-
Why do Linksys WMP300N wireless cards have three antenna connectors?
Before you make a larger antenna for your wireless network card, know how the Linksys WMP300N connects to its antenna, and understand why it has three connectors.30 Nov 2008
-
Can building T3 lines using satellite be cheaper than a carriers'?
Would building your own T3 leased line be cheaper than a standard carrier's service? Our networking fundamentals expert explains this and how a large capacity link reacts over satellite communicati...28 Nov 2008
-
Internet Routing in Space (IRIS)
Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.S. Department of Defense to place an IP (Internet protocol) router on a geostationary satellite... (C...27 Nov 2008
-
Wireless LAN investment chugs along during recession
A worsening economy hasn't dampened enterprise interest in wireless LAN investment. Companies will turn to the technology to save money and improve productivity during hard times.26 Nov 2008
-
Differences between WLANs, Wi-Fi and WiMax
Wireless networking expert Lisa Phifer explains the differences between WLAN, WiMax and Wi-Fi and provides an excellent tutorial on what separates Wi-Fi from WLAN.24 Nov 2008
-
phase-change cooling (vapor cooling)
Phase-change cooling, also called vapor cooling, is a microprocessor-cooling technology that works according to the same principles as a conventional refrigerator, freezer or air conditioner. The p...20 Nov 2008
-
Network consolidation in data centers essential to reducing costs
The next generation of data center design puts a focus on speedier, better-managed networks to do more work at half the price.20 Nov 2008
-
Return-all-values script: Managing Windows networks using scripts, Part 13
One way to manage your Windows network is through scripts. The particular workhorse script described in this tip can return all values of all properties of a specific instance of a Windows Manageme...19 Nov 2008
-
HTTP error code troubleshooting, Part 2: How to use IIS tool WFetch
You can understand what's causing an HTTP error by looking at the error code, but sometimes that's not enough. In this tip, learn how to use network analysis tool WFetch, from Microsoft's Internet ...18 Nov 2008
-
During a recession, align the network with business priorities
During the recession, network managers should align the network with corporate goals to survive budget cuts. At the Gartner Enterprise Networking and Communications Summit, an analyst lays out a bl...18 Nov 2008
-
LANs vs. WLANs: Which network designs are used for each company size?
Which network design is easier to implement, LANs or wireless LANs? Our network administration expert explains this and which designs best fit particular functions and areas of your organization.17 Nov 2008
-
Poor data-loss prevention practices almost cost Intel a billion
While Intel's network security logged meticulous employee access data, red flags weren't raised to stop one potential thief until he had made off with the data.13 Nov 2008
-
How can I block my competitor's IP address range from my website?
Are you looking for free network tools to find an IP address range? This advice from our security expert shows you whois tools available to you and then explains how to block these ranges from view...12 Nov 2008
-
More than 1 million DNS servers still vulnerable to Kaminsky
More than 1.3 million DNS servers are still exploitable by the Kaminsky vulnerability, according to new research from vendors Infoblox and DNSstuff.12 Nov 2008
-
Best practices for securing your wireless LAN
Perhaps the biggest network security concern for many enterprises is securing a wireless local area network (WLAN). This three-part expert lesson provides best practices for securing a WLAN in the ...11 Nov 2008
-
cognitive radio (CR)
Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which are not, and instantly move into vacant ch...10 Nov 2008
-
Peltier effect
The Peltier effect is a temperature difference created by applying a voltage between two electrodes connected to a sample of semiconductor material. This phenomenon can be useful when it is necessa...10 Nov 2008
-
Controlling network access by MAC address restriction on wired networks
If you've used MAC address restriction to control your network access on your wireless router, can you extend this to your wired network? Our security expert explains in this response.10 Nov 2008
-
Retrieve network resources and email after installing ISA Server 2004
After a Microsoft ISA Server 2004 Standard Edition installation, learn how to retrieve email and access to network resources in this expert explanation on how to adjust your Internet Security and A...10 Nov 2008
-
thermoelectric cooling
Thermoelectric cooling is a way to remove thermal energy from a medium, device or component by applying a voltage of constant polarity to a junction between dissimilar electrical conductors or semi...07 Nov 2008
Network Management Strategies for the CIO