IT Management  >   Systems Design and Development  >  

Networking Design

RSS Feed    Add to Google    Add to My Yahoo!
Networking Design Reports
 
Network Purchasing Intentions 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

ComputerWeekly.com

Multi-Path Networking Is a Key to Maximizing Cloud Value
sponsored by Silver Peak
WHITE PAPER: This report discusses the rapid growth of the cloud and how you can take advantage of this new computing technology by moving away from legacy networks and embracing multi-path networking.
Posted: 26 Jun 2015 | Published: 29 May 2015

Silver Peak

How to Remove the Barriers to Cloud Collaboration Adoption
sponsored by Mimecast
WEBCAST: In this webinar, join Forrester Research-backed experts as they take you through the advantages of adopting cloud collaboration technology, overcoming security challenges, and developing a flexible strategy.
Posted: 27 Oct 2015 | Premiered: Oct 27, 2015

Mimecast

WAN Speak Musings – Volume VI
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bernt Ostergaard look at the key issues affecting network design and management in this continuing series of articles.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

ComputerWeekly.com

Intervention areas for superfast broadband project Connecting Cumbria
sponsored by ComputerWeekly.com
DATA SHEET: UK broadband roll-out: Download this Excel spreadsheet detailing the intervention status of postcodes across Cumbria
Posted: 15 Oct 2013 | Published: 15 Oct 2013

ComputerWeekly.com

SteelFusion 4.0 Solution Brief
sponsored by Riverbed Technology, Inc.
WHITE PAPER: In this white paper, learn how to manage infrastructure as branch and remote business locations increase. Explore the business benefits of one IT option, including: reduced costs through consolidation, complete data security, full visibility, and more.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Riverbed Technology, Inc.

Information Security Magazine – July/August 2013
sponsored by SearchSecurity.com
EZINE: This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

Five Secrets of Highly Effective Data Centers
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative whitepaper explores five secrets of highly effective data centers.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

Cisco Systems, Inc.

Network Evolution E-Zine: High-Density WANs and More
sponsored by SearchNetworking.com
EZINE: In this issue of Network Evolution, we explore the need for high-density wireless network designs, the future of MPLS and whether Microsoft Lync is ready to replace legacy PBXs.
Posted: 02 Jun 2014 | Published: 02 Jun 2014

SearchNetworking.com

Virtualization: A Guide to your Network Architecture
sponsored by Dell, Inc.
WEBCAST: As network architectures begin to change from from chassis based switches due to server virtualization, you need a new network strategy to adapt. This guide highlights Dell's Active Fabric offerings and how their cost effective switching components can solve your network virtualization issues
Posted: 22 Nov 2013 | Premiered: Jun 7, 2013

Dell, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement