Networking

SDN, NFV, and a host of other cutting-edge technologies are hitting your network faster than you can say Ethernet Fabric. But which are truly critical?

  • Wireless Network Request 2016

    Tools & Templates // Mar 2016 // provided by Aerohive Networks

    Download this RFP template to easier gather proposals and to determine which vendors offer the best value to your business.

    Download Now
  • Job description: Wireless network engineer

    Tools & Templates // May 2016 // provided by Tech Pro Research

    Your company is going wireless with plans to connect remote employees, make use of mobile apps and streamline your work environment. But what about those traditionally difficult-to-solve issues, such as security and reliability? What you are going to need is a wireless network engineer, a job that is growing increasingly ...

    View This Now
  • Power checklist: Managing and troubleshooting Linux user accounts

    Tools & Templates // Apr 2016 // provided by Tech Pro Research

    This checklist offers management guidelines and solutions to problems you’re likely to run into with Linux user accounts. You can print the list or use it in electronic form.

    View This Now
  • Software automation policy guidelines

    Tools & Templates // Apr 2016 // provided by Tech Pro Research

    Software automation policies are system-defined, or administrator-defined, sets of rules that govern the execution of automated actions. Examples of automated actions include running a report using the parameters that were obtained from the policy, sending an alert to the administrator, and executing a command or running a task on managed ...

    View This Now
  • Virtualization policy

    Tools & Templates // Dec 2015 // provided by Tech Pro Research

    Virtualization allows companies to run applications, operating systems and even networks in a sort of logical “sandbox” which eliminates the need for much physical hardware. While the virtual hosts themselves are physical, they may be located on-site or in the cloud at someone else’s data center. The virtualized resources act ...

    View This Now
  • Network Security Policy

    Tools & Templates // Dec 2015 // provided by Tech Pro Research

    Any given company’s network is made up of devices which transmit and store information. This can include internal and external systems either company-owned or leased/rented/subscribed to.In order to protect company data and reputation, it is essential to ensure the network is secured from unauthorized access, data loss, malware infestations and ...

    View This Now
  • Internet and E-mail usage lunch and learn presentation

    Tools & Templates // Nov 2015 // provided by Tech Pro Research

    This pre-packaged presentation contains everything you need to instruct end users about the proper use of e-mail and Internet resources in your organization--even if you don't consider yourself a public speaker. It includes a PowerPoint presentation and speaker's notes, Outlook e-mail invitation, feedback form, handouts, a copy of the policy, ...

    View This Now
  • Streaming media policy

    Tools & Templates // Aug 2015 // provided by Tech Pro Research

    Streaming media involves access to audio/video content via the internet. There are many legitimate business reasons to access streamed audio and video files, such as engaging in training, reviewing news or industry-related content or conducting business research. However, much streamed media content is strictly entertainment-based and serves little or ...

    View This Now
  • P2P File Sharing Policy

    Tools & Templates // Jun 2015 // provided by Tech Pro Research

    Tech Pro Research's P2P File Sharing Policy can help you provide guidelines for the proper use of P2P file sharing.You can download the policy template and use it as is or modify it to suit your needs.The use of email systems to send large files has become obsolete. Peer to ...

    View This Now
  • Penetration Testing and Scanning Policy

    Tools & Templates // Feb 2015 // provided by Tech Pro Research

    System or network vulnerabilities and security threats can severely impact business operations or even shutter its doors. However, these incidents can be prevented by proactively detecting potential threat opportunities. Penetration tests and scans can be conducted both inside the organization and against external points of entry such a routers, email ...

    View This Now