-
Network monitoring switches eliminate 40 Gigabit Ethernet blind spots
Network monitoring tools aren’t ready for 40 Gigabit Ethernet, but a network monitoring switch will allow you to monitor the faster media with 10 Gigabit Ethernet tools.29 Sep 2011
-
Ad hoc network creation: Overcoming personal wi-fi hotspot competition
Ad hoc network creation is rising due to personal wi-fi hotspots from smartphones and computers. Addressing its impact on your WLAN is key to overcoming potential interference.28 Sep 2011
-
Myth of VM mobility and follow-the-sun data centers
Think VM mobility and follow-the-sun data centers work for high availability and disaster avoidance? Think again. Long-distance migration is still a problem.28 Sep 2011
-
Storage virtualization benefits and challenges: A primer
Storage virtualization benefits abound, but along with the ability to implement dynamic storage provisioning for the cloud come some complications…including latency.27 Sep 2011
-
Network hardware prices drop due to increased vendor competition
Competition in the enterprise routing and switching market is intensifying, which is driving down network hardware prices.27 Sep 2011
-
Virtual Extensible LAN: Awesome or braindead?
Is the VXLAN standard just another way to rid the virtual environment of pesky network engineers? Is it actually better than VLANs? Fast Packet blogger Ivan Pepelnjak explains.22 Sep 2011
-
Managed intrusion prevention services handle sophisticated attacks
Adopting managed intrusion prevention services can help avert increasingly sophisticated network attacks.21 Sep 2011
-
VXLAN standard primer: Extended VLANs, long-distance VM migration
The VXLAN standard aims to solve the long-distance VM migration dilemma by enabling extended VLANs across geographically dispersed data centers for a multi-tenant cloud network.16 Sep 2011
-
Are your physical security breach policies enough?
You've done a great job with firewalling, intrusion prevention and encryption, but your physical data breach policies are probably not enough to protect you.14 Sep 2011
-
When military radar causes fixed broadband wireless interference
Military radar may cause fixed broadband wireless interference. This expert tip explains tests and ideas to check if this is the case and how to address this interference.13 Sep 2011
-
Fixing CRC errors: Know your wireless router coverage area boundaries
Distance between devices may cause interference in your wireless router coverage area and CRC errors to pop up. This expert tip offers advice for fixing CRC errors.12 Sep 2011
-
Unified network management planning: Integrating wired and wireless
To deploy unified network management, enterprises must look at the current network infrastructure, how users connect to the network and possibly embracing platforms like the cloud.12 Sep 2011
-
Mortgage lender taps HP TippingPoint for virtualization security
One mortgage firm installed HP TippingPoint vController to extend the virtualization security capabilities of its intrusion protection system.12 Sep 2011
-
Catalyst 6500 Supervisor 2T may not be your upgrade answer
When Cisco realized customers might not be ready for the Nexus line, it launched the Catalyst 6500 Supervisor 2T upgrade. But why not go with the Nexus 7009?06 Sep 2011
-
Unauthorized network access: Neighbors pose a network security threat?
Unauthorized network access from a corporate neighbor or employee poses a serious network security threat and is considered theft of service. This tip explains why.02 Sep 2011
-
Enterprise wireless connection policy: Navigating cellular vs. WiFi
Trying to decide cellular vs. Wi-Fi for mobile devices? An enterprise wireless connection policy will help steer mobile devices to the right network.02 Sep 2011
-
Brocade’s network hardware price model: Pay-as-you-go
With Brocade Network Subscription, Brocade offers a pay-as-you-go network hardware price structure that allows customers to pay only for what they need.01 Sep 2011
Network Management Strategies for the CIO