Premium Content

Access "Finally! APM vendors design tools with networking pros in mind"

Issue Overview

Network Evolution - April 2014 Vol.5 / No.3

Whenever users complain about an application being slow, the network is always first to be blamed. And yet network engineers often have limited visibility into any issues because application performance management (APM) tools have traditionally been designed for developers who better understand application architectures. But a new wave of network-based APM tools is opening up a whole new level of visibility for networking teams. In this issue of Network Evolution, we look at how new approaches to APM are empowering networking pros to become part of the resolution process.

Also in this issue, we talk to some early adopters of 802.11ac and discuss how Gigabit Wi-Fi may affect their wired networks. And lastly, we take a hard look at what makes a video conferencing deployment succeed. Although travel reduction is often considered a leading driver, enterprises say it's not the biggest benefit in the end.   Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • How to manage and monitor the converged network
    modern_converged_network.png
    E-Handbook

    The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...

  • What does WebRTC video mean for the network?
    net_evo_0914.png
    E-Zine

    WebRTC, an emerging standard for embedding voice and video-conferencing applications into Web browsers, is aimed at making real-time communications ...

  • Context makes network security policy smarter, but not easier
    network_evo_0814.jpg
    E-Zine

    Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...