IT Management  >   Systems Design and Development  >   Architectures  >  

WLAN Architectures

RSS Feed    Add to Google    Add to My Yahoo!
WLAN ArchitecturesReports
 
OpenFlow-based SDN Data Center Interconnect
sponsored by NEC Corporation of America
WHITE PAPER: This white paper discusses the benefits of SDN and how it differs from your traditional networks. Read on to learn how delivering messages and other types of content to a variety of Web users has transformed into a simple process due to this flexible type of network.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

NEC Corporation of America

Three Key Principles to Accelerating Web Applications
sponsored by F5 Networks
WHITE PAPER: This webcast gives tips on how organizations can accelerate their web applications by sending less data, sending data less frequently, and sending it more efficiently.
Posted: 31 Jul 2014 | Published: 30 Jun 2014

F5 Networks

Overcoming 3 Pitfalls of Ineffective Monitoring Solutions
sponsored by CA Technologies.
WHITE PAPER: This resource reviews the three major pitfalls that enterprises are likely to encounter in the absence of effective monitoring capabilities.
Posted: 18 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Howe Robinson - Multi-Protocol Label Switched Network
sponsored by Telstra Global
CASE STUDY: This exclusive case study examines how one of the largest ship broking companies uses a multi-protocol label switched (MPLS) network solution to provide their global offices with the resources they need to improve productivity, boost operational efficiency, and drive innovation.
Posted: 27 Jun 2014 | Published: 23 Jun 2014

Telstra Global

Getting on the Road to SDN
sponsored by NEC Corporation of America
WHITE PAPER: This exclusive resource discusses how software-defined networking (SDN) can turn your network into an enabler of modern IT environments while eliminating manual processes, configuration inflexibility, and latency challenges associated with device-centric networking.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

NEC Corporation of America

Solitaire Interglobal-Platform Security Report-Tracked, Hacked, and Attacked
sponsored by IBM
WHITE PAPER: This white paper provides insight on the main behavioral characteristics of hardware and software used for security purposes.
Posted: 16 Jul 2014 | Published: 31 Dec 2013

IBM

Subnetting an IP Address
sponsored by Global Knowledge
WHITE PAPER: This paper focuses on the process rules and helpful hints for learning to subnet an IPv4 address.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Talari Case Study: Whiting & Partners
sponsored by Talari Networks
CASE STUDY: This informative case study discusses how an accounting firm used a WAN virtualization solution to cost-effectively provide the network reliability and flexibility needed to deploy new services such as virtual desktop infrastructures and VoIP. Read on to find out how your organization can achieve similar results.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Talari Networks

Emerging Use Cases for SDN in the Campus Network
sponsored by Brocade
WHITE PAPER: This video provides a number of use cases that illustrate the benefits and potential applications of software-defined networking within enterprises.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

Brocade

The Fight for Full Network Visibility in a Dangerous World
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
Posted: 09 May 2014 | Published: 09 May 2014

APCON, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement