-
Compliance in a virtualized world: Server virtualizatio
Network security, especially NAC, is the Achilles' heel of server virtualization. With virtual servers moving around the data center, traditional access control is difficult to apply. This can be p...
-
Virtual machines present dynamic environment issues for
Virtual machines (VMs) routinely move between servers and can move across subnets, and virtualization blurs the line between the network and the server. These dynamic environment issues can challen...
-
Network planning for server virtualization
Server virtualization not only challenges network managers with consolidation and latency considerations, it also places a heavier burden on the network infrastructure going into each physical serv...
-
Limit network energy consumption with computer cooling
The more heat generated by a piece of equipment, the more electricity is being wasted. For many networks, as in the data center, reducing the amount of heat generated, and therefore the amount of e...
-
Securing the new network architecture
In years past, companies relied on network edge security to establish a perimeter separating trusted insiders from everyone else. However, the distributed and dynamic nature of modern networks, com...
-
Understanding remote scripting: Managing Windows networ
It's all well and good to jump in and try things -- such as managing Windows networks using scripts -- but sometimes we hit a wall when we do this. Learning the fundamentals can often help us avoid...
-
Network mapping in Vista for Windows XP
Windows Vista's network mapping feature is a handy way to detect devices on your network and create a network diagram based on that information, but doesn't work well with domain networks or comput...
-
Keeping it green: Design principles for efficient netwo
Green networking often equates to making networks more efficient. Efficient network design combines improvements in consumption and consolidation to achieve increased manageability and lower lifecy...
-
How green is my network? -- The cost-savings benefit of
The trend of green networking is an offshoot of the growing emphasis on greening, or decreasing the negative impact to the environment of just about everything -- including data centers and IT in g...
-
How to configure Windows Server 2008 advanced firewall
Find out new features of the Windows Server 2008 Advanced Firewall -- and how to configure this powerful host-based firewall using the new MMC snap-in -- in this tip.
-
Energy Efficient Ethernet: Small savings add up
Much energy is wasted while the network is idle. The IEEE P802.3az Energy Efficient Ethernet project aims to deliver major energy savings by combining many small network power savings, both economi...
-
Governance, compliance, security: How are these network
Issues of governance, compliance and security are becoming the responsibility of network operations staff because increasingly complex, componentized services are carried on the network. Network st...
-
Recovering domain controllers after a server disk failu
When recovering domain controllers after a system volume failure, it is important to remember that each domain controller in the domain shares a replicated copy of the Active Directory database. Wh...
-
Application delivery controllers: Moving toward the app
The network is becoming more application centric. The data center has continued to evolve and so have the requirements placed on the network. The network must be able to route application traffic b...
-
Server virtualization and the network: Site consolidati
Server virtualization is nearly synonymous with site consolidation -- bringing concerns about whether performance and throughput will suffer over the WAN as application servers' physical locations ...
-
Recovering from a server disk failure
Recovering a server from a system volume failure can still be tricky, even if you have a backup. In this tip, learn how to recover a Windows Server 2003 with a full system state backup from a serv...
-
Wireless security protocols -- How WPA and WPA2 work
WPA and WPA2 improve upon WEP's encryption methods for better 802.11 wireless security. WPA was carefully designed so that hardware upgrades would not be needed. The processing power of many early ...
-
Upgrade your network: Network evolution and roadmap
Network infrastructure upgrades are essential to provide availability, reliability and security when you run voice and video on your data network. This tip provides an overview of trends currently ...
-
Server virtualization: FAQ for network pros
Brien Posey continues his discussion of server virtualization by answering some frequently asked questions. There are many virtualization products on the market. Although the end result is usually ...
-
Wireless security -- How WEP encryption works
Inadequate wireless security can jeopardize critical company information. Encryption is an important part of wireless security -- but how does it work? In this tip, first in a two-part series on 80...
-
Premises- or provider-based network management?
IT expert David Davis outlines the pros and cons of premises- versus provider-based network management.
-
Networking blogs: Reevaluating the optical market
This week, networking bloggers discuss a potential sea change for the optical market, and reveal some key tips for using custom config builders.
-
Data center spaghetti: Trials, tribulations of cabling
Switching out servers at a data center can go from ho-hum to disaster unless you have a tested cable management plan in place.
-
Networking blogs: Wi-Fi Certified 802.11ac is here
In this week's blog roundup, get expert insight on preparing for 802.11ac and solutions to CDN bandwidth issues.
Network Management Strategies for the CIO