December 2010

  • pervasive computing (ubiquitous computing)

    Pervasive computing (also called ubiquitous computing) is the growing trend towards embedding processors in everyday objects so they can communicate information.

  • Combining network configuration and IP address management tools

    A large convention center and hotel dumped unwieldy spreadsheets and whiteboards to adopt network configuration management and IP address management tools. With NCM and IPAM, the networking team wa...

  • vCloud and VEPA both fail in virtualization networking

    vCloud and VEPA both fail to address the problem with networking for virtualization. The goal of network-aware virtualization is to enable a flat Layer 2 network and networking functions within the...

  • Hybrid cloud deployment

    This cloud computing tutorial defines what a hybrid cloud deployment is and helps network managers understand the associated pros and cons in deploying mix of both private and public clouds. We exa...

  • Deploying private clouds

    Learn how the private cloud model affects network utilization, performance and applications, and how the network needs to be adapted to accommodate private clouds. In this tutorial we also look at ...

  • Public cloud deployment: Planning for the network impact

    Learn about the impact public clouds can have on an organization’s network and how network managers can plan for increased bandwidth needs, mitigate the security risks, and modify network architect...

  • Data center networking efficiency

    Efficient data center networking is a sure bet if the equipment has a long life and the network capacity is fully utilized. In this video, learn how to extend the life of the data center equipment ...

  • Cloud computing: Building the private cloud

    Building the cloud is an enormous undertaking, and building a private cloud brings about a number of network challenges. Learn how to address capacity management and storage virtualization when bui...

  • Choosing the right unified network security strategy

    Network security threats are constantly evolving, and your network security strategy must evolve with them. Learn about new security best practices, including application-aware firewalls and unifie...

  • All-wireless enterprise networks

    Learn about all-wireless enterprise networks, including how they look and common obstacles, in this video.

  • Networking technology trends 2010: Cloud networking and virtualization

    Based on our most read networking topics, cloud computing networking and network monitoring are at the top of 2010’s networking technology trends. The other networking topics that ranked high among...

  • Wireless LAN troubleshooting: How to get proactive

    Wireless LAN troubleshooting and WLAN diagnostics can be done proactively with a new set of tools, including WLAN managers and distributed sensor platforms that track and problem solve on complex n...

  • Top networking news 2010: Data center networks and multi-vendor mania

    In our review of top networking news of 2010, see how we covered the rise of the multi-vendor network, major changes in data center networks and security, the emergence of ubiquitous wireless LAN a...

  • Integrating public and private cloud services

    Network managers must support integrated public and private cloud services because users will go under the radar to use public cloud services that help them get their work done more easily.

  • Cloud computing security risks: Private and public clouds

    Cloud computing security risks are a major threat to your cloud network. Learn about cloud computing security risks in the private and public clouds and how cloud providers are handling these cloud...

  • Optimizing 802.11n for voice over wireless LAN

    Understand the impacts that 802.11n can have on voice applications and discover techniques to deliver toll-quality voice over wireless LAN, including WMM prioritization, call admission and fast roa...

  • Deploying 802.11n for improved wireless LAN performance

    This series examines how deploying 802.11n can improve your enterprise’s wireless LAN performance enabling mobility services that make workforces informed and productive. With 802.11n you can exten...

  • 802.11n WLAN design best practices

    Discover best practices for designing and deploying an 802.11n wireless LAN, from RF design and band/channel selection to access point placement for coverage and capacity. After reading this sectio...

  • 802.11n migration: Supporting legacy devices

    Lisa Phifer explains how your 802.11n migration provides support for legacy client devices that are already used for best-effort data applications like Internet access and email, identifying best p...

  • Delivering video over your 802.11n wireless LAN

    Learn about delivering video over your 802.11n wireless LAN. Discover the features that affect video streaming, and identify benefits and limitations related to techniques like multicast and airtim...