• OpenNMS, an introduction: Affordable network management

    Open source expert Maria Winslow brings network managers up to speed about the free open source enterprise-grade network-management system OpenNMS.

  • Binary-to-decimal conversion

    Binary to decimal conversion is explained in this tip on how a network device uses its IP address, subnet mask and default gateway information.

  • Get ready to automate

    After decades of hand-holding, networks are edging closer to becoming automated. While there are still obstacles to overcome, the benefits of enhancing the overall performance of your network throu...

  • Network retardation: Will IP networks ever grow up?

    Networks and the systems that support them are slow maturing and the heavy lifting and regular maintenance of networks must be attended by humans. The consequence is that networks are slow to adapt...

  • Invisible traffic that steals bandwidth

    If you network is busy though you know it is empty you may be experiencing "phantom traffic." Here Loki Jorgeson takes the mystery out of of the sources of traffic-like behavior.

  • Making the triple play

    Triple play is the hype – and yet there is a serious advantage to be gained that is more than just voice and video mixed with data.

  • Assessing pre-deployment assessment

    Discover the key to effective pre-deployment planning.

  • Circuits: Return of the living dead?

    It seems that the instant something is declared outdated, it is immediately recycled as the 'Next Big Thing.' The latest technology to rise from the dead is circuit-based networks. Learn more about...

  • Network intelligence, Part 1

    This article will help you grasp the concept of network intelligence and understand how 'awareness' reflects a critical step forward in network infrastructures. Loki Jorgenson describes two views o...

  • MOS: A love-hate relationship

    Defining an appropriate performance metric for a particular class of application is not simple but it is very important. Discover why we have a love-hate relationship with MOS.

  • Merging application managmement

    This tip considers what is needed when merging applications management with the management of your network.

  • Network intelligence for dumb applications, Part 2

    Part two of this two-part series introduced us to the concept of "network awareness" and "application awareness." In this column, Loki examines the indications of a trend towards a unified "intelli...

  • Fix before breaking

    The tried-and-true standard of TCP/IP isn't able to meet today's high performance demands and we must turn to new schemes for network transport. Here we look at some alternatives.

  • Network management in 3-D: Experience the terror

    Forget about the people in Plato's cave -- in network management, seeing is knowing. Loki Jorgenson explains why you don't have to rely on shadows and guesswork to tell how your network is performi...

  • Bandwidth scam: Sticky fingers at faul

    Throwing bandwidth at a network performance problem rarely solves anything. But why did we think it would? This column guides you to think 'outside the box.'

  • Checking for high-network utilization

    Learn the general approaches means for checking for high-network utilization on switched networks.

  • Managing processes and tasks in Windows Vista

    This article looks at new capabilities in Windows Vista for managing processes and scheduling tasks and how administrators can use these capabilities for maintaining and troubleshooting systems.

  • Sharpening your security skills

    Unique skills and abilities can make a real difference in your marketability in today's challenging workplace, particularly where security is concerned. Kicking off his series, "Defending your netw...

  • How to (really) harden Windows clients

    Hardening Windows clients with a long checklist or an auditor's suggestions might be overkill according to contributor Kevin Beaver. Take a look at his bare-minimum checklist and his recommendation...

  • Nmap: A valuable open source tool for network security

    Open source tool Nmap is a popular choice amongst hackers and security pros alike for network mapping and testing for network vulnerabilities.