November 2007
-
November 30, 2007
30
Nov'07
It's a phone, it's a computer -- no! It's your mobile device! (A comment on form factor)
You really can’t call mobile phones “phones” anymore, what with all the Web 2.0 applications springing up, such as FaceBook for BlackBerrys. These phones, or devices, have really become more like ... Continue Reading
-
November 29, 2007
29
Nov'07
How do you design networks to allow for future growth?
Use these steps to allow for enough future growth in your network design. Continue Reading
-
November 29, 2007
29
Nov'07
Voice over wireless LAN deployment requires constant maintenance
Voice over wireless LAN (VoWLAN) deployment, unlike wired networks, is susceptible to changes external to the network itself -- which may affect coverage and call quality -- and therefore requires constant maintenance. In this tip, learn how to ... Continue Reading
-
November 29, 2007
29
Nov'07
How do IP addresses work on Layer 2 switches?
Learn how IP addresses work on Layer 2 switches from our networking fundamentals expert. Continue Reading
-
November 29, 2007
29
Nov'07
Applications, convergence to boost network spending
Network spending will increase next year for many respondents to a recent SearchNetworking.com survey. Applications, remote offices and bandwidth will fuel the increase. Continue Reading
-
November 28, 2007
28
Nov'07
Convergence, need for next-generation networks drive router sales growth
As service providers seek to upgrade their networks to deliver more multimedia and integrated services, router manufacturers continue to see increased sales. Continue Reading
-
November 28, 2007
28
Nov'07
What is the procedure for assigning network addresses?
Learn how to assign network addresses, and understand the difference between assigning IP addresses and assigning network addresses in this response. Continue Reading
-
November 27, 2007
27
Nov'07
Cisco networking bookshelf bonanza!
Maybe you are hoping to catch up on some networking know-how before the new year... or perhaps you could use a free gift for that special geek on your holiday gift list. Either way, I'd like to ... Continue Reading
-
November 27, 2007
27
Nov'07
availability
1) In a telephone circuit, availability is the ratio between the time during which the circuit is operational and elapsed time. 2) In a network switching system, availability is the accessibility of input and output ports. Continue Reading
-
November 27, 2007
27
Nov'07
Network management best practices: Collecting essential data to optimize network performance
Network performance management best practices don't have to be unrealistic for network managers -- or unaffordable for enterprises. When network performance and accounting technologies overwhelm both Network Management Systems (NMS) applications and... Continue Reading
-
November 21, 2007
21
Nov'07
Getting over the hump -- Managing Windows networks using scripts, Part 5
When learning to script for managing Windows networks, you need to be aware of a bump in the road Mitch Tulloch calls "the hump." Learn how to get over the hump in this tip. Continue Reading
-
November 20, 2007
20
Nov'07
bit stuffing
Bit stuffing is the insertion of one or more bits into a transmission unit as a way to provide signaling information to a receiver... (Continued) Continue Reading
-
November 20, 2007
20
Nov'07
Endpoint security locks down law firm's network
Network security is top priority for one of the world's largest law firms, which recently deployed endpoint security tools to help enforce its strict security policies. Continue Reading
-
November 20, 2007
20
Nov'07
What is the document flow of enterprise-level network consulting?
Find out what paperwork you'll have to wade through as an enterprise-level network consultant in this expert response from Carrie Higbie. Continue Reading
-
November 20, 2007
20
Nov'07
Using Windows Vista group policy to prevent unauthorized USB device use
One of the largest internal threats to network security, and a major source of worry for network administrators, is the use of USB storage devices. USB storage devices can be used to steal large quantities of data from your network. Anything a user ... Continue Reading
-
November 19, 2007
19
Nov'07
Without an application-layer firewall, do I run network security risks?
Are you leaving yourself wide open by not using an application-layer firewall? Find out in this expert response with network security expert Puneet Mehta. Continue Reading
-
November 17, 2007
17
Nov'07
How to compare router performance between vendors
Learn how to compare router performance between different vendors in this expert response. Continue Reading
-
November 16, 2007
16
Nov'07
Cisco targeting digital signage, advertising
The first time I talked to Cisco about the networking vendor’s foray into digital signage, I was a bit confused. Why would the largest enterprise networking vendor want to jump into an area ... Continue Reading
-
November 16, 2007
16
Nov'07
Will IPv6 stop network management complications presented in IPv4?
See how IPv6 helps solve network management issues in this response from IPv4 and IPv6 expert Silvia Hagen. Continue Reading
-
November 15, 2007
15
Nov'07
Mobile devices: MIA
We talk a lot about the importance of mobile device management, but outside my job as an editor on a networking site, it's not something I think about that often. Until, three days ago, I misplaced ... Continue Reading