Email Alerts
-
3Com to be acquired by equity firm
3Com Corp. today announced it will be acquired by private equity firm Bain Capital Partners for $2.2 billion. Article
-
Understanding WMI -- Managing Windows networks using scripts, part 3
Learn how Windows Management Instrumentation (WMI) works and how it can be scripted using VBScript in this tip, originally published on WindowsNetworking.com Tip
-
How can I get our VPN to work on Windows Vista?
VPN expert Sampath Ramaswami explains how to get a Virtela VPN to work on Windows Vista in this response. Ask the Expert
-
IP Accounting -- from Network Management: Accounting and Performance Strategies
IP Accounting, Chapter 6 of "Network Management: Accounting and Performance Strategies," describes the IP Accounting features in Cisco IOS and teaches you the different IP Accounting functions and SNMP MIB. Learn about IP Accounting Access Control Li... Chapter Download
-
Network behavioral analysis project deployment
Deploying a successful network behavorial analysis project begins with cooperation and involvement from many teams within your organization. For a technical project, some of the team members are obvious (e.g., IT operations), others are not (e.g., co... Tip
-
VTAM (Virtual Telecommunications Access Method)
VTAM (Virtual Telecommunications Access Method) is an IBM application program interface (API) for communicating with telecommunication devices and their users. Definition
-
DCE (Distributed Computing Environment)
In network computing, DCE (Distributed Computing Environment) is an industry-standard software technology for setting up and managing computing and data exchange in a system of distributed computers. Definition
-
Is there any network management software that can look after wireless routers, switches and access p
Wireless networking expert Lisa Phifer explains the types of network management software available for looking after wireless routers, switches and access points, in this response. Ask the Expert
-
Network visualization, automation: At odds?
Visualization is a powerful tool. But in the context of network management, the prevalence of graphs may indicate that your network management system (NMS) is not ready to meet the requirements of autonomic network performance. Why so? Loki Jorgenson... Tip
-
Phishers and spambots -- appliances that fight back
Most email security appliances are designed to deflect unsolicited inbound SMTP traffic. In this edition of our Security Spotlight Lisa Phifer examines the benefits of deploying an email security appliance and addresses what specifically to look for ... Tip
Network Management Strategies for the CIO