and features, and also deconstructs the incident response (IR) process to share what you can expect when you hire an IR provider to handle your ongoing crisis.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

OpenDNS

10 Metrics to Monitor in the LTE Network
sponsored by SevOne
WHITE PAPER: This white paper discusses the 10 metrics that you can monitor and collect in your LTE environment to ensure efficient delivery of services to your customers.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

SevOne

New Requirements for Performance Management Vendors
sponsored by SevOne
WHITE PAPER: This white paper discusses the next-generation performance monitoring tools that are providing data on every aspect of the application delivery chain.
Posted: 29 Feb 2016 | Published: 30 Sep 2015

SevOne

Achieving Operational Insight in SDN & NFV Environments
sponsored by SevOne
WHITE PAPER: This white paper addresses the new requirements for performance management, and explains why the traditional tools no longer apply to SDN and NFV infrastructures.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

SevOne

Analyze Bigger Data with Summarized Input
sponsored by Prelert
RESOURCE: This detailed blog post describes how an API engine for anomaly detection can achieve high performance with summarized input. Read on to find examples of how to write job configurations to send pre-summarized data to this API.
Posted: 25 Feb 2016 | Published: 17 Mar 2015

Prelert

Bringing Alert Management to the Present with Advanced Analytics
sponsored by Prelert
RESOURCE: This brief blog post explains how advanced machine learning analytics can filter out the background noise to identify and prioritize anomalies. Learn how this advanced analytics approach can empower you to identify problems before they impact the user experience.
Posted: 25 Feb 2016 | Published: 12 May 2015

Prelert

How Mobility is Affecting Wider Business Strategies
sponsored by Lenovo
RESOURCE: Recognizing the most popular choice for online browsing is the first step toward strategizing it. Learn how to align your mobile and business goals when you form clear deliverables and goals, create metrics, and more.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Lenovo

Top 5 Solution Requirements for Account Takeover Protection
sponsored by Imperva
WHITE PAPER: Download this playbook and learn five solution requirements for effective account takeover protection.
Posted: 12 Feb 2016 | Published: 30 Dec 2015

Imperva

Top UC Trends Impacting 2016
sponsored by Dimension Data
EGUIDE: This guide discusses the top 5 unified communications (UC) trends to watch in 2016. UC has undoubtedly entered the mainstream, but knowing the shape that deployments will take moving forward will lead to competitive advantage.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

Dimension Data

Maximize Cloud Benefits with Five Keys to Private Cloud Automation
sponsored by SPS Commerce, Inc.
EGUIDE: In this expert e-guide, discover how to maximize cloud benefits in your organization by uncovering the 5 keys to private cloud automation. Read on to access two bonus articles: learn how to maintain excellent private cloud network performance and application performance monitoring, as well as how to adopt a successful private cloud strategy.
Posted: 01 Mar 2016 | Published: 24 Feb 2016


Deploying Nagios Monitoring
sponsored by BigPanda
EGUIDE: In this technical guide you will learn how to integrate monitoring into your existing Nagios environment, and specifically how to set up remote server monitoring using remote host definitions that contain a specification for each individual service that needs monitoring. The advantage of this approach is the ease of deployment.
Posted: 24 Feb 2016 | Published: 18 Feb 2016

BigPanda
76 - 100 of 979 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK PERFORMANCE DEFINITION (continued): …  and Z. Zhang in 1999 as an alternative to routing. In a traditional packet-switched network, data flows in defined, discrete "pieces" from the source to the destination like corpuscles in the bloodstream. At the transmitting station, the outgoing message is broken into packets, each of which contains some of the message data intact. The packets do not necessarily all travel along the same route but they all eventually arrive at the same destination, where the receiving computer reassembles them into the original message. The main problem with this method is that when the overall network … 
Network Performance definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement