Premium Content

Access "Harvesting business intelligence with network monitoring tools"

Issue Overview

Network Evolution - August 2013 / Vol. 4 / No. 4

Network technologies and architectures are rapidly changing due to a wide range of innovations from software-defined networking to gigabit wireless. It can be difficult for IT managers to know when to invest. The first step is to investigate the technology to determine if it will improve business processes and whether current network technology can easily be migrated. Network managers will also need to determine whether there are associated management tools and whether their engineers have the skills to handle the new technology.

In this issue of Network Evolution, we address some of these issues with an in-depth look at network monitoring and management for the next-generation network. We also explore the emergence of 802.11ad gigabit wireless and how it could improve BYOD connectivity. Finally, we hear from CIOs on what it will take for them to invest in SDN.  Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Mobile devices are gobbling up your WLAN bandwidth: Here’s how to cope
    handle_mobile_device.png
    E-Handbook

    More -- and more complex -- mobile devices are jumping on your enterprise network, gobbling up bandwidth from the WLAN infrastructure. This technical...

  • Finally! APM vendors design tools with networking pros in mind
    net_evo_0414.png
    E-Zine

    Whenever users complain about an application being slow, the network is always first to be blamed. And yet network engineers often have limited ...

  • Next-generation WLAN: How IEEE 802.11ac will change your network
    next-gen_WLAN.png
    E-Handbook

    Just five years ago, no one would have described Wi-Fi as a primary access technology but now, as Wi-Fi and cellular architectures deliver security, ...