Premium Content

Access "Harvesting business intelligence with network monitoring tools"

Issue Overview

Network Evolution - August 2013 / Vol. 4 / No. 4

Network technologies and architectures are rapidly changing due to a wide range of innovations from software-defined networking to gigabit wireless. It can be difficult for IT managers to know when to invest. The first step is to investigate the technology to determine if it will improve business processes and whether current network technology can easily be migrated. Network managers will also need to determine whether there are associated management tools and whether their engineers have the skills to handle the new technology.

In this issue of Network Evolution, we address some of these issues with an in-depth look at network monitoring and management for the next-generation network. We also explore the emergence of 802.11ad gigabit wireless and how it could improve BYOD connectivity. Finally, we hear from CIOs on what it will take for them to invest in SDN.  Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • How to manage and monitor the converged network
    modern_converged_network.png
    E-Handbook

    The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...

  • What does WebRTC video mean for the network?
    net_evo_0914.png
    E-Zine

    WebRTC, an emerging standard for embedding voice and video-conferencing applications into Web browsers, is aimed at making real-time communications ...

  • Context makes network security policy smarter, but not easier
    network_evo_0814.jpg
    E-Zine

    Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...