-
Next-generation enterprise networks: Links to telecom carriers grow stronger
As the needs of next-generation enterprise networks become clearer, networking vendors and telecom carriers look toward common solutions.28 Aug 2008
-
802.11n wireless LAN adoption is booming in colleges and universities
Schools that are looking to future-proof their networks and support "learning anywhere" initiatives are leading the way in 802.11n wireless LAN adoption, according to ABI Research.27 Aug 2008
-
More remote scripting tricks: Managing Windows networks using scripts, Part 11
Learn a remote scripting trick and how to use Windows Management Instrumentation Command-line (WMIC) to remotely query for local administrators in this tip from the series Managing Windows networks...27 Aug 2008
-
How to implement VLAN switches across wireless LAN (WLAN) links
Learn different methods of creating virtual LANs (VLANs) on a wireless LAN (WLAN) in this expert response from Lisa Phifer.20 Aug 2008
-
Networking data visualization not just for pointy-headed bosses
Dipping your feet in networking data visualization doesn't take expensive software: just Excel and a little help from your friends.20 Aug 2008
-
Networking certification guide
This networking certification guide covers the majority of networking-related certifications available to IT professionals. Only credentials likely to be recognized as having value within the netwo...19 Aug 2008
-
HP ProCurve-Colubris deal signals WLAN market consolidation
As vendors strive to offer a unified portfolio of wired and wireless network technologies, enterprises can expect to see a flurry of mergers and acquisitions. HP ProCurve's purchase of wireless LAN...19 Aug 2008
-
How can I use a Layer 3 switch for voice routing?
Learn how to use a Layer 3 switch for voice routing in this expert response from a switch expert.18 Aug 2008
-
Visual Security Analysis -- 'Applied Security Visualization,' Chapter 5
Visually analyzing security data can be separated into three classes: reporting, historical analysis, and real-time monitoring. In chapter 5 from the book, 'Applied Security Visualization,' histori...18 Aug 2008
-
Are there 802.11n wireless antenna extenders to boost outdoor signal?
Learn how to increase Wi-Fi range when multipath reflections aren't enough in this advice from our wireless networking expert.14 Aug 2008
-
What does a QM FSM error signify on a VPN Concentrator?
Learn how to solve a QM FSM error when working on a LAN-to-LAN VPN from a network security expert.14 Aug 2008
-
SIEM platform secures university's open network
With security information and event management platform QRadar, Wayne State University has secured its open network without locking down its systems.14 Aug 2008
-
Streaming Olympics video will drain corporate bandwidth
Companies that don't have robust network monitoring and management technology in place may run into bandwidth trouble when NBC starts streaming 2,200 hours of live video during the 2008 Summer Olym...07 Aug 2008
-
Juniper updates Network and Security Manager to manage full portfolio
With an update of its Network and Security Manager, Juniper offers a more comprehensive management suite. By managing the security and configuration of all of its enterprise products, the company h...05 Aug 2008
-
Shifting defenses and dynamic perimeters challenge network security
Network security faces challenges from de-perimeterization and other IT trends. Fine-grained controls are needed closer to information resources and will increasingly be built into both simple and ...05 Aug 2008
-
How does WiMAX compare to other wireless broadband services?
Learn about WiMAX and similar WAN technologies, such as 3g, in an expert response from Lisa Phifer.01 Aug 2008
Network Management Strategies for the CIO