Email Alerts
-
Assessing the enterprise wireless LAN for the new mobile workforce
Network engineers must assess the business and technology needs behind building a distributed enterprise wireless LAN for the new mobile workforce. Tip
-
Is 802.1X authentication good enough for WLAN access control?
Wireless expert Lisa A. Phifer explains why you shouldn't stop using 802.1X authentication methods for enterprise WLAN access control. Answer
-
How the 802.11ac standard impacts security
The upcoming 802.11ac standard is an improvement over 802.11n, but how could security be impacted? Wireless expert Lisa A. Phifer explains. Answer
-
BYOD management: Using a device catalog to control users
Having a BYOD policy doesn't mean allowing every device onto the network. A BYOD catalog sets rules for which devices and applications are feasible. Fast Packet
-
Wireless network setting considerations for Android troubleshooting
Wireless expert Lisa Phifer addresses Android troubleshooting and the ways that changing wireless network settings could solve connectivity problems. Answer
-
New Gartner Magic Quadrant topic: Unified wired and wireless LAN
Gartner is dumping its wireless LAN and LAN switching categories and replacing them with one on unified wired and wireless LAN access and another on the data center network. News
-
Obtaining wireless access control for personal devices
Lisa Phifer explains methods for wireless access control to allow employees certain but not full access to a company’s network and maintaining network access protection. Answer
-
Wireless sniffing best practices using Wireshark
Wireless sniffing using Wireshark lets engineers troubleshoot poor performance and connectivity problems, as well as analyze traffic activity on the network. Book Chapter
-
With Locator/Identifier Separation Protocol, seamless mobile handoffs
At Cisco Live, Cisco CEO John Chambers highlighted the Locator/Identifier Separation Protocol as a method to seamlessly move applications between cellular and Wi-Fi networks. Fast Packet
-
BYOD policy: More than on-boarding and security
Experts say a BYOD policy will require network managers to reach across IT silos. News
Network Management Strategies for the CIO