Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Hyper-V networking: The three virtual switches that fuel connectivity
In this Hyper-V networking primer, learn about the three virtual switches behind Microsoft virtualization connectivity. Continue Reading
Your next job may be 'network programmer': What you'll need to know
SDN brings flexibility to networking, but this will require engineers to gain new skills in order to fill the emerging role of network programmer. Continue Reading
software-defined networking monitoring application (SDN monitoring application)
An SDN monitoring application is a software program that oversees the traffic in a software-defined network (SDN) as a component of network management. Continue Reading
-
Centralized vs. decentralized SDN architecture: Which works for you?
Two SDN architecture models -- centralized and decentralized -- have much in common, but key differences center on the use of the OpenFlow protocol. Continue Reading
How do I disable VPN passthrough? What are the pros and cons to disabling it?
In this Ask the Expert response, Rainer Enders explains how to disable VPN passthrough and what the benefits and drawbacks are. Continue Reading
Networking vendors aim to improve server virtualization security
Server virtualization security is no longer guaranteed by creating physical security zones for different classes of virtual machines on host servers. Networking and network security vendors are introducing virtual security products that apply ...Continue Reading
Wi-Fi vulnerability assessment checklist
Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions.Continue Reading
The network administrator's survival guide
This piece from contributor Douglas Chick presents a humorous look at surviving in your role as a network administrator.Continue Reading
I need a very basic VPN solution to connect two offices to allow two servers to talk to one another.
Most popular viruses and hacking tools
Here are 2004's most popular hacker tools, viruses, remote tools, adware, spyware, Trojans and worms.Continue Reading
-
How do I evaluate the performance of a LAN setup?
What are the top five companies that are providing enterprise level WLAN products and solutions?