Network Management Best Practices Reports

IT Project: Virtualisation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Virtualisation, in all its forms, has dramatically changed the way enterprise datacentres are operated, managed and built over the course of the past decade or so.
Posted: 08 Feb 2021 | Published: 16 Dec 2016

TechTarget ComputerWeekly.com

Top 10 networking stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Until Tuesday 10 December, it would have been absolutely fair to say that 2019 was the year of software-defined networking. And then, on 11 December, Cisco unveiled the basis of what it called the internet for the future. Hardware was very much back to the future. Here are Computer Weekly's top 10 networking stories of 2019.
Posted: 08 Feb 2021 | Published: 03 Jan 2020

TechTarget ComputerWeekly.com

Network virtualisation comes of age – but much work remains to be done
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Network virtualisation, the process of making networking infrastructure more agile by running network functions on industry-standard server hardware, has long-promised huge benefits for the IT department by improving network speed, reliability, flexibility, scalability and security.
Posted: 08 Feb 2021 | Published: 05 Jun 2017

TechTarget ComputerWeekly.com

Computer Weekly – 3 July 2018: Future-proofing Gatwick Airport's technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at London Gatwick Airport and talk to its CIO about a critical network upgrade to support passenger growth. Our latest buyer's guide examines automation and intelligent systems management. And we assess the latest technologies for boosting storage performance. Read the issue now.
Posted: 08 Feb 2021 | Published: 29 Jun 2018

TechTarget ComputerWeekly.com

Essential Guide to Software Defined Networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Software defined networking (SDN) allows network engineers to support a switching fabric across multi-vendor hardware and application-specific integrated circuits. A network administrator can shape traffic from a centralised control console without having to touch individual switches.
Posted: 08 Feb 2021 | Published: 12 Feb 2018

TechTarget ComputerWeekly.com

Reaching for the Cloud Apps
sponsored by TechTarget Networking
EBOOK: This three-part guide will analyze the new options available to enterprises to make sure cloud-based access is optimized for both the wired and wireless networks.
Posted: 20 Dec 2016 | Published: 20 Dec 2016

TechTarget Networking

Top 10 networking stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK: New hybrid workplace environments are demanding connectivity and security technologies to keep employees productive and able to collaborate. How leaders in the world of networking have been attempting to address these new dynamics over the course of the past year? Look back over Computer Weekly's top 10 networking stories of 2021.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

TechTarget ComputerWeekly.com

The Current State of Cloud Network Services and Where It's Predicted to Go
sponsored by Aerohive Networks
EGUIDE: Read this expert guide to learn about current the state of cloud network services, and explore an interview with IDC analyst Brad Casemore on his research, including how cloud and as-a-service offerings are redefining enterprise networking.
Posted: 18 Dec 2018 | Published: 13 Dec 2018

Aerohive Networks

How to Transition from MPLS to SD-WAN
sponsored by VMware and Intel
EGUIDE: Don't transition from MPLS to SD-WAN deployment without a migration plan. Follow these 4 steps as a guideline to avoid MPLS contract disasters, unexpected costs and delayed installation.
Posted: 30 Nov 2018 | Published: 28 Nov 2018

VMware and Intel

The Anatomy of DDoS Attacks And Best Practices for Preventing Them
sponsored by Arbor Networks
EGUIDE: This expert e-guide explores how a DDoS attack functions, from discovering targets to infiltrating your servers - costing you time, money, and possibly even your public image. Next discover how the 3 major types of DDoS attacks differ, and what you can do to prevent them from gaining access to your information.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Arbor Networks