IT Systems  >   Communications Networks  >   LAN  >  

Virtual LAN

RSS Feed   
Virtual LAN Reports
 
Next Generation Network Management Techniques
sponsored by SearchSecurity.com
EZINE: The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
Posted: 02 Feb 2012 | Published: 02 Feb 2012

SearchSecurity.com

Extreme Virtual SLX Software
sponsored by Extreme Networks
WHITE PAPER: In this solution brief, learn about Extreme Networks' Virtual SLX (vSLX) that provides a virtualized instance for their switching & routing product line with support for MPLS, BGP, EVPN, and VXLAN.
Posted: 03 May 2019 | Published: 03 May 2019

Extreme Networks

Airport's Common Use Model Relies on Modular Switches
sponsored by Cisco Systems, Inc.
CASE STUDY: Read how the Greater Toronto Airports Authority adopted Cisco Catalyst 6500 switches in the wiring closet and throughout the network to enable the convergence of data, voice, and video, and provide virtualization to support a Common Use environment.
Posted: 26 Mar 2014 | Published: 12 Jan 2009

Cisco Systems, Inc.

The Top 5 VoIP Problems and How to Solve Them
sponsored by Fluke Networks
WHITE PAPER: This paper examines each of these problems and addresses how the ClearSight Analyzer can be used to isolate the cause of the problem.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Fluke Networks

Simplify VMware vSphere* 4Networking with Intel® Ethernet 10 Gigabit Server Adapters
sponsored by Intel
WHITE PAPER: Server virtualization can quickly result in excessively complex network ports if you don't have a plan. This white paper explores the factors that can lead to GbE port bloat, including physical server connection paradigms and security procedures. 
Posted: 05 Jul 2011 | Published: 05 Jul 2011

Intel

BGMX Retail Solutions Case Study
sponsored by SonicWALL
CASE STUDY: BGMX's primary challenge is having the proper bandwidth to adhere to all VLAN specifications in PCI compliance standards. Desko also must meet even tighter SAS-70 regulations, as well as his bank's internal security guidelines.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

SonicWALL

VXLAN Monitoring: How to Gain Virtual Network Overlay Visibility
sponsored by Ixia
EGUIDE: This expert E-Guide from SearchNetworking.com provides the information you need to gain virtual network overlay visibility for proper VXLAN monitoring. View now to learn more about VXLAN and which readily available tools can help you overcome the visibility hurdle.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

Ixia

Exploring Software-Defined Networking with Brocade
sponsored by Brocade
WHITE PAPER: Software-defined networking (SDN) is a hot topic today. This white paper provides an overview of the concept and the role it will play in achieving cloud success. View now to learn more!
Posted: 09 May 2013 | Published: 30 Apr 2012

Brocade

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

SearchSecurity.com

Airports Use Network Virtualization to Consolidate and Scale Operations
sponsored by Cisco Systems, Inc.
CASE STUDY: The Cisco Catalyst 6500 Series Switch with Supervisor Engine 720-3BXL enabled Unique at Zurich Airport to successfully implement network virtualization using MPLS VPN technology.
Posted: 13 Jan 2009 | Published: 12 Jan 2009

Cisco Systems, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement