ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Testing Research

  • E-Guide: Choosing enterprise wireless LAN equipment

    Sponsored by: NETGEAR Inc.

    802.11N has solidified and a new product generation has emerged, the time is right for enterprises to pursue broader WLAN deployment. Purchases should be driven by technical requirements that map business needs onto product capabilities. To help you complete that step, we have compiled a list of common enterprise WLAN requirements.

  • Current networking trends increasingly shape the enterprise

    Sponsored by: TechTarget Networking

    Current networking trends continue to affect the traditional enterprise, as well as the approach to network education and management.

  • In-house Network Test Labs and SDN Switching Assessment

    Sponsored by: Juniper Networks, Inc.

    Keeping an in-house network test lab up to date requires considerable expertise. Learn how to avoid the complexity of maintaining an internal lab by utilizing a virtual test environment. Additionally, learn how expert bloggers assess SDN switching at UNH InterOperability Laboratory.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • In the Network, Analytics Tools Empower Managers

    Sponsored by: TechTarget Networking

    When it comes to improving network performance, big data alone isn't enough. In this issue of Network Evolution, find out why network managers are leveraging next-generation IT operations analytics (ITOA) tools to identify network performance problems and automate fixes before they can result in downtime.

  • Is Your Network Traffic Invisible?

    Sponsored by: Globalscape

    This brief guide explores the importance of network monitoring and outlines the benefits of increased visibility.

  • Cisco Visual Networking Index Global Mobile Data Traffic Forecast for 2013 to 2018

    Sponsored by: Cisco Systems, Inc.

    This interactive webpage outlines some top trends in mobile data trafficking and explains how this will affect the way IT departments deal with the rising traffic.

  • Ixia Black Book: 802.11ac Wi-Fi Benchmarking

    Sponsored by: Ixia

    Examine 802.11ac Wi-Fi test methodologies in this white paper, which provides insight into the capabilities and features that matter most.

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • Field Testing Multimode 10Gb/s (and beyond) Fiber Permanent Links

    Sponsored by: Fluke Networks

    This white paper is the joint effort of 2 industry leaders of high speed infrastructure cabling and testing, Panduit and Fluke Networks. It provides a thorough analysis and review of different testing techniques and their associated benefits for high speed permanent links.

  • E-Guide: Benchmarking Core Switches: Modeling Techniques for Switch Testing

    Sponsored by: NETGEAR Inc.

    Bottlenecks can lurk inside a high-speed 10 GbE core switch and cause its actual performance to clock in below theoretical maximum. The solution is benchmark any of these high-end devices before purchase. This e-guide discusses why using model traffic modeling to benchmark core switches is your best choice and how it can cut major costs.

  • E-Book: Technical Guide on Network Security Monitoring

    Sponsored by: AVG Technologies USA, Inc.

    Your organization’s network is more than a collection of pipes through which traffic flows: it’s your business’ fundamental IT architecture. Your security devices keep a watchful eye on traffic and systems, and maintain the integrity of your data and systems. Check out this guide to network security monitoring from SearchMidmarketSecurity.com.

  • Advanced Virtualization E-Book: Essentials of High-Availability Planning

    Sponsored by: Dell, Inc. and AMD

    This e-book provides planning and testing tips for establishing high availability in a virtual environment, plus highlights effective management tools and procedures currently available.

  • Symantec Protection Suite Challenge

    Sponsored by: Symantec Corporation

    Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.

  • Core IMPACT Essential

    Sponsored by: Core Security Technologies

    How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.

  • CORE IMPACT 6.0

    Sponsored by: Core Security Technologies

    For organizations that need to ensure the security of critical or sensitive systems, CORE IMPACT is a must-have tool. This Information Security Review examines CORE IMPACT and highly recommends it as an effective security device.

  • Independent Lab Test Report: Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks

    Sponsored by: Cisco Systems, Inc.

    Cisco Systems becomes the first, and to date the only, IP-Telephony vendor to earn Miercom's highest rating of Secure for its proven ability to defend an IP phone system against malicious attack.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.