-
Multi-vendor networks more prominent than ever
With HP Networking and Juniper showing Cisco legitimate competition, multi-vendor networks are increasingly a key element for network vendor management best practices.09 Dec 2010
-
How to approach wireless LAN architectures
A poorly planned wireless LAN architecture can spell disaster for a wireless network. In this video, expert Lisa Phifer gives tips and advice on WLAN architectures, including a controller-centric a...08 Dec 2010
-
TV white space spectrum and the enterprise network
With newly available TV white space spectrum in play, what does this mean for enterprise networks? In this video, learn about how the white space frequencies will affect wireless access, and how th...08 Dec 2010
-
Network convergence: Bringing storage and data center networks together
Bringing storage and data center networks together, or network convergence, requires an immense amount of planning. In this video, learn about FCoE vs. iSCSI vs. Infiniband over Ethernet for networ...08 Dec 2010
-
Be aware of Wi-Fi security to deal with Firesheep at public hotspots
Wireless expert Lisa Phifer tackles public Wi-Fi security and the steps you can take to protect yourself from sidejacking attempts like Firesheep. Lisa also highlights that these threats are not li...08 Dec 2010
-
Cisco, Juniper acquire virtual network automation and security vendors
Virtual server network automation and security are increasingly important to enterprises. Juniper and Cisco beefed up their virtual server networking capabilities in recent days with acquisitions o...07 Dec 2010
-
WLAN testing: Wireless intrusion prevention systems and centralized testing tools
WLAN testing has grown to accommodate the full-time surveillance necessary for super-speed 802.11n technology and mobile applications. Now WLAN testing can be done with AP-based wireless intrusion ...06 Dec 2010
-
Stop everywhere Wi-Fi hotspots and guest wireless networks!
The rapid rise of enterprise guest wireless networks and public Wi-Fi hotspots are only leading to anti-social behavior and a host of WLAN security problems that include identity snooping using Fir...01 Dec 2010
-
NetFlow v9 is powerful, so why isn’t anyone using it?
NetFlow v9 has been around for a few years and is far more powerful than previous versions of the protocol, but few people are using it. NetFlow collector and analyzer vendors and networking pros a...01 Dec 2010
Network Management Strategies for the CIO