More Networking In Depth
Bad relationships are bound to happen from time to time. In the workplace, they are typically based on fear and insecurity. However, you can repair them with a little work. Here are three things you do always, sometimes and never do.
New York's plan to turn pay phones into free Wi-Fi stations could be a template for other cities, and bad news for IT departments trying to protect corporate data and intellectual property.
Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned
Soni Jiandani is one of Cisco's serial entrepreneurs, having been a key member of the teams that developed everything from the Nexus 5000 to Cisco's Unified Computing System (which in five years has leapt to the top of the x86 blade server market in North America, according to IDC). Today Jiandani is Senior Vice President of Cisco's Insieme business unit, the group pushing the company's Software Defined Networking vision. Network World Editor in Chief John Dix caught with Jiandani to get her take on how SDN plays out.
Few security executives at global enterprises--or even at smaller organizations--have not had to deal with issues related to social media, mobile technology, big data/analytics, or cloud computing.
There are many times when your iPhone camera flash just isn't up for the job. Either you need light from a different angle (ever notice how phone-based flashes tend to wash out the subject?) or you need a warmer or cooler flash than your iPhone provides. You, my friend, might be interested in the Nova, a Bluetooth LE flash.
PathSolutions' TotalView provides a path-oriented view into network problems and acts as a superb companion to your traditional network monitoring system
HP claims that its light-based, next-generation Machine will do everything except scrub the kitchen sink. But given HP's recent innovation track record, why should we believe any of it?
A group of U.S. lawmakers have introduced legislation that would prohibit broadband providers from charging Web content generators for priority traffic management.
In the current business climate, networking is at the nexus of technology, the customer, and true innovation, and it's about time you put your heart and soul into it. In short, it's time to get on board with social or get left behind.
Given the current prevalence of mobile devices, especially smartphones, it comes as no surprise that they are becoming more and more entwined with everyday aspects of our lives. We don't just use them to make calls, to text, or to browse the internet anymore. We can use them to do just about anything, and that includes using them as a means to provide our credentials.
The Wi-Fi Smart Plug is a power outlet adapter that includes Wi-Fi connectivity, letting you turn any electrical device into a connected device for power on/off purposes. With an included app for iOS and Android devices (phones or tablets), users can control the connected appliances wherever they are (whether inside their own home networks or over the cloud).
There is no shame in being breached by a cyber attack -- security experts are unanimous about that. Prevention, while a worthy part of a risk management strategy, will never be 100% successful, given the sophistication and overwhelming volume of attacks.
The consumer electronics industry has spent the last 20 years making everything connect wirelessly to the Internet -- from PCs to TVs, cameras to speakers.
The ultimate eavesdropping solution for people who want to see what their employees, kids or spouse are doing on their Android (or jailbroken iPhone) smartphone.
William Hanna, vice president of technical services at the University of Pittsburgh Medical Center (UPMC), went out looking for a way to add capacity to a backup network and found what he wanted in Software Defined Networking (SDN) tools from Alcatel-Lucent. Network World Editor in Chief John Dix sat down with Hanna to learn about the process and experience.
John Morgridge was Cisco's first CEO. He took the company public and presided over its growth until John Chambers took over as CEO in 1995. On the 25th anniversary of the Networker's user conference this week, Morgridge, 80, reflects on the past and looks ahead to the future as Cisco's Chairman Emeritus.
The U.S. Department of Justice is preparing to charge Chinese military officials with hacking US companies to obtain trade secrets.
Linksys' ambitious, prosumer-grade Wi-Fi router is pricey compared to the classic WRT54G router that inspired it, but it comes with a great feature set
FCC Chairman Tom Wheeler's proposal is brilliant because it takes the U.S. as far away from net neutrality as possible by presenting the killing of net neutrality and making it sound like the opposite.
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Securing Mobility, From Device to Network
- At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Need to Replace MS Threat Management Gateway?
- Read this article to learn how F5's Secure Web Gateway solution provides a full set of features that can help you successfully migrate...
- The Shortfall of Network Load Balancing
- Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access...
- Leave No App Behind with Software Defined Application Services
- F5 Software Defined Application Services (SDAS) is the next-generation model for delivering application services that enables service injection, consumption, automation, and orchestration across...
- Five Key Issues for DNS - The Next Network Management Challenge
- Since every icon and URL and all embedded content on a website requires a DNS lookup, loading complex sites necessitates hundreds of DNS... All Networking White Papers
- Live Webcast IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- Technology for Everyone A Kansas school district modernizes teaching and learning and paves the way to a one-to-one program with a comprehensive upgrade of its wireless...
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your...
- All Networking Webcasts