IEEE 802.1q Reports

Understanding the pros and cons of network virtualization
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchServerVirtualization.com explains the benefits of virtualizing the network. Find out how to utilize this technology to combine multiple networks into a single logical network. Plus, get answers to common questions about network virtualization technology to ensure a smooth transition.
Posted: 29 Nov 2011 | Published: 29 Nov 2011

TechTarget Security

Five Best Practices to Protect Your Virtual Environment
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover how you can realize the benefits of virtualization without sacrificing security in this whitepaper that outlines five best practices to utilize to protect your virtual environment.
Posted: 01 May 2012 | Published: 20 Apr 2012

Juniper Networks, Inc.

BGMX Retail Solutions Case Study
sponsored by SonicWALL
CASE STUDY: BGMX's primary challenge is having the proper bandwidth to adhere to all VLAN specifications in PCI compliance standards. Desko also must meet even tighter SAS-70 regulations, as well as his bank's internal security guidelines.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

SonicWALL

Airports Use Network Virtualization to Consolidate and Scale Operations
sponsored by Cisco Systems, Inc.
CASE STUDY: The Cisco Catalyst 6500 Series Switch with Supervisor Engine 720-3BXL enabled Unique at Zurich Airport to successfully implement network virtualization using MPLS VPN technology.
Posted: 13 Jan 2009 | Published: 12 Jan 2009

Cisco Systems, Inc.

The Case for Virtual Local Area Networks (VLANs)
sponsored by Global Knowledge
WHITE PAPER: In this whitepaper you will learn about the evolution of Ethernet, the reasons VLANs were introduced, and the ways that VLANs can be used.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Simplify VMware vSphere* 4Networking with Intel® Ethernet 10 Gigabit Server Adapters
sponsored by Intel
WHITE PAPER: Server virtualization can quickly result in excessively complex network ports if you don't have a plan. This white paper explores the factors that can lead to GbE port bloat, including physical server connection paradigms and security procedures. 
Posted: 05 Jul 2011 | Published: 05 Jul 2011

Intel

VXLAN Monitoring: How to Gain Virtual Network Overlay Visibility
sponsored by Ixia
EGUIDE: This expert E-Guide from SearchNetworking.com provides the information you need to gain virtual network overlay visibility for proper VXLAN monitoring. View now to learn more about VXLAN and which readily available tools can help you overcome the visibility hurdle.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

Ixia

Solution brief: Exceed the Limits with Extreme Networks SDN Solutions
sponsored by Extreme Networks
WHITE PAPER: Explore a portfolio of products that will help you accelerate the adoption of software-defined networking (SDN) within your enterprise.
Posted: 14 May 2013 | Published: 30 Apr 2013

Extreme Networks

Solving the Mysteries of Subnetting
sponsored by Global Knowledge
WHITE PAPER: Subnetting is a complicated topic that has confused students for a very long time, however, subnetting is an important topic for many different certifications with various vendors, including Cisco.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

z Cisco Catalyst 2950 Series Switches with Standard Image SW
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING: The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features.
Posted: 10 Jul 2008 | Published: 01 Jan 2004

Cisco Systems, Inc.