IT Systems  >   Communications Networks  >   LAN  >  

VLAN Software

RSS Feed    Add to Google    Add to My Yahoo!
VLAN SoftwareReports
 
Bringing iPads in the classroom – New requirements to consider
sponsored by SearchSecurity.com
EGUIDE: Discover the benefits a BYOD or iPad-in-the-classroom program has to offer, and learn why a stable wireless LAN is vital to their success.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

SearchSecurity.com

How We Define a Network is About to Change, Again
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn how VMware NSX changes the way that you build, manage, and secure your network.
Posted: 06 Oct 2014 | Published: 25 Sep 2014

Global Knowledge

Next Generation Network Management Techniques
sponsored by SearchSecurity.com
EZINE: The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
Posted: 02 Feb 2012 | Published: 02 Feb 2012

SearchSecurity.com

Presentation Transcript: Network Performance Improvement - What You Need to Know
sponsored by Dell and VMware
PRESENTATION TRANSCRIPT: In this presentation transcript, get help setting goals for your network before jumping into server virtualization, and discover how these goals can be applied to any sized business. Gain insight on connecting your network to a disaster recovery network, and considerations to make when migrating to the cloud.
Posted: 03 Apr 2012 | Published: 02 Apr 2012

Dell and VMware

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

BGMX Retail Solutions Case Study
sponsored by SonicWALL
CASE STUDY: BGMX's primary challenge is having the proper bandwidth to adhere to all VLAN specifications in PCI compliance standards. Desko also must meet even tighter SAS-70 regulations, as well as his bank's internal security guidelines.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

SonicWALL

The Intelligent Campus LAN
sponsored by Juniper Networks, Inc.
EGUIDE: Access this Tech Guide from SearchNetworking.com to learn how you can update your campus LAN to address the modern needs of your network, including application delivery and mobility.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

Juniper Networks, Inc.

How Enterprise-Class Services Integrate with Real Companies
sponsored by Comcast
PODCAST: Discover why one of your peers chose Enterprise Services from Comcast to fulfill their need for a high-speed connection between their primary site and disaster recovery site.
Posted: 06 Mar 2013 | Premiered: Dec 31, 2012

Comcast

Eliminating Security Trade-Offs with Cross-Platform Server Isolation
sponsored by Apani
WHITE PAPER: This paper will examine the challenges of using network firewalls and VLANs for security within the corporate network and introduce the many advantages of cross-platform server isolation as an alternative in protecting servers.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Apani

Managing Virtualized Networks
sponsored by SearchNetworking.com
EGUIDE: This Tech Guide from SearchNetworking.com on managing virtualized networks provides the guidance you need to start putting your ideal on-premises network management system in place, and also touches on the managed services options available. View now to learn more!
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchNetworking.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement