Issue OverviewNetwork Evolution - December 2011 Vol. 2, No. 6
In this special end-of-year issue, we take stock of what we reported over the year and gauge whether the changes in networking technology that we predicted have actually taken place. Take a look inside and find out about the latest networking trends and technologies, what was hot this year, and what new technologies should be on your radar. Also, get expert advice on enterprise wireless connection policies; read about the pros and cons of FCoE for network convergence; and find out everything you need to know about migrating virtual machines. Access >>>
Premium Content for Free.
Enterprise wireless connection policy: Navigating cellular vs. WiFi
by Lisa Phifer, Contributor
Trying to decide cellular vs. Wi-Fi for mobile devices? An enterprise wireless connection policy will help steer mobile devices to the right network.
- Enterprise wireless connection policy: Navigating cellular vs. WiFi by Lisa Phifer, Contributor
Hotspot 2.0 primer: Another step toward Wi-Fi/cellular integration
by Rivka Gewirtz Little
Hotspot 2.0 and the IEEE 802.11u protocol could allow mobile device users to securely roam between Wi-Fi and cellular networks without stopping to authenticate.
FCoE network convergence will start at the edge but move to the rack
by Stuart Miniman, Contributor
Implementing FCoE network convergence is possible considering the move to 10 GbE and the emergence of data center bridging.
End-to-end FCoE for network convergence won't work!
by Stephen Foskett
FCoE at the edge can be a step toward network convergence, but end-to-end FCoE needs a whole lot more engineering before it can be reliable.
Myth of VM mobility and follow-the-sun data centers
by Ivan Pepelnjak
Think VM mobility and follow-the-sun data centers work for high availability and disaster avoidance? Think again. Long-distance migration is still a problem.
- Hotspot 2.0 primer: Another step toward Wi-Fi/cellular integration by Rivka Gewirtz Little
More Premium Content Accessible For Free
Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...
The average person carries three mobile devices, according to an informal poll conducted last year by Sophos Labs. While Kindles and Fitbits probably...
More -- and more complex -- mobile devices are jumping on your enterprise network, gobbling up bandwidth from the WLAN infrastructure. This technical...