Networking

SDN, NFV, and a host of other cutting-edge technologies are hitting your network faster than you can say Ethernet Fabric. But which are truly critical?

  • White Papers // Dec 2014

    2014 ZDNet Report - Reducing Infrastructure Cost and Complexity Through Colocation

    The growing complexity of managing datacentres is forcing organisations to take a hard look at co-location as a viable alternative to maintaining their in-house datacentre needs. Co-location will allow organisations to have the facilities they need, with provided space, power, cooling, and physical security for the server, storage, and networking...

    Sponsored By M1

  • Videos // Nov 2014

    Video - HP LiveVault

    This video is a demonstration of how LiveVault, a cloud-based server data protection solution from HP Autonomy, can be used to protect critical file data stored on a HP StoreEasy Storage appliance.

    Sponsored By HP

  • White Papers // Nov 2014

    Unified IT Monitoring: A Necessity in the Application Economy

    To proactively monitor and manage alarms, performance and SLAs across even the most dynamic and complex environments, you can leverage CA Unified Infrastructure Management and get a single platform to manage your IT infrastructure and services-whether they’re on premise or in the cloud. Built for both service providers and enterprise...

    Sponsored By CA Technologies

  • White Papers // Nov 2014

    The Power and Payback of Unified IT Monitoring

    Today’s IT leaders are faced with a seemingly intractable problem. On the one hand, they are pressured to support new technologies and innovations, such as client mobility and cloud services. At the same time, the growing use of agile development techniques and the move towards an “app economy” are accelerating...

    Sponsored By CA Technologies

  • White Papers // Nov 2014

    Basic Components and Considerations for Deploying Video Conferencing Solutions

    Video Conferencing as a fundamental tool for businesses to enhance communication and collaboration between employees, partners and customers. With video conferencing becoming a core component of IT infrastructure that enables communication and collaboration, businesses are looking to providers of telephony, business applications and network infrastructure services to include this capability...

    Sponsored By Polycom

  • eBooks // Nov 2014

    Analyzing the Neverquest Malware Threat

    Learn from the F5 Security Operations Center's analysis of the Neverquest malware threat. The team analyzes the programming techniques and methodologies used to develop malware in order to keep F5 security services up to date and effective against any threat. Read this summary report to better understand how it works...

    Sponsored By F5

  • White Papers // Nov 2014

    Operationalizing the Network with SDN

    The focus of SDN is on transforming the network to support applications and meet the expectations of users and businesses that rely on them. Scaling modern networks is challenging due to the explosive growth of compute, network, and application resources─combined with increased mobility of apps migrating to the cloud and...

    Sponsored By F5

  • White Papers // Nov 2014

    EMC’s Comprehensive Flash Strategy

    How fast is fast enough!? Discover how EMC is demonstrating, once again, its core competency for dramatic—and necessary—change within the flash storage space.

    Sponsored By EMC

  • White Papers // Oct 2014

    The Cyber Resilience Blueprint: A New Perspective on Security

    The traditional workplace is changing to digital workplace at an exponential rate. This shift has made the workplace more agile and competitive – yet also more vulnerable to cyber attacks. This report goes over the paradigm shift that uses security intelligence laying the foundation for a resilient security strategy. It...

    Sponsored By Symantec

  • Downloads // Sep 2014

    Code faster. Create faster code.

    Intel VTune Amplifier XE 2015 is the premier performance profiler for C, C++, C#, Fortran, Assembly, and Java. Collect rich performance data to tune for hotspots, threading, locks and waits, DirectX, bandwidth, and more. Gain fast insight into performance bottlenecks. Automate regression tests. Intel VTune Amplifier XE 2015...

    Sponsored By Intel Software

  • White Papers // Aug 2014

    What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware? - Report

    Mobile security is more than protecting the device. It is protecting applications on the device and preventing data leakage in the enterprise. IBM Security AppScan helps determine vulnerabilities early in the application development cycle to eliminate vulnerabilities malware can exploit.

    Sponsored By IBM

  • White Papers // Aug 2014

    IBM Threat Protection System

    IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.

    Sponsored By IBM

  • White Papers // Aug 2014

    Forrester Report: Build a Better Business Case for UC

    This report details Forrester Research, Inc.’s recommendation for IT professionals building out a Unified Communications and Collaboration infrastructure within their business. The key to success of a UC deployment is delivering benefits to both users and business units. This report guides IT professionals through the key needs, drivers, and likely...

    Sponsored By ShoreTel

  • White Papers // Aug 2014

    Unified Communications Buyers Guide: The Top Ten Requirements for a UC Solution

    This document offers an overview of the current top ten requirements to consider for a premise-based UC solution, with features called out as well as a ShoreTel case study.

    Sponsored By ShoreTel

  • White Papers // Jul 2014

    Survey Report - Remote Collaboration Challenges & Strategies to Overcome

    Polycom surveyed 5,000 business professionals from all job levels around the world that focused on collaboration challenges to support a mobile and flexible working environment. Download this survey to learn what these Senior IT professionals say are their biggest remote collaboration challenges and discover the strategies they deploy to...

    Sponsored By Polycom

  • Case Studies // Jul 2014

    A Forrester Total Economic Impact Case Study

    Forrester Research conducted a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Polycom voice solutions for Microsoft Lync. Download this case study to understand the framework for evaluating the potential financial impact of Polycom voice solutions within their organizations....

    Sponsored By Polycom

  • White Papers // May 2014

    The Complete Guide to Disaster Recovery Planning

    Whether man made or naturally occurring, disasters can be a real threat to a company’s survival. Some common disasters include : Catastrophic security compromise Fire Flood Earthquake Power failure This comprehensive guide will help you understand what a disaster recovery plan is and how to effectively implement one for your...

    Sponsored By Macquarie Telecom Australia

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • White Papers // Apr 2014

    The 5 Technology Trends You Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • Downloads // Mar 2014

    Free Trial - Unified IT Monitoring for Infrastructure and Applications with up.time®

    Powerful and Unified IT Monitoring Software: From physical to virtual to cloud, get the deep reporting and proactive monitoring you need to stay on top of IT performance, availability, and capacity. up.time® has customizable and role-based dashboards to monitor Servers, VMs, Applications, Services and the Network across all platforms, on-premise,...

    Sponsored By Uptime Software

  • White Papers // Jan 2014

    The Role of the Network in Cloud Computing

    For a network that better supports your cloud and brings the most value possible to your business, its design has to be considered in the early stages of cloud planning. Read the white paper "Networking for cloud computing" to discover specific networking considerations for public, private and hybrid clouds.

    Sponsored By IBM

  • White Papers // Jan 2014

    Types of Prefabricated Modular Data Centers

    Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for...

    Sponsored By APC by Schneider Electric

  • White Papers // Oct 2013

    Best Practices for Selecting a Vulnerability Management (VM) Solution

    With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find...

    Sponsored By Qualys

  • White Papers // Oct 2013

    Consolidation: The Foundation for IT and Business Transformation

    How many helpdesks do you have in your business right now? How many IT service management tools, or versions of the same business application is your organization using right now? If the answer to any of these is greater than one, your organization may be operating with a handicap that...

    Sponsored By ServiceNow

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Most companies know that allowing employees to use personal devices improves productivity and job satisfaction. It can also reduce costs and allow for building virtual teams through geographically dispersed talent. But how can you make sure these devices don’t introduce new threats, impact compliance or monopolize bandwidth? Read the White...

    Sponsored By Dell

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    There is good reason for IT to get involved in and maintain “bring your own device” (BYOD) procedures. These devices bring more than employee convenience — they promote agility and efficiency throughout your business. However, it’s on IT’s shoulders to form a pragmatic strategy to secure data from malware, theft...

    Sponsored By Dell

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Feb 2013

    Maximise the effectiveness of collaboration

    To be competitive in today's tough economic environment, your business needs to be agile and flexible. With your teams separated by time and space, are you giving them the correct tools to be effective and win the business or ensure the highest level of customer satisfaction? The collaboration whitepaper from...

    Sponsored By Plantronics

  • White Papers // Jan 2013

    Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors

    PassMark Software® conducted objective performance testing on eight security software products, on Windows 7 Ultimate Edition (64-bit) during January 2013. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. This report presents our results and findings...

    Sponsored By Webroot Software

  • White Papers // Aug 2015

    A Comprehensive Human Factor Framework for Information Security in Organizations

    Human factor represent an essential issue in the security of information in organizations, as human factor determine the behavior of the employees toward information security. This paper attempts to integrate related human factors, recognized by previous paper, into a structured comprehensive framework. The framework has four main domains that take...

    Provided By Journal of Theoretical and Applied Information Technology

  • Webcasts // Aug 2015

    Advancing Internet Security Research With Big Data and Graph Databases

    The OpenDNS IntelDB is a graph database system that captures and stores all security-related data for the entire organization. In addition to providing valuable data such as whitelisting and threat attribution, this system is the foundation for the next generation of security research at OpenDNS. The webcast will give a...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Analogue Network Security

    Today, it is the inter-infrastructural foundation of civilization. The internet of things is adding so-called intelligence to some 50+ billion endpoints. Where's the security? Or privacy? Massive new projects using next generation, smarter, faster ways of doing the same old stuff all over again is the ultimate deja vu epic...

    Provided By SecurityTube.net

  • Case Studies // Aug 2015

    Riverbed Helps JLL Maximize Productivity in Transition to Hybrid Apps and Networks

    JLL is a professional services and investment management firm offering specialized real estate services to clients in real estate. Their challenges are to evolve IT environment to support company's global growth and industry leadership and accommodate growing amount of network traffic without degrading application performance. They chose Riverbed Technology to...

    Provided By Riverbed Technology

  • Webcasts // Aug 2015

    Approaching Secure Code

    In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected software are occurring every day. Developers must learn to code in a secure fashion to have any chance of providing...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Changing Network Detection Using Distributed Computing Concepts

    In this webcast, the presenter will focus on new network detection methodologies by leveraging Bro to send data to a backend or cloud. Here they can process the data where resources are not as limited. Sensors may also be treated as expendable resources that can easily be swapped out. The...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Proprietary Network Protocols - Risky Business on the Wire

    When speed and latency counts, there is no place for standard HTTP/SSL stack and a wise head comes up with a proprietary network protocol. How to deal with embedded software or thick clients using protocols with no documentation at all? Binary TCP connections, unlike anything, impossible to be adapted by...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Information Security Reconciliation: The Scene and the Profession

    Whether people want to admit it or not, there's a strong, concerning segmentation that's more obvious than ever within information security. On this 5th anniversary of security B-Sides Detroit, this presenter will provide an unapologetic perspective of what the presenter have seen, what the presenter am seeing and what the...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    10 Reasons Your Security Education Program Sucks

    There's no patch for human stupidity-"Training users is a waste of time and resources". Comments like these are not uncommon in the information security community. To that the presenter says, "Seriously guys, it doesn't have to be this hard". In this webcast, the presenter will go through the top ten...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Cymon: New Cyber Monitoring Tool

    It is the largest tracker of open-source security reports on malware, botnets, phishing and other malicious activities. Cymon ingests over 50K events and 15K unique IP's per day from almost 200 sources across the Internet to build a threat profile and timeline for IP's, domains and URLs.

    Provided By SecurityTube.net

  • White Papers // Jun 2015

    Cisco Intelligent WAN Technology Design Guide

    Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more...

    Sponsored By Cisco Systems

  • eBooks // Aug 2015

    The True Impact of Tags: IT's Guide to Third Party Monitoring

    This eBook addresses the impact various third parties have on your site and the challenges IT/Ops faces to meet both business and performance expectations, while also providing a game-plan to manage risk and latency carried by content served from outside your infrastructure.

    Sponsored By Catchpoint Systems

  • White Papers // Jul 2015

    Best Practices to make BYOD simple and secure

    Bring-your-own-device (BYOD) programmes and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops. This white paper provides guidance for introducing BYOD to help people become more mobile and productive while IT adapts to consumerisation in a simple, secure and...

    Sponsored By Citrix Systems

  • White Papers // Jun 2015

    The Evolution of IP Storage and Its Impact on the Network

    This ESG whitepaper highlights that by isolating the storage network, high-traffic non-storage events that could impact mission-critical workloads can be eliminated, providing more predictability for workload bandwidth, along with higher performance and availability. Read more and learn how to improve your IP storage network availability. Powered by Intel® ...

    Sponsored By HDS

  • White Papers // May 2015

    How to Build an Always-On Infrastructure

    Real-time customer expectations are driving the need for an always-on business environment. To keep pace with these demands, organisations need to deploy innovative, mobile solutions and manage explosive data growth, while also reducing risk and costs. To gain a competitive advantage, organisations need an always-on infrastructure that is future...

    Sponsored By HDS

  • eBooks // Aug 2015

    Catchpoint: The True Impact of Tags: IT's Guide to Third Party Monitoring

    This eBook addresses the impact various third parties have on your site and the challenges IT/Ops faces to meet both business and performance expectations, while also providing a game-plan to manage risk and latency carried by content served from outside your infrastructure. Read more...

    Sponsored By Catchpoint Systems

  • White Papers // Jul 2015

    Cisco Paper: Enterprise Network Security Solutions

    Security analysts used to say it’s not a question of if you’ll be attacked but when. Today, the facts are even more alarming: we no longer need to wonder when your network will be targeted. Your business is under attack right now. According to the Cisco 2014 Annual Security Report,...

    Sponsored By Cisco Systems

  • White Papers // Jul 2015

    IDC paper: The Business Value of UCS as a Platform

    IDC finds that leveraging data analytics in business decisions is becoming a top priority for an increasing number of companies. This in turn is placing new demands on IT organizations; the need is twofold: to manage new streams of unstructured data from sources such as social media and to speed...

    Sponsored By Cisco Systems

  • White Papers // Jul 2015

    Cisco Case Study: Powering World Motor-Racing Events

    A Cisco Wi-Fi network gives racing community highly secure communications and consistent web access anywhere. Download this case study to learn how Cisco solved all the challenges facing MST: • Provide a robust, resilient Wi-Fi network for rapid race setup all over the world • Protect data security and separation...

    Sponsored By Cisco Systems

  • White Papers // Jul 2015

    ZK Research: WiFi and the Need for Multigigabit Networks

    Historically, the speed of a wired connection at the access edge has always been faster than that of a wireless connection. This means workers had to choose between the performance of wired connectivity and the convenience of a wireless connection. The era of LAN-like wireless is finally here. Now, users...

    Sponsored By Cisco Systems

  • White Papers // Jul 2015

    Cisco 2015 Annual Security Report

    Cybersecurity is a broad and complex topic that has a far-reaching impact on users, companies, governments and other entities around the world. The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race...

    Sponsored By Cisco Systems

  • White Papers // Jul 2015

    ESG Paper: Cisco’s Intelligence Security Architecture

    Nowadays, all organisations face an unprecedented threat landscape, resulting in the recent wave of data breaches at organisations like Target, Home Depot, and JPMorgan Chase. Given this dangerous situation, CISOs must move beyond security controls for prevention alone and organisations must vigorously hunt down malicious cyber-activities by collecting and analysing...

    Sponsored By Cisco Systems

  • White Papers // Mar 2015

    Forbes Paper: Boost Innovation With Video

    Video communications and videoconferencing have been a part of corporate life for decades. It already is a staple of executive conference rooms, and many larger organizations maintain in-house or contracted video capabilities for special events and presentations. Now, thanks to easy-to-use technology and affordable options, a wide range of employees...

    Sponsored By Cisco Systems

  • White Papers // Aug 2015

    Altering Business Efficiency and Agility with Integrated Systems

    The era of IT infrastructure convergence is upon us. Integrated converged infrastructure systems – the integration of computer, networking, and storage - have rapidly become the preferred foundational building block adopted by enterprises of all shapes and sizes. 'Intel and the Intel logo are trademarks of...

    Sponsored By HP and Intel UK

  • White Papers // Apr 2015

    Monitoring network performance doesn’t have to be hard or expensive

    See how easy and affordable it can be with SolarWinds Network Performance Monitor in under an hour. No consultants, no costly professional services, and no lengthy implementation cycle. With SolarWinds Network Performance Monitor you can quickly detect, diagnose, and resolve network performance issues and outages so you can spend...

    Sponsored By Solarwinds APAC

  • Downloads // Jul 2015

    Download a Trial of IP Address Manager

    Are you still using spreadsheets to manage your IP space? The explosion of IP-enabled devices in corporate networks has increased the complexity of IP space management beyond what can be handled with spreadsheets or other home-grown tools. SolarWinds IP Address Manager makes it easier than ever to manage and...

    Sponsored By Solarwinds APAC

  • Downloads // Jul 2015

    Why is the app slow? Download a trial of SolarWinds Application Monitor & find out.

    3 reasons to consider SolarWinds Server & Application Monitor: Out-of-the-box monitoring for almost everything - servers, virtual infrastructure & 150+ apps. Easy customization for your enterprise needs - customize templates, alerts, reports & dashboards. Great value! Baseline thresholds, asset management and specialized SQL monitoring all in 1 product! ...

    Sponsored By Solarwinds APAC

  • Downloads // Feb 2015

    Check Virtual Machine Health in Minutes!

    It's time for your FREE VMware & Hyper-V Healthcheck with Virtualization Manager. So much change occurs in your VM environment, it can be hard to stay ahead of potential problems like: Storage I/O bottlenecks Memory & CPU over-utilization VM sprawl wasting resources Capacity shortfalls Over & undersized VMs And on...

    Sponsored By Solarwinds APAC

  • Downloads // Aug 2015

    Reduce Troubleshooting Time Up to 59% in Your Virtual Environment

    Know exactly where to look when there’s a problem. SolarWinds® Virtualization Manager shows your entire virtualisation stack from VM to storage, highlighting performance bottlenecks along the way. Immediate view of normal, informational, warning, and critical alerts of your virtual infrastructure Detailed visibility into all virtualisation layers showing live performance and...

    Sponsored By Solarwinds APAC

  • Downloads // Jan 2015

    Network Performance Monitoring Tool from SolarWinds

    Monitoring your network with SolarWinds Network Performance Monitor (NPM) will not only help you improve the performance of your network, but it can also have a direct impact on your organization’s bottom line. NPM will assist in: Simplifying detection, diagnosis, & resolution of network issues before outages occur Tracking response...

    Sponsored By Solarwinds APAC

  • White Papers // Aug 2015

    2015 Exclusive Report: Profiling Infrastructure Leaders

    This exclusive research uncovers where the priorities for tomorrow’s infrastructure lie, and what gaps exist between firms that are successfully transforming traditional IT functions and those that have yet to begin. Your infrastructure must be ready to support the demands of an increasingly digital business that benefits from cloud, Big...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Aug 2015

    Mobile Information Management (DE)

    The shift to BYOD is not new. It has been a source of industry debate for a few years and is a logical evolutionary step in the consumerization of IT process that took root in the mid-1990s. In fact, given the advanced capabilities of consumer-grade technology, it is more appropriate...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Aug 2015

    Mobile Information Management

    The shift to BYOD is not new. It has been a source of industry debate for a few years and is a logical evolutionary step in the consumerization of IT process that took root in the mid-1990s. In fact, given the advanced capabilities of consumer-grade technology, it is more appropriate...

    Sponsored By Hewlett-Packard (HP)

  • Webcasts // Aug 2015

    On-demand Webroot Webinar: How to fight modern malware with the power of collective threat intelligence

    Webroot has seen a continued rise in the number of malicious URLs, IP addresses, malware, and mobile applications used to enable cybercriminals to steal data, disrupt services, or cause other harm. According to Webroot, over 20 billion new internet-connected devices are expected to come online in the next few...

    Sponsored By Webroot

  • White Papers // Apr 2015

    Why is the app slow? Download a trial of SolarWinds Application Monitor & find out more

    3 reasons to consider SolarWinds Server & Application Monitor: Out-of-the-box monitoring for almost everything – servers, virtual infrastructure & 150+ apps. Easy customization for your enterprise needs – customize templates, alerts, reports & dashboards. Great value! Baseline thresholds, asset management and specialized SQL monitoring all in 1 product! ...

    Sponsored By Solarwinds APAC

  • White Papers // Jul 2015

    Network Performance Monitoring Tool from SolarWinds!

    Monitoring your network with SolarWinds Network Performance Monitor (NPM) will not only help you improve the performance of your network, but it can also have a direct impact on your organization’s bottom line. NPM will assist in: Simplifying detection, diagnosis, & resolution of network issues before outages occur Tracking response...

    Sponsored By Solarwinds APAC

  • White Papers // Jan 2015

    Download a Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By Solarwinds APAC

  • Downloads // Feb 2015

    Check Virtualization Health in Minutes. It's FREE!

    It's time for your FREE VMware & Hyper-V Healthcheck with Virtualization Manager. So much change occurs in your VM environment, it can be hard to stay ahead of potential problems like: Storage I/O bottlenecks Memory & CPU over-utilization VM sprawl wasting resources Capacity shortfalls Over & undersized VMs And on...

