IT Systems  >   Communications Networks  >   LAN  >  

Virtual LAN Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Virtual LAN Appliances Reports
 
Why Physical Networks Don't Cut It for the Private Cloud
sponsored by SearchSecurity.com
EGUIDE: This expert guide discusses why physical networks don’t cut it for the cloud, addressing multi-tenancy in the private cloud and the cloud VLAN challenge.
Posted: 22 Dec 2011 | Published: 22 Dec 2011

SearchSecurity.com

The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

eGuide: Meshing Virtual Machine and Physical Systems Management
sponsored by Dell and Microsoft
EGUIDE: This paper explains how to provide adequate network redundancy and isolation, how to implement adaptive automation practices for high availability, and how to take advantage of the best tools to eliminate separate virtual and physical management structures.
Posted: 17 Dec 2008 | Published: 17 Dec 2008

Dell and Microsoft

The Case for Virtual Local Area Networks (VLANs)
sponsored by Global Knowledge
WHITE PAPER: In this whitepaper you will learn about the evolution of Ethernet, the reasons VLANs were introduced, and the ways that VLANs can be used.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Integrating Mobile Access into Your VPN Environment
sponsored by AT&T Corp
WHITE PAPER: Enterprises are increasingly facing the task of integrating a variety of access services and devices onto their Virtual Private Networks (VPN). This white paper takes a closer look at some key issues that arise when bringing access methods into your VPN.
Posted: 31 May 2007 | Published: 07 Jun 2006

AT&T Corp

BGMX Retail Solutions Case Study
sponsored by SonicWALL
CASE STUDY: BGMX's primary challenge is having the proper bandwidth to adhere to all VLAN specifications in PCI compliance standards. Desko also must meet even tighter SAS-70 regulations, as well as his bank's internal security guidelines.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

SonicWALL

The ECHO™ - Cisco Connection: ECHO™, and How It Interacts with Cisco's CallManager
sponsored by Teleformix
WHITE PAPER: Read this white paper and learn how ECHO's direct digital integration with Cisco's VoIP network enables the pooling of voice VLAN ports through SPAN or RSPAN.
Posted: 11 Jul 2008 | Published: 01 Jul 2007

Teleformix

Network Evolution April 2013
sponsored by SearchNetworking.com
EZINE: This month's issue Network Evolution takes a hardcore look at the hybrid cloud horizon to explore the future possibility of networking across disparate clouds.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

SearchNetworking.com

Managing Virtualized Networks
sponsored by SearchNetworking.com
EGUIDE: This Tech Guide from SearchNetworking.com on managing virtualized networks provides the guidance you need to start putting your ideal on-premises network management system in place, and also touches on the managed services options available. View now to learn more!
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchNetworking.com

Solution brief: Exceed the Limits with Extreme Networks SDN Solutions
sponsored by Extreme Networks
WHITE PAPER: Explore a portfolio of products that will help you accelerate the adoption of software-defined networking (SDN) within your enterprise.
Posted: 14 May 2013 | Published: 30 Apr 2013

Extreme Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement