November 2008
-
November 30, 2008
30
Nov'08
Why do Linksys WMP300N wireless cards have three antenna connectors?
Before you make a larger antenna for your wireless network card, know how the Linksys WMP300N connects to its antenna, and understand why it has three connectors. Continue Reading
-
November 28, 2008
28
Nov'08
Can building T3 lines using satellite be cheaper than a carriers'?
Would building your own T3 leased line be cheaper than a standard carrier's service? Our networking fundamentals expert explains this and how a large capacity link reacts over satellite communication, in this Ask the Expert response. Continue Reading
-
November 27, 2008
27
Nov'08
Internet Routing in Space (IRIS)
Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.S. Department of Defense to place an IP (Internet protocol) router on a geostationary satellite... (Continued) Continue Reading
-
November 26, 2008
26
Nov'08
Wireless LAN investment chugs along during recession
A worsening economy hasn't dampened enterprise interest in wireless LAN investment. Companies will turn to the technology to save money and improve productivity during hard times. Continue Reading
-
November 25, 2008
25
Nov'08
HP ProCurve could threaten Cisco's dominance
The New York Times has an interesting article about the rise of ProCurve, Hewlett Packard's networking division. Gartner analyst Mark Fabbi told the Times that Procurve's revenue has grown by 40% ... Continue Reading
-
November 25, 2008
25
Nov'08
Trouble connecting to the VPN: Static and dynamic IP address issues
For mobile or remote employees, a corporate VPN promises simple, secure access to privileged data and resources. But when that access fails, troubleshooting VPN connectivity issues can be frustrating for the end user and networking staff alike. In ... Continue Reading
-
November 25, 2008
25
Nov'08
Internet structure shifts as IP address challenges grow, study says
A new Nemertes Research study says the Internet's structure is changing to handle multimedia content delivery just as IPv4 address shortages create network architecture problems that could slow core router performance. Continue Reading
-
November 24, 2008
24
Nov'08
Five things network administrators do to mess up their enterprises' virtualization
Network monitoring authority Paessler PRTG has seen the good, bad and ugly of network designs that prevent monitoring a system, which is why their product line solutions cover everything from ... Continue Reading
-
November 24, 2008
24
Nov'08
Differences between WLANs, Wi-Fi and WiMax
Wireless networking expert Lisa Phifer explains the differences between WLAN, WiMax and Wi-Fi and provides an excellent tutorial on what separates Wi-Fi from WLAN. Continue Reading
-
November 21, 2008
21
Nov'08
Microsoft offers free certification exam retake
Can't afford to get certified? Well, these days, with an even more competitive job market, you can't afford not to be. The good news is that Microsoft is giving you two incentives to certify for ... Continue Reading
-
November 20, 2008
20
Nov'08
phase-change cooling (vapor cooling)
Phase-change cooling, also called vapor cooling, is a microprocessor-cooling technology that works according to the same principles as a conventional refrigerator, freezer or air conditioner. The principal components of a phase-change cooling system... Continue Reading
-
November 20, 2008
20
Nov'08
Network consolidation in data centers essential to reducing costs
The next generation of data center design puts a focus on speedier, better-managed networks to do more work at half the price. Continue Reading
-
November 19, 2008
19
Nov'08
Return-all-values script: Managing Windows networks using scripts, Part 13
One way to manage your Windows network is through scripts. The particular workhorse script described in this tip can return all values of all properties of a specific instance of a Windows Management Instrumentation (WMI) class to give you useful ... Continue Reading
-
November 19, 2008
19
Nov'08
Selecting an MPLS provider: Customer support should be a priority
When selecting a provider for a managed MPLS network, enterprises must focus on more than just how the provider designs and builds the network. They should also think about the support they will get from the provider once the network is up and ... Continue Reading
-
November 18, 2008
18
Nov'08
HTTP error code troubleshooting, Part 2: How to use IIS tool WFetch
You can understand what's causing an HTTP error by looking at the error code, but sometimes that's not enough. In this tip, learn how to use network analysis tool WFetch, from Microsoft's Internet Information Services (IIS) 6.0 Resource Kit, to ... Continue Reading
-
November 18, 2008
18
Nov'08
During a recession, align the network with business priorities
During the recession, network managers should align the network with corporate goals to survive budget cuts. At the Gartner Enterprise Networking and Communications Summit, an analyst lays out a blueprint for success. Continue Reading
-
November 18, 2008
18
Nov'08
Telecom OSS transformation can't stop for economic woes
If telecom service providers are to monetize their IP networks, they need to continue transforming their operations support systems (OSSs) even during a down economy, and consider a new wholesale infrastructure model. Continue Reading
-
November 17, 2008
17
Nov'08
LANs vs. WLANs: Which network designs are used for each company size?
Which network design is easier to implement, LANs or wireless LANs? Our network administration expert explains this and which designs best fit particular functions and areas of your organization. Continue Reading
-
November 17, 2008
17
Nov'08
Economic meltdown to change telecom landscape, report says
The economic meltdown that is interrupting a new technology spending cycle will also create telecom industry winners that could change the provider and vendor market landscape forever, a new economic forecast says. Continue Reading
-
November 13, 2008
13
Nov'08
Poor data-loss prevention practices almost cost Intel a billion
While Intel's network security logged meticulous employee access data, red flags weren't raised to stop one potential thief until he had made off with the data. Continue Reading