Transmission Control Protocol Reports

Keys to Microsoft Application Acceleration: Advances in Delivery Systems
sponsored by Citrix
WHITE PAPER: Read this paper to learn how you can ensure significantly faster access to the Microsoft applications your users depend on. Download this complimentary guide to discover how an integrated advanced delivery solution can help you.
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

Clarifying WAN Virtualization, WAN Aggregation and WAN Optimization
sponsored by Talari_DON'T USE
EGUIDE: Wide area network (WAN) virtualization, WAN optimization, and WAN aggregation are three confusing areas in the WAN world. Check out this E-Guide to learn more about WAN virtualization and the difference between these three technologies.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

Talari_DON'T USE

Riverbed Steelhead Product Family Data Sheet
sponsored by Riverbed Technology, Inc.
DATA SHEET: What's the Riverbed difference? Speed. Scalability. And simplicity. Discover it for yourself and get the facts about the entire family of Steelhead solutions from Riverbed. Companies of all sizes depend on the Riverbed Steelhead product family to accelerate the performance of applications over the WAN.
Posted: 31 Mar 2009 | Published: 31 Mar 2009

Riverbed Technology, Inc.

Comparing iSCSI Initiator Implementations
sponsored by DellEMC and Intel®
WHITE PAPER: With the advent of iSCSI as the standard for networked storage, businesses can leverage existing skills and network infrastructure to create Ethernet-based SANs that deliver the performance of Fibre Channel-but at a fraction of the cost.
Posted: 09 May 2008 | Published: 09 May 2008

TOPICS:  iSCSI SAN | TCP
DellEMC and Intel®

Keys to SAP Application Acceleration: Advances in Delivery Systems
sponsored by Citrix
WHITE PAPER: It is essential that SAP applications and network infrastructures be considered together as a "application infrastructure" that supports strategic business objectives. This paper examines the challenges associated with SAP application delivery
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

How SSL-Encrypted Web Connections are Intercepted
sponsored by TechTarget Security
EGUIDE: In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012

TechTarget Security

Solving the Scalability Problem with Big Data
sponsored by WANdisco
EGUIDE: A centralized computing strategy can keep your organization from realizing the value of big data. In this expert e-guide, learn how embracing a more distributed architecture can solve traditional scalability problems and lead to big data success. Also inside, discover the value of NoSQL options.
Posted: 03 Sep 2013 | Published: 03 Sep 2013

WANdisco

The Swiss Army Knife for the Network Analyst
sponsored by Riverbed Technology, Inc.
CASE STUDY: This exclusive case study covers a tool that helped one company with their network and protocol analysis.
Posted: 31 Jul 2014 | Published: 03 Aug 2013

Riverbed Technology, Inc.

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

Video conferencing standards and interoperability considerations
sponsored by TechTarget Security
EGUIDE: Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

TechTarget Security