May 2004

  • Proactive security patch management reaps rewards

    A new model for patch management can prevent attacks, minimize damage, and lower costs.

  • Guide to RFID

    Is RFID the answer to supply chain woes, or a serious threat to consumer privacy?

  • Guide to Bluetooth

    This guide explains what Bluetooth is, how it's used, and where it fits into the world of wireless.

  • HP's quest for proactive management

    Plenty of vendors are pitching a vision of a new enterprise IT infrastructure that is flexible, reacts in real time and incorporates plenty of new technology, from Web services to identity management to...

  • Perimeter networks

    How perimeter networks can help

  • Symbol CIO: Wireless isn't just a network tool

    LAS VEGAS -- At Networld+Interop 2004, Symbol Technologies Inc. announced a new product line called Mobility Services Suite. John G. Bruno, Symbol's chief information officer, sat down with SearchN...

  • Router Expert: Implementing router interface redundancy

    While redundancy is simple as a concept, it becomes quite problematic in practice. This tip offers the basic options for router interface redundancy.

  • Juniper and the Infranet initiative

    The Infranet Initiative is an industry call to action for collaboration in the definition and realization of a cost-effective, secure and predictable IP network infrastructure.

  • Juniper and the Infranet initiative

    The Infranet Initiative is an industry call to action for collaboration in the definition and realization of a cost-effective, secure and predictable IP network infrastructure.

  • Cool Internet utilities

    In this tip, Tom discusses a couple Internet sites that can help an admin diagnose traffic issues.

  • Taking the 'Oh, no!' out of network design

    Ever experienced the feeling of panic when you discover you're in charge of a big networking project? This article will help you approach the job in several steps.

  • Cooperative MPLS VPN security

    Provider-provisioned MPLS VPNs have become one of the industry's biggest hits, but require certain security measures.

  • Taking the 'Oh, no!' out of network design

    Ever experienced the feeling of panic when you discover you're in charge of a big networking project? This article will help you approach the job in several steps.

  • Lessons learned: Symbol's Nuti looks to verticals

    LAS VEGAS -- In January, William Nuti took over as CEO of Symbol Technologies Inc., the second largest enterprise wireless LAN infrastructure provider after Cisco Systems Inc. Nuti, who originally joined...

  • Making sense of performance management products

    The network seems fine, but Oracle keeps timing out and your CRM package is extremely sluggish. Application performance problems plague many networks, but can be difficult to diagnose.

  • Monitoring IP telephony infrastructures

    If you're seriously considering integrating voice and data, how do you prepare for the transition? This article helps you address the management and security requirements.

  • Monitoring IP telephony infrastructures

    If you're seriously considering integrating voice and data, how do you prepare for the transition? This article helps you address the management and security requirements.

  • Network cable, lesson 1: Introduction

    This series focuses on the cabling used in today's networks. This series will cover most common cables, which include UTP CAT5 straight through and crossover, Coax and a few more.

  • Chambers: Flexibility, security key to networking success

    Cisco's top executive told an N+I crowd that enterprises should craft their networks around business needs, not vice versa, and said the networking giant is putting a new emphasis on designing secu...

  • Saving configuration files

    Some low-cost ways to save your network configuration files in case you have a hardware failure.