-
2010 predictions: Important computer networking questions to ask
Learn which computer networking questions will help you plan your corporate IT budget. Our panel of experts reveal 2010 predictions which highlight trends to keep an eye for this year.17 Dec 2009
-
Search for ET requires upgrade to 10 Gigabit Ethernet switches
In their search for extraterrestrials, the SETI project researchers upgraded from 1 Gigabit Ethernet to Fujitsu's 10 Gigabit Ethernet switches to process the petabyte of radio spectrum data they an...16 Dec 2009
-
How does rain affect wireless network data transfer?
In one of the wireless data acquisition installations, there is no data transfer during rain and mist. The wireless system works in 2.4 GHz frequency. What could be the cause of this?16 Dec 2009
-
Why is the 802.11g Wi-Fi throughput speed on my smartphone slow?
I recently purchased a smartphone with Wi-Fi (802.11g) but found video over Wi-Fi to be pretty choppy. I checked SpeedTest and I don't get anywhere near 54 Mbps when connected to Wi-Fi. Why not?16 Dec 2009
-
How can I increase throughput on my wireless mesh network?
We have installed a wireless mesh network that connects two access points (APs) to mesh nodes that are mounted at 25 meters high on 23 light poles. Poles are distributed around a container yard tha...16 Dec 2009
-
Integrating wired and wireless LANs: Making the business case
With improved 802.11n performance, wireless LAN ports are overtaking Ethernet in the enterprise, and networking teams are pressed to find solutions for integrated wired and wireless network managem...16 Dec 2009
-
transparent addressing
On a wide area network (WAN), transparent addressing is a method of network addressing in which all intermediate node addresses are spoofed, so the client and server see each other's addresses and ...11 Dec 2009
-
University runs video over wireless LAN, converts multicast to unicast
Liberty University delivers IPTV to its students via its wireless network. With the growth of 802.11n networks and some custom engineering, such as converting multicast to unicast, video over wirel...10 Dec 2009
-
Mobile computing security concerns lead to more IPS, SSL VPN spending
Mobility has exposed enterprises to more sophisticated security threats, forcing them to spend more on network security, particularly intrusion prevention systems and SSL VPN solutions to improve m...09 Dec 2009
-
Virtual switch standards: Let the fighting begin (again)
New virtual switch standards offer networking admins a way to reclaim visibility and management of virtual machines, but they could also intensify the struggle between data center and networking te...08 Dec 2009
-
New virtual server networking standards to offer network admins control
ProCurve and Cisco have proposed a new set of virtual server networking standards that will give network administrators the visibility and control they've lost to server teams by using virtual swit...08 Dec 2009
-
Desktop virtualization storage strategies: Easing bandwidth and access
Without the right desktop virtualization storage strategies, implementing the technology could mean a great strain on storage area networks and the core. But with the right approach, enterprises co...08 Dec 2009
-
What IP enables file sharing among multiple computers on different Internet connections?
Learn how to enable file sharing among a group of computers, as well as computers within separate workgroups, that are using four different Internet connections, in this expert response.07 Dec 2009
-
How do I set the Web page default on a network of computers without setting them all individually?
Learn how to set a default for a network of computers if a group policy isn't working. Instead of setting each machine manually, learn what else you can do.07 Dec 2009
-
How do I change my security setting to allow ActiveX?
Learn how to change your security settings to allow ActiveX in Internet Explorer 6 or later, from our enterprise security expert Michael Gregg.04 Dec 2009
-
What are two common devices that control outbound network access?
Read here to discover devices that will control outbound network access and enable and allow network access.04 Dec 2009
-
Oklahoma arena runs 10G converged IP network for voice, data and video
To cut capital expenses and ease network management, the city of Tulsa, Okla., built its Bank of Oklahoma Center arena with a Brocade converged IP network for voice, data and video.03 Dec 2009
-
Using NAC for smartphone security on wireless LAN
As unmanaged, Wi-Fi-enabled smartphones proliferate on corporate networks, network managers should use wireless network access control (NAC) to give them an idea of what's on the network and how th...02 Dec 2009
Network Management Strategies for the CIO