-
Recovering domain controllers after a server disk failu
When recovering domain controllers after a system volume failure, it is important to remember that each domain controller in the domain shares a replicated copy of the Active Directory database. Wh...
-
Application delivery controllers: Moving toward the app
The network is becoming more application centric. The data center has continued to evolve and so have the requirements placed on the network. The network must be able to route application traffic b...
-
Server virtualization and the network: Site consolidati
Server virtualization is nearly synonymous with site consolidation -- bringing concerns about whether performance and throughput will suffer over the WAN as application servers' physical locations ...
-
Recovering from a server disk failure
Recovering a server from a system volume failure can still be tricky, even if you have a backup. In this tip, learn how to recover a Windows Server 2003 with a full system state backup from a serv...
-
Wireless security protocols -- How WPA and WPA2 work
WPA and WPA2 improve upon WEP's encryption methods for better 802.11 wireless security. WPA was carefully designed so that hardware upgrades would not be needed. The processing power of many early ...
-
Upgrade your network: Network evolution and roadmap
Network infrastructure upgrades are essential to provide availability, reliability and security when you run voice and video on your data network. This tip provides an overview of trends currently ...
-
Server virtualization: FAQ for network pros
Brien Posey continues his discussion of server virtualization by answering some frequently asked questions. There are many virtualization products on the market. Although the end result is usually ...
-
Wireless security -- How WEP encryption works
Inadequate wireless security can jeopardize critical company information. Encryption is an important part of wireless security -- but how does it work? In this tip, first in a two-part series on 80...
-
Troubleshooting remote scripting using Network Monitor
Learn how to use Network Monitor 3.0 for troubleshooting a remote scripting error in this tip originally published on WindowsNetworking.com.
-
How to calculate network bandwidth requirements
Bandwidth requirements vary from one network to another. Determining how many bits per second travel across the network and the amount of bandwidth each application uses is vital to building and ma...
-
Deploying Microsoft Live Communications Server in a pro
Microsoft Live Communications Server is just one approach to unified communications (UC), but as with any UC deployment, you must be prepared for the demands it will place on your network. In this ...
-
Troubleshooting the Remote Desktop feature for Windows
Remote Desktop is a Windows feature that allows you to connect to your computer remotely by using the RDP protocol, but it can sometimes be difficult to establish a Remote Desktop session. Learn tr...
-
Server virtualization basics for network pros
Server virtualization isn't just a data center technology. It can also benefit your network by helping to reduce costs and simplify configuration and management issues -- but you need to know where...
-
Prevent IP address conflicts on your wireless network b
One of the problems with bringing a wireless access point into a wired network is that the vast majority of wireless access points are configured by default to act as DHCP servers. If your network ...
-
How asset management can benefit your network
Asset management combines and impacts network operations that touch every part of the organization. Auto-discovery of infrastructure inventory provides an accurate accounting of what's there, frequ...
-
Enabling Windows Vista's Network Mapping feature on dom
Learn how to enabling Windows Vista's Network Mapping feature on domain networks so that you can create a domain, site, or OU level policy that addresses network mapping.
-
Troubleshooting the mystery error -- Managing Windows n
Learn how to troubleshoot a mysterious "remote procedure call failed" error received when the ChangeIPAddress.vbs script developed earlier was used to change the IP address on a remote computer. Th...
-
Understanding 802.11n wireless antennas
Learn how 802.11n wireless antennas have been improved to increase network footprint, available bandwidth and resilience to problems that crippled older 802.11a/b/g access points, and how improved ...
-
Open source network monitoring: Monitor your routers wi
Learn how to configure the open source network monitoring tool Cacti to poll your routers, gather network data, and provide graphs based on what you configured. Cacti is a free open source tool wit...
-
Prevent unauthorized USB devices with software restrict
In the conclusion of his series on preventing unauthorized USB device use on your network, Brien Posey discusses the pros and cons of using software restriction policies such as certificate rules, ...
-
Troubleshooting network routing issues
Expert Patrick Hubbard shares how you can make your life easier by alleviating some annoying network routing issues.
-
Resource pools for hybrid cloud management
Working with individual applications in hybrid cloud management can be complex, but Quality of Experience can be ensured.
-
What to know about implementing Security as a Service
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability.
-
Enterprise wireless standards: The basics
Glen Kemp discusses the standards and protocols that support enterprise-class wireless deployments and how they differ from consumer configurations.
Network Management Strategies for the CIO