IT Management  >   Systems Design and Development  >   Architectures  >  

Networking Architecture

RSS Feed    Add to Google    Add to My Yahoo!
Networking ArchitectureReports
 
A Cybercriminal's Guide to Exploiting DNS for Fun and Profit
sponsored by Infoblox
WHITE PAPER: This guide explores current network security trends and how to protect your DNS from various cyber-attacks.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

Infoblox

4 Reasons to Outsource Your DNS
sponsored by Dyn
WHITE PAPER: Minimizing network downtime is a top priority for all IT departments and this informative whitepaper explores 4 top reasons to outsource your DNS.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Dyn

Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks
sponsored by Extreme Networks
WHITE PAPER: This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Extreme Networks

Achieve Deeper Network Security and Application Control (eBook)
sponsored by Dell Software
EBOOK: Next-generation firewalls have revolutionized network security. Traditional firewalls that focus on stateful packet inspection and access control rules are ineffective. Learn how to protect your organization from ever-evolving threats with a firewall that delivers a deeper level of network security.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

Magic Quadrant for WAN Optimization
sponsored by Riverbed Technology, Inc.
ANALYST REPORT: For the 7th year in a row, Riverbed is in the "Leaders" Quadrant of the 2014 Magic Quadrant for WAN Optimization Controllers. In this report, Gartner evaluates vendors based on their ability to execute and completeness of vision.
Posted: 15 Apr 2014 | Published: 27 Mar 2014

Riverbed Technology, Inc.

Where is the ROI for UC?
sponsored by Windstream Communications
WHITE PAPER: This white paper highlights numerous places where UC can show both hard- and soft-dollar savings, and offers 10 steps to take to justify your decision to deploy a UC solution.
Posted: 08 Apr 2014 | Published: 31 Oct 2013

Windstream Communications

Rethinking Your Cisco Network Monitoring Strategy
sponsored by Ixia
WEBCAST: Network monitoring is an increasingly important component for your overall Cisco architecture. Access this webcast to learn how to gain visibility and control of network traffic.
Posted: 27 Feb 2014 | Premiered: Feb 27, 2014

Ixia

What’s in Store for the Cloud in 2014
sponsored by Citrix
EGUIDE: This expert E-guide highlights what you can do differently in a hybrid cloud, SDN's role, top challenges and best practices for tackling them.
Posted: 06 Feb 2014 | Published: 06 Feb 2014

Citrix

The Four Elements of OSPF
sponsored by Global Knowledge
WHITE PAPER: This whitepaper explores 4 key elements for the implementation of open shortest path first (OSPF).
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Global Knowledge

What's New in Wireless Networking and 802.11?
sponsored by Global Knowledge
WHITE PAPER: This exclusive white paper examines the ins-and-outs of wireless networking, discussing the current state 802.11 and what near-future developments you need to prepare for if you want to remain competitive.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Global Knowledge
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement