Email Alerts
-
BYOD management: Using a device catalog to control users
Having a BYOD policy doesn't mean allowing every device onto the network. A BYOD catalog sets rules for which devices and applications are feasible. Fast Packet
-
Wireless network setting considerations for Android troubleshooting
Wireless expert Lisa Phifer addresses Android troubleshooting and the ways that changing wireless network settings could solve connectivity problems. Answer
-
New Gartner Magic Quadrant topic: Unified wired and wireless LAN
Gartner is dumping its wireless LAN and LAN switching categories and replacing them with one on unified wired and wireless LAN access and another on the data center network. News
-
Obtaining wireless access control for personal devices
Lisa Phifer explains methods for wireless access control to allow employees certain but not full access to a company’s network and maintaining network access protection. Answer
-
Wireless sniffing best practices using Wireshark
Wireless sniffing using Wireshark lets engineers troubleshoot poor performance and connectivity problems, as well as analyze traffic activity on the network. Book Chapter
-
With Locator/Identifier Separation Protocol, seamless mobile handoffs
At Cisco Live, Cisco CEO John Chambers highlighted the Locator/Identifier Separation Protocol as a method to seamlessly move applications between cellular and Wi-Fi networks. Fast Packet
-
BYOD policy: More than on-boarding and security
Experts say a BYOD policy will require network managers to reach across IT silos. News
-
Application-aware networking flies under radar at Interop 2012
At Interop 2012, clear signs emerge that application-aware networking is becoming a reality. Fast Packet
-
Myth vs. Reality: Cloud-managed Wireless LAN
New cloud-managed wireless LAN services have many users wondering whether Wi-Fi management as a service is dependable. Wireless expert Lisa Phifer goes on a myth-busting mission. Tip
-
Network Access Control solutions for mobility: Vendor comparison
New NAC solutions have emerged to handle the influx of personal devices on the enterprise network, but each vendor takes a different approach to granting access. Feature
Network Management Strategies for the CIO