-
IPv6 addressing requires special attention to ensure security
Editor's note: IPv6 auto-configured addresses have raised concerns about the security and privacy consequences of IPv6 addressing. IPv6 auto-configured addresses have three security implications:
...20 Jun 2013 -
Cisco CEO John Chambers promises to streamline
In the months leading up to Cisco Live, the company struggled with stocks trading at an all-time low, massive layoffs pending and a loss in share of the Ethernet switching
...04 Aug 2011 -
Brocade's Jim McHugh on the Brocade-Foundry merger, data center networks
Earlier this year, Brocade hired former Nortel enterprise networking chief Jim McHugh as its chief marketing officer. SearchNetworking.com caught up with McHugh at Interop last week. In this two-part
...04 May 2010 -
NetWorld+Interop 2001: Focus on networking's future
SearchNetworking is set to bring you special coverage from NetWorld+Interop 2001 in Las Vegas. Our N+I event page will feature breaking news as well as the latest product announcements...07 May 2001
-
Career advancement in four steps: Computer networking certification and career advice
...04 Aug 2009
#1 winner -
Network access control market crushed by economy, but future is bright
The network access control (NAC) market suffered through a "bloodbath" toward the end of 2008, but enterprises still plan to ramp up their spending in this network security technology in 2009 and beyond...08 Jul 2009
-
IBM re-enters networking market with Brocade OEM deal
By inking a new OEM agreement with Brocade, IBM is re-entering the networking market. Big Blue announced this morning that it will begin...28 Apr 2009
-
How to evaluate and manage UTM for network security
Unified threat management (UTM) is a promising approach to consolidating security controls, including firewalls, intrusion prevention, anti-virus, content filtering, and reporting. There are, however,
...16 Mar 2009 -
Return-all-values script: Managing Windows networks using scripts, Part 13
...19 Nov 2008
-
Properties of Windows Management Instrumentation: Managing Windows networks using scripts, Part 12
...08 Oct 2008
-
NBAR (Network Based Application Recognition)
What is NBAR (Network Based Application Recognition)?
Network Based Application Recognition (NBAR) is a mechanism that classifies and regulates bandwidth for network applications to ensure
...17 Sep 2008 -
Wireless security protocols -- How WPA and WPA2 work
Find out how WPA and WPA2 improve upon WEP's encryption methods for better wireless security. The previous tip in this series on wireless encryption methods explained how...13 Mar 2008
-
Troubleshooting the mystery error -- Managing Windows networks using scripts, part 7
This tip on managing Windows networks using scripts, originally published on WindowsNetworking.com...16 Jan 2008
-
Remote scripting first steps -- Managing Windows networks using scripts, Part 6
Learn how to run your script remotely against a remote Windows XP computer in this tip, originally published on WindowsNetworking.com...12 Dec 2007
-
Understanding WMI -- Managing Windows networks using scripts, part 3
Learn how Windows Management Instrumentation (WMI) works and how it can be scripted using VBScript in this tip, originally published on WindowsNetworking.com...26 Sep 2007
-
USB direct cable connection: Cabling tips for network professionals, lesson 10
Serial and Parallel Direct Cable Connections are considered to be a bit "old fashioned" these days. USB Direct Cable Connection (DCC), on the other hand, belongs in the "new fashioned" category. USB
...17 Sep 2007 -
Wireless network security: Controlling secondary connections
College students do it. Coffee shop customers do it too. Your neighbor in Apartment 3C is probably doing it right now.
Many computer users search for an available wireless network to tap into --
...29 Aug 2007 -
Cleaning up: Managing Windows networks using scripts, part 2
In the continuation of his series on managing different aspects of Windows networks using scripts, Mitch Tulloch walks you through the steps of "tidying up" a simple script that changes the IP addr...16 Jul 2007
-
Managing Windows networks using scripts -- The basics
Learn how to automate daily administration tasks and manage your networks in this tip from WindowsNetworking.com...22 May 2007
-
Bearer Independent Call Control (BICC)
Bearer Independent Call Control (BICC) is a signaling protocol based
...11 Apr 2007
Network Management Strategies for the CIO