Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
How will software-defined WANs impact the enterprise?
SD-WAN has a lot of potential for enterprises, especially as developers cobble together custom services and capabilities. Continue Reading
SDN monitoring means new transitions for engineers
SDN network management means tools are transforming from listening mode to active mode. Continue Reading
What are data center-class switches?
Choosing the right switch for your data center can be a difficult task. This article looks at how data center-class switches are evolving in the enterprise to offer flexibility and speed for new traffic flows. Continue Reading
-
Three ways to measure wireless network performance
Trying to find ways to assess your wireless network performance? Here are some tools that can help. Continue Reading
Umpqua Bank employs NSX, micro-segmentation for enterprise security
Umpqua Bank's Sam Guidice tells how the organization deployed VMware's NSX as part of its effort to utilize micro-segmentation for enterprise security. Continue Reading
How Apple iOS MAC address spoofing affects location-based services
Apple iOS 8 will add a MAC address spoofing feature to iPhones and iPads for wireless privacy. It could interfere with Wi-Fi location-based services used by many consumer-facing businesses.Continue Reading
Arista switch pioneers 100 GbE uplinks in top-of-rack
Arista announced top-of-rack 7280E with 100 GbE uplinks. It also released an optic that allows a migration from 10 to 40 GbE without a fiber upgrade.Continue Reading
Will MPLS traffic engineering technology help you?
MPLS traffic engineering can improve VPN performance to ensure data travels the most efficient path.Continue Reading
GENEVE primer: The answer to network virtualization interoperability?
The GENEVE network encapsulation protocol is more flexible than VXLAN and NVGRE. Will it bring interoperability to network virtualization overlays?Continue Reading
How to buy: Assessing next-gen firewalls
Is there a next-gen firewall in your future? Our How to Buy guide offers advice you need to ensure you purchase the best platform to meet your needs.Continue Reading
-
Don't ignore this great wireless training resource
Online wireless support communities are a great resource for IT professionals who need their questions answered quickly.Continue Reading
RSA security conference still relevant in today's landscape?
The RSA conference convenes in San Francisco this week. But, asks Michele Chubirka, is the meeting really focusing on the critical issues?Continue Reading
Hyper-V networking: The three virtual switches that fuel connectivity
In this Hyper-V networking primer, learn about the three virtual switches behind Microsoft virtualization connectivity.Continue Reading
Your next job may be 'network programmer': What you'll need to know
SDN brings flexibility to networking, but this will require engineers to gain new skills in order to fill the emerging role of network programmer.Continue Reading
software-defined networking monitoring application (SDN monitoring application)
An SDN monitoring application is a software program that oversees the traffic in a software-defined network (SDN) as a component of network management.Continue Reading
Centralized vs. decentralized SDN architecture: Which works for you?
Two SDN architecture models -- centralized and decentralized -- have much in common, but key differences center on the use of the OpenFlow protocol.Continue Reading
How do I disable VPN passthrough? What are the pros and cons to disabling it?
In this Ask the Expert response, Rainer Enders explains how to disable VPN passthrough and what the benefits and drawbacks are.Continue Reading
Networking vendors aim to improve server virtualization security
Server virtualization security is no longer guaranteed by creating physical security zones for different classes of virtual machines on host servers. Networking and network security vendors are introducing virtual security products that apply ...Continue Reading
Wi-Fi vulnerability assessment checklist
Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions.Continue Reading
The network administrator's survival guide
This piece from contributor Douglas Chick presents a humorous look at surviving in your role as a network administrator.Continue Reading
I need a very basic VPN solution to connect two offices to allow two servers to talk to one another.
Most popular viruses and hacking tools
Here are 2004's most popular hacker tools, viruses, remote tools, adware, spyware, Trojans and worms.Continue Reading
How do I evaluate the performance of a LAN setup?
What are the top five companies that are providing enterprise level WLAN products and solutions?