IT Management  >   Systems Operations  >   Network Management  >   Network Traffic Management  >  

Website Traffic Management

RSS Feed    Add to Google    Add to My Yahoo!
Website Traffic ManagementReports
 
Healthcare Giant Accelerates into Future of Wireless
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper describes how Cisco deployed solutions for high-bandwidth and high-density wireless locations within a hospital system with 14,800 employees, a massive campus, and 10,000 devices accessing the network at any given time.
Posted: 02 Sep 2014 | Published: 31 Oct 2013

Cisco Systems, Inc.

Use Case: Scaling a University's Intrusion Detection System to Support 30,000 Users
sponsored by Gigamon
WHITE PAPER: This white paper explores a use case in which a major research university needed to upgrade its intrusion detection system (IDS) to secure 30,000 users and monitor tens of gigabits of internet traffic each second.
Posted: 07 Aug 2014 | Published: 30 Jun 2014

Gigamon

CW Buyer's Guide: IPV6 Migration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.
Posted: 26 Jul 2012 | Published: 05 Feb 2012

ComputerWeekly.com

Achieving a Higher Level of Business and Network Adaptability with Unified Application Infrastructure Services
sponsored by F5 Networks
WHITE PAPER: Although F5's BIG-IP traffic management solutions brings numerous features and benefits to an organization, the goal of this paper is to explore a more fundamental business problem plaguing today's organizations - and how BIG-IP solves it.
Posted: 28 Apr 2008 | Published: 01 Dec 2004

F5 Networks

Web User Experience: Common Indicators for Business and IT Collaboration
sponsored by Dell Software
WHITE PAPER: This paper discusses how to bridge the gap in user experience management (UEM) between business stakeholders and IT by helping each group better understand both perspectives on the user experience. It describes the most common UEM indicators and what they mean to both the business and IT. 
Posted: 29 Dec 2010 | Published: 27 Dec 2010

Dell Software

Next Generation Firewalls: Decision Time: Product Benefits and Tradeoffs
sponsored by Dell SonicWALL
EGUIDE: This is the third piece in SearchSecurity.com's three-part guide on Next Generation Firewall products. This expert asset, written by expert Adrian Lane, Analyst & CTO at Securosis, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Posted: 19 Nov 2012 | Published: 14 Nov 2012

Dell SonicWALL

The Return of Web Caching: Bandwidth Savings, Network Resilience, and On-Demand Content Delivery in a Web 2.0 World
sponsored by BlueCoat
ANALYST REPORT: In this report you will learn: How the Internet has evolved as we have moved from Web 1.0 to Web 2.0, Dynamics of new Web affects on service providers, Challenges faced by access providers in developing markets, Mobile operator specific challenges and Emerging Web 2.0 Internet usage pattern impact.
Posted: 01 Mar 2011 | Published: 28 Feb 2011

BlueCoat

Top 5 Threat Protection Best Practices
sponsored by Sophos, Inc.
WHITE PAPER: The following top five best practices offer advice to help you protect your endpoints and your network against an ever-growing body of threats.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Sophos, Inc.

Landing Page Optimization: Best Practices to Lift Conversion
sponsored by WebTrends
WHITE PAPER: Your landing page is the first thing customers see when interacting with your brand online, and whether or not they are drawn into your site can make or break your campaign. Check out this white paper to learn best practices for landing page optimization, compare strategies for page testing, and more.
Posted: 11 Apr 2013 | Published: 31 Jan 2013

WebTrends

Why Your URL Filter, Firewall, and Desktop Antivirus are all Failing You
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper will cover current and emerging Web-based malware exploits, their methodologies, and their vectors of infection.
Posted: 18 Mar 2008 | Published: 18 Mar 2008

Aladdin Knowledge Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement