NCCM Reports

A Computer Weekly buyer's guide to network cost and bandwidth optimisation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Coming in under budget for appropriate network performance takes some strategic nous. In this 15-page buyer's guide, Computer Weekly looks at how companies can gain effective global coverage, what can be done to optimise networks in a shift towards hybrid working and why leaders should consider best practices carefully.
Posted: 25 Jul 2023 | Published: 25 Jul 2023

TechTarget ComputerWeekly.com

MicroScope – October 2020: Get in touch with remote network security
sponsored by MicroScope
EZINE: In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption
Posted: 08 Feb 2021 | Published: 02 Oct 2020

MicroScope

Dell Networking Solutions Guide for Microsoft Hyper-V
sponsored by Dell EMC and Microsoft
WHITE PAPER: This solutions guide details the four available networking configurations, and the advantages and disadvantages of each with an emphasis on typical Dell system configuration and the hardware offerings.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Dell EMC and Microsoft

Red Hat Network Satellite: Management And Automation Of Your Red Hat® Enterprise Linux® Environment
sponsored by Red Hat and JBoss
PRODUCT OVERVIEW: Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure. Learn the business benefits gained through increased productivity, reduced system life cycle costs, greater administration consistency, and enhanced security. This overview details the many features of each module...
Posted: 29 Jul 2009 | Published: 29 Jul 2009

Red Hat and JBoss

Virtual Data Center E-Zine - Volume 12
sponsored by Virtual Data Center E-Zine - Volume 12
EZINE: Virtualization has changed the concept of configuration management in data centers. In this month's issue, find out what to look for when shopping for the perfect configuration management tool. Virtualization has also had an impact on system security. Learn how to keep your virtual environment safe.
Posted: 10 Jul 2009 | Published: 10 Jul 2009

All resources sponsored by Virtual Data Center E-Zine - Volume 12

Simplifying Citrix XenApp -- Get the Insight you Need to Optimize Your Citrix Investment
sponsored by XTS
WHITE PAPER: This white paper provides an analytical perspective on how to best manage your Citrix environment.
Posted: 10 Apr 2008 | Published: 01 Apr 2008

XTS

Overcoming IP Telephony Performance Issues in a Converged Network
sponsored by Global Knowledge
WHITE PAPER: In this white paper, we are going to discuss the application of QoS to networks with media flows installed within them, such as voice and video. We'll see that it is very unnatural for voice to even exist on a data network, because it was never designed to do so.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

Global Knowledge

Security through Maturity: A Brief on Securing iSCSI Networks
sponsored by DellEMC and Intel®
WHITE PAPER: Read this white paper to learn about how Internet SCSI (iSCSI) offers a scalable, simplified, and cost-effective way to implement storage area networks (SANs) using Ethernet components.
Posted: 13 May 2009 | Published: 13 May 2009

DellEMC and Intel®

Building Your Network Foundation: Routing and Switching Made Simple
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide examines the critical issues of networking, how it works, and how it can help you achieve a competitive edge.
Posted: 28 Feb 2008 | Published: 01 Nov 2006

Cisco Systems, Inc.

Using Veritas Provisioning Manager in Multiple Site Environments: Issues, Evaluation, Recommendations
sponsored by Symantec Corporation
WHITE PAPER: Server provisioning can be transformed by the Veritas Provisional Manager, but many users stumble when trying to implement the Provisional Manager across multiple sites. Learn the considerations that should be evaluated prior to implementation.
Posted: 05 Dec 2006 | Published: 01 Mar 2006

Symantec Corporation