-
CCNA: How Cisco has changed the test and what to study
CCNA exam questions and preparation have changed over the years. Our Cisco certification expert, David Minutella, explains what is covered on the test today and whether or not more training is nece...30 Mar 2009
-
After the CCNA: Cisco certification on the way to your CCIE
Training for the CCIE can happen in a class or on your own. CCNA certified pros have to plan their next move and our Cisco certification expert, David Minutella, discusses options in this expert re...30 Mar 2009
-
Will 802.11x wireless products be compatible with 802.11n?
In 2009, we will see a new wireless standard emerge addressing 802.11x product compatibility issues. Wireless networking expert Lisa Phifer explains how current wireless devices may become outdated...27 Mar 2009
-
How to find an SSID and identify neighboring WLANs
Wireless network expert Lisa Phifer explains what an SSID is and how to identify and differentiate between neighboring WLAN identifiers in this expert response.27 Mar 2009
-
Managing network problem users: The Downloading Disaster
With this second entry in a new series about network problem users, SearchNetworking.com looks at users who download by the gigabyte, for legitimate purposes or otherwise, and what networking profe...26 Mar 2009
-
Force10 launches new cloud computing, data center core switches
Force10 Networks has unveiled its new ExaScale E-Series switches. These high-density, lossless chassis switches with routing capabilities are designed to support virtualization and cloud computing.25 Mar 2009
-
Extreme's port extender can replace consumer devices at network edge
Extreme Networks has introduced the ReachNXT 100-8t, a port extender that allows enterprises to create multiple network connections at the outer edges of their networks. The device offers an enterp...24 Mar 2009
-
Can I read SearchNetworking.com's information in other languages?
Do you want translations of SearchNetworking.com material in languages other than English? Tessa Parmenter shows you which sites hold SearchNetworking.com resources from around the globe.23 Mar 2009
-
Persistent, secure connections for roaming WiMAX, 3G and 802.11x
With the proliferation of wireless services, mobile workers who must communicate over both the LAN and WAN seek secure, persistent connections for their wireless devices across WiMAX, 3G and 802.11...19 Mar 2009
-
Cisco's Unified Computing System stirs competition, old and new
In addition to a new data center architecture, Cisco's Unified Computing System is inviting fiercer competition with former partners, even as smaller networking vendors attempt to seize some market...18 Mar 2009
-
Securing embedded 802.11n devices
As WLANs are updated to 802.11n, most will be populated by increasingly diverse embedded 802.11n devices, including phones, cameras and barcode scanners. These pose unique challenges for network ma...18 Mar 2009
-
Cisco unveils Unified Computing, merging servers, storage and networks
With Unified Computing, Cisco enters the blade server market, but it's putting more emphasis on an architecture that tightly couples servers, storage and virtualization with the network in order to...17 Mar 2009
-
802.11n's impact on WLAN security
802.11n wireless LANs offer many benefits over 802.11a/b/g for not only performance but also network security. However, 802.11n can also bring new security threats. As businesses move full steam ah...17 Mar 2009
-
How to stop channel interference on 802.11x wireless access points
Networking expert Lisa Phifer explains how to identify interference on the WLAN, how to stop 802.11x networks from overlapping and gives advice against other forms of interference.16 Mar 2009
-
How to create a Wi-Fi hotspot
Creating a Wi-Fi hotspot can be done one of two ways. Our site wireless networking expert Lisa Phifer explains how to create a prepaid hotspot from the ground up.16 Mar 2009
-
How to evaluate and manage UTM for network security
Unified threat management (UTM) is a promising approach to consolidating security controls, including firewalls, intrusion prevention, anti-virus, content filtering, and reporting. There are, howe...16 Mar 2009
-
Profiling -- and protecting against -- network problem users: The Internet Novice
With this first entry in a new series about network problem users, SearchNetworking.com looks at the Internet Novice. Though well-meaning, Internet novices can pose a significant threat to the corp...12 Mar 2009
-
Beamforming, RF management key to 802.11n wireless LAN success
Ruckus Wireless introduced beamforming to 802.11n wireless LAN, taking aim at the RF management techniques of Cisco and other rivals.11 Mar 2009
-
Cisco EEM scripting gets a reboot -- and helps cut response times
Dubbed internally 'Cisco's best-kept secret,' Cisco's Embedded Event Manager (EEM) scripts have started to take off, giving network professionals deeper access to Cisco IOS while cutting out busywork.10 Mar 2009
-
How to prepare for networking interview questions: Insider advice
Even after getting a foot in the door with a stellar resume, job candidates need to be prepared not only to show technical prowess but to demonstrate that they're a good fit for the company.05 Mar 2009
Network Management Strategies for the CIO