Local Area Networks Reports

Application Delivery Network Buyer's Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

Optimization is for the Clouds
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This paper begins with an outline of the characteristics of computing from a distance, describes how WAN optimization of cloud resources improves the user experience, explains how Riverbed’s Cloud Steelhead achieves this, and concludes with several deployment examples.
Posted: 06 Sep 2011 | Published: 06 Sep 2011

Riverbed Technology, Inc.

Cisco ONE Enterprise Networks Architecture: An Automated, Application-Aware Foundation for the Modern Enterprise
sponsored by Cisco
WHITE PAPER: Access this white paper to take your first step toward an adaptable network platform –this enterprise network architecture provides the open, programmable, and application-aware foundation you need for today's mobile and cloud-connected world.
Posted: 08 Apr 2014 | Published: 31 Oct 2013

Cisco

Hybrid Cloud Connectivity: 6 Best Practices
sponsored by Datavita
EGUIDE: Whether you're supporting your cloud environment on a LAN or a WAN, it's network connectivity that drives it. As such, cloud architects must evaluate the capabilities, configurations and costs of LAN and WAN connectivity. Leverage this expert e-Guide to explore the elements of hybrid cloud connectivity and 6 hybrid cloud best practices.
Posted: 09 Feb 2021 | Published: 04 Feb 2021

Datavita

Converged Network, Storage and Compute Infrastructure: Are we there Yet?
sponsored by TechTarget Networking
EBOOK: Access this expert e-guide to learn how you can make a converged network infrastructure a reality and achieve top efficiency.
Posted: 19 Sep 2013 | Published: 19 Sep 2013

TechTarget Networking

The Intelligent Campus LAN
sponsored by Juniper Networks, Inc.
EGUIDE: Access this Tech Guide from SearchNetworking.com to learn how you can update your campus LAN to address the modern needs of your network, including application delivery and mobility.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

Juniper Networks, Inc.

Unified Data Center Fabric: Reduce Costs and Improve Flexibility
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover how implementing a Unified Fabric can reduce costs and improve the alignment of data center assets to better fulfill business requirements.
Posted: 18 Oct 2012 | Published: 18 Oct 2012

Cisco Systems, Inc.

Minimize LAN Switch Tiers to Reduce Cost and Increase Efficiency
sponsored by Juniper Networks, Inc.
ANALYST REPORT: Established LAN design practices were created for an environment of limited switch performance. Today's high-capacity switches allow new design approaches, thus reducing cost and complexity in campus and data center LANs. Read this Gartner report to learn about maximizing LAN performance by minimizing LAN switch Tiers.
Posted: 25 Jan 2010 | Published: 17 Nov 2009

Juniper Networks, Inc.

Forrester Thought Leadership White Paper: Exploring the Potential Benefits of End-to-End Convergence of Data Center Networks
sponsored by Cisco Systems, Inc.
WHITE PAPER: This whitepaper discloses the results of an evaluation of end-to-end storage area network/local area network (SAN/LAN) networking issues including Fibre Channel over Ethernet (FCoE) adoption.
Posted: 14 Feb 2012 | Published: 14 Feb 2012

Cisco Systems, Inc.

Advanced Virtualization E-Book: Chapter 7 - Network Virtualization: Unifying the Data Center
sponsored by TechTarget Security
EBOOK: We are potentially at the beginning of a new generation of IT administrators who manage a range of technologies outside of the traditional realm of virtualization. Read this E-Book to learn more.
Posted: 04 Aug 2010 | Published: 04 Aug 2010

TechTarget Security