-
The secret to secure wireless LANs
Step one in building a wireless local area network: consider how much security you want. Also, you may want to keep an eye on access points that employees may be installing on the network without t...06 Jun 2002
-
Take instant messaging security seriously, part 1
Instant messengers can allow hackers to destroy a network. These fears can be put to rest by implementing enterprise IMs.05 Jun 2002
-
BroadSoft signs another carrier, but marquee customer is still elusive
BroadSoft signs another carrier, but the marquee customer is still elusive.05 Jun 2002
-
Ease applications installations in Win2K
Installing some software on Win2K? You'll need to change the default mode from execute.04 Jun 2002
-
Using Sniffer Pro Dashboard for proactive management
This tip discusses proactive network performance baselining with the Sniffer Pro protocol and network analysis tool.04 Jun 2002
-
Pelago courts OEM partners
Pelago, a packet-based telephony equipment maker, has rolled out its first product for delivering converged services for businesses.04 Jun 2002
-
Bad Packets: Recyling old ideas
Is IBM's iBoot a technological breakthrough in networking or just an old idea recycled?04 Jun 2002
-
Making Cisco and Nortel co-exist
04 Jun 2002
-
VPN alternatives: Can we trust them?
04 Jun 2002
-
Are VPN prices headed down?
The virtual private network market is booming. The VPN market is so hot, makers of consumer-oriented products may enter the business-class market and drive down prices.03 Jun 2002
Network Management Strategies for the CIO