-
Configuring VLANs on a Cisco Catalyst 3750 and Catalyst 2950 together
31 Mar 2010
-
How does User-based Rate Limiting (UBRL) do if I have oversubscribed a port or switch?
31 Mar 2010
-
After VLAN configuration why can't computers in one gateway locate those in other gateways?
31 Mar 2010
-
Magic Quadrant says now is the time for next-generation firewalls
Vendors have been slow to deliver next-generation firewalls, but Gartner's Magic Quadrant for enterprise firewalls says that is about to change. Enterprises need an intelligent firewall that has IP...31 Mar 2010
-
Using LAN edge switch security features for network defense-in-depth
Enterprises are turning their focus to the largely unused LAN edge switch security features that can enable the use of ACLs and VLANs for port management and traffic monitoring. LAN edge switches a...31 Mar 2010
-
Integrating LAN edge switch security and network access control
The best form of network edge security is to integrate LAN edge switch security features with network access control devices so that networking teams can use VLANs, ACLs and health checks at the sw...30 Mar 2010
-
Nonprofit secures guest access with network access control
Like many nonprofit organizations, the Georgia Legal Services Program (GLSP) has many volunteers who access the network with their own computers. GLSP secured these PCs with a network access contro...30 Mar 2010
-
Configuring LAN edge switches for network access authentication
Intelligent edge switches can play a role in network access authentication, but these functions are often overlooked.30 Mar 2010
-
Information dispersal algorithms: Data-parsing for network security
Information dispersal algorithms are used to separate data packets into slices so that they are unrecognizable as they sit in storage arrays or traverse the network. Data can be reassembled at the ...26 Mar 2010
-
Better than encryption? Unisys Stealth offers data parsing technology
The Unisys Stealth Solution uses data parsing -- an information dispersal algorithm -- along with VPN technology in a network security solution that enables data in motion to be completely unrecogn...25 Mar 2010
-
frequency-shift keying (FSK)
Frequency-shift keying (FSK) is a method of transmitting digital signals.24 Mar 2010
-
frequency modulation (FM)
Also see modulation and frequency-shift keying (FSK).24 Mar 2010
-
fiber to the home (FTTH)
Fiber to the home (FTTH), also called fiber to the premises (FTTP), is the installation and use of optical fiber from a central point directly to individual buildings such as residences, apartment ...24 Mar 2010
-
fiber to the curb (FTTC)
Fiber to the curb (FTTC) refers to the installation and use of optical fiber cable directly to the curbs near homes or any business environment as a replacement for "plain old telephone service" (P...24 Mar 2010
-
Digital Powerline (DPL)
Digital Powerline (DPL) technology provides the transmission of data to users over the same lines that bring electric power to homes and businesses.24 Mar 2010
-
cyclic redundancy checking
Cyclic redundancy checking is a method of checking for errors in data that has been transmitted on a communications link.24 Mar 2010
-
customer premises equipment (CPE)
Customer premises equipment (CPE) is telephone or other service provider equipment that is located on the customer's premises (physical location) rather than on the provider's premises or in between.24 Mar 2010
-
Broadband over Power Line (BPL)
Broadband over Power Line (BPL) is a technology that allows Internet data to be transmitted over utility power lines.24 Mar 2010
-
baud
Baud was the prevalent measure for data transmission speed until replaced by a more accurate term, bps (bits per second).24 Mar 2010
-
How to choose and implement automated configuration management tools
Automated network configuration management tools limit manual changes and therefore errors, but human intervention and training are still required. There's a lot to consider in choosing the right n...24 Mar 2010
Network Management Strategies for the CIO