    Sponsored By Solarwinds APAC

  • Downloads // Feb 2015

    Download a Trial of IP Address Manager from SolarWinds!

    Are you still using spreadsheets to manage your IP space? The explosion of IP-enabled devices in corporate networks has increased the complexity of IP space management beyond what can be handled with spreadsheets or other home-grown tools. SolarWinds IP Address Manager makes it easier than ever to manage and...

    Sponsored By Solarwinds APAC

  • Downloads // Feb 2015

    Download a trial of SolarWinds Application Monitor & find out.

    3 reasons to consider SolarWinds Server & Application Monitor: Out-of-the-box monitoring for almost everything – servers, virtual infrastructure & 150+ apps. Easy customization for your enterprise needs – customize templates, alerts, reports & dashboards. Great value! Baseline thresholds, asset management and specialized SQL monitoring all in 1 product! ...

    Sponsored By Solarwinds APAC

  • Downloads // Apr 2014

    Stadiums race to digitize (PDF download)

    Younger fans are leaving stadiums when they can't get connected, so sports teams are finally embracing technology as a way to improve the fan experience and increase the team’s bottom line. Download the full feature article from TechRepublic's Teena Hammond in magazine format as a free PDF that you can...

    Provided By TechRepublic

  • Downloads // Nov 2006

    Use this template to configure QoS on your Cisco router

    Using quality of service (QoS) on Cisco network devices helps provide both bandwidth and priority to certain types of network traffic. Configuring QoS on your Cisco router can be tricky, but this template can help. As a companion download to David Davis' article, "Configure QoS on your Cisco...

    Provided By David Davis

  • Tools & Templates // Feb 2010

    Server Deployment/Migration Checklist

    One configuration error or overlooked step can send your server deployment off a cliff. This simple checklist will help you complete the process efficiently and avoid costly mistakes.Visit our Network Administrator blog for more networking resources.

    Provided By Erik Eckel

  • Research // Dec 2014

    Conferencing Loud & Clear

    We spend hours in phone conferences with colleagues, clients, and customers every day, but poor sound quality can turn a productive collaboration into a time-wasting drag. Next-generation conference phones deliver whole-room coverage and crystal-clear audio that keeps participants engaged. Have you ever dialed into a conference call, only to...

    Provided By VTech

  • Downloads // Sep 2002

    Network outage report template

    This Microsoft Word template will help you report a network or Web site outage, document the steps taken to resolve the issue, and indicate who was notified of the problem.

    Provided By TechRepublic

  • Downloads // Oct 2007

    How do I... Use C# to upload and download files from an FTP server?

    Many third party components exist that enable developers to implement upload and download capabilities in their applications. With C# and the .NET Framework Microsoft has given developers this capability without the need to use third party components. Zach Smith demonstrates how to upload and download files from a FTP server...

    Provided By Zach Smith

  • Downloads // Dec 2010

    10 PowerShell commands every Windows admin should know

    PowerShell combines the speed of the command line with the flexibility of a scripting language, making it a valuable Windows administration tool. Here are a few basic commands you'll want to master. This download is also available as an entry in our 10 Thing blog.

    Provided By Brien Posey

  • White Papers // Jan 2015

    Migrating Linux applications from x86 to IBM Power Systems: A discussion of best practices

    PowerVM is a complete virtualization solution that is integrated and packaged with Power Systems. This is a very robust implementation of virtualization developed by IBM, based on best practices learned over the course of four decades of experience with the IBM mainframe. Read More..

    Provided By IBM

  • White Papers // Mar 2015

    Collaboration Unchained: Tapping the Potential of Unified Communications

    Emails, phone calls, and in-person meetings remain fundamental to how many large organizations communicate—internally and externally. However, the emergence of collaborative technologies is enabling customers, competitors and employees to innovate, disrupt and challenge the ways in which work gets done and value is created. This report produced with WSJ. Custom...

    Provided By NTT Communications

  • Downloads // May 2002

    Network Administrator skills assessment test

    This series of tests can help IT managers gauge how a job candidate for a net admin position will handle typical IT situations. The tests can also help you determine the skills sets each applicant brings to the table.

    Provided By TechRepublic