-
Unified fabric primer: FCoE and data center bridging
Unified data center fabrics combine FCoE and data center bridging to enable SAN and LAN traffic to run on the same physical network, simplifying network architecture and resulting in savings. This ...
-
Wireless or Ethernet LAN? Comparing costs
Now that 802.11n has made wireless LAN faster and more reliable, network administrators are wondering: Wireless or Ethernet LAN? Until now Ethernet replacement hasn't been feasible, but 802.11n WLA...
-
Why you should integrate wired and wireless LANs
With improved 802.11n performance, wireless LAN ports are overtaking Ethernet in the enterprise, and networking teams are pressed to find solutions for integrated wired and wireless network managem...
-
Desktop virtualization storage strategies
Without the right desktop virtualization storage strategies, implementing the technology could mean a great strain on storage area networks and the core. But with the right approach, enterprises co...
-
How to test LAN switch energy efficiency
Vendors promise energy-efficient networks, but they often can't provide actual measurements for LAN switch power consumption. In this best practices guide, learn methods for measuring LAN switch en...
-
Virtualization planning tips for network managers
Network managers need to consider more than server CPU utilization when planning for virtualization. These common misconceptions and tips show what project managers need to know before implementing...
-
Testing LAN switch power consumption
LAN switch power consumption testing is as crucial as benchmarking speeds and feeds on switches. Enterprises that develop a set of best practices for testing network power consumption will save mil...
-
Is your network ready for desktop virtualization?
CIOs have fallen in love with virtual desktop infrastructure, so networking teams must meet desktop virtualization network requirements that include network bandwidth management and traffic prioritization...
-
Application-specific intrusion detection systems emerge
Integrating network intrusion detection systems can mean using both anomaly and signature-based detection in application-specific tools.
-
Installing anomaly-based intrusion detection
Network behavior analysis may be the answer to preventing zero-day attacks. You must install an anomaly-based intrusion protection system (IPS) or intrusion detection system (IDS). This article exp...
-
It takes two to defend a network
Deter enterprise network attacks by learning how network behavior analysis can be used to protect data. Understand the advantages and disadvantages of anomaly-based and signature-based protection a...
-
Three network investments for the green enterprise
Building green enterprise IT systems can mean making networking investments that support unified communications through network quality of service, traffic monitoring and mobility.
-
How to plan for 802.11n WLAN upgrades
802.11n WLAN upgrades mean more than just implementing new antennas and access points. 802.11n network requirements include the need for more power and controller capacity, as well as complex manag...
-
No more hard NOCs: Distributed network management preva
Distributed network management with out-of-band networks enables enterprises to move away from network operations centers, becoming eco-friendly and spending less.
-
Green networks: Smarter architecture, not expensive dev
When it comes to green data center design, most think of server and storage consolidation. But green networks, with improved port utilization, play an important role without requiring investment in...
-
Deploying 802.11n access points: Best practices
802.11n access points offer greater speed, footprint and ability to support demanding applications than their 802.11a/b/g counterparts, but they require different configuration, monitoring and mana...
-
Internal cloud computing on the cheap
Internal cloud computing can be made inexpensive by using free software and in-house tools for automated server provisioning to better utilize existing compute resources. Learn how in this article ...
-
Improved storage performance without adding more disk
As data proliferates, networking pros need improved storage performance and more capacity. Instead of throwing more disk at the problem, networking pros can use storage management strategies like d...
-
Who needs server virtualization with virtual OS and app
Everyone is looking for a way to better use their server capacity, but server virtualization poses a whole new set of problems. So some IT experts are turning to virtual OS and virtual applications...
-
Application switch testing: An RFP recipe book
Application switches do a lot more load balancing these days. So network professionals doing application switch testing must consider everything from DPI to basic transport, according to a new Toll...
-
Premises- or provider-based network management?
IT expert David Davis outlines the pros and cons of premises- versus provider-based network management.
-
Networking blogs: Reevaluating the optical market
This week, networking bloggers discuss a potential sea change for the optical market, and reveal some key tips for using custom config builders.
-
Data center spaghetti: Trials, tribulations of cabling
Switching out servers at a data center can go from ho-hum to disaster unless you have a tested cable management plan in place.
-
Networking blogs: Wi-Fi Certified 802.11ac is here
In this week's blog roundup, get expert insight on preparing for 802.11ac and solutions to CDN bandwidth issues.
Network Management Strategies for the CIO