Email Alerts
-
Application-aware networking flies under radar at Interop 2012
At Interop 2012, clear signs emerge that application-aware networking is becoming a reality. Fast Packet
-
Myth vs. Reality: Cloud-managed Wireless LAN
New cloud-managed wireless LAN services have many users wondering whether Wi-Fi management as a service is dependable. Wireless expert Lisa Phifer goes on a myth-busting mission. Tip
-
Network Access Control solutions for mobility: Vendor comparison
New NAC solutions have emerged to handle the influx of personal devices on the enterprise network, but each vendor takes a different approach to granting access. Feature
-
Taking WPS attack precautions can reduce unauthorized WLAN access
Admins should take WPS attack precautions to avoid unauthorized WLAN access, yet understanding the WPS protocol and its own vulnerabilities is key to complete network protection. Answer
-
Wireless intrusion prevention system smartens school district Wi-Fi
With AirMagnet’s wireless intrusion prevention system and RF spectrum analysis, a large school district improved wireless LAN security and solved Wi-Fi interference problems. News
-
Optimizing network performance for WLAN real-time applications
Transitioning to WLAN calls for network infrastructure upgrades, making supporting real-time applications tricky. This guide explains strategies for optimizing network performance. Tip
-
Network technology trends for 2012: Wireless LAN and BYOD
Craig Mathias of Farpoint Group shares his predictions for the wireless LAN industry in 2012, as BYOD forces enterprises to rethink their management approaches. News
-
How to make enterprise wireless LAN work
The size of an enterprise WLAN brings new technical challenges. Now vendors are tackling issues of capacity management and automated provisioning for mobile clients. Tip
-
Hotspot 2.0 primer: Another step toward Wi-Fi/cellular integration
Hotspot 2.0 and the IEEE 802.11u protocol could allow mobile device users to securely roam between Wi-Fi and cellular networks without stopping to authenticate. Primer
-
Bring-your-own-device programs gain traction, vendors respond
Enterprises are embracing bring-your-own- device policies that let users go mobile, and vendors are looking to cash in with solutions. News
Network Management Strategies for the CIO