In Depth
In Depth
Networking and communication
-
Storage Decisions Session Downloads: Engineering Track (LV 2006)
Managers need to engineer the most flexible and complete storage network. This track looks at SAN and NAS issues, distance demands, remote offices and how to build out systems. Continue Reading
-
Managed and hosted VoIP: muddling through
For companies looking for an alternative to a premise-based phone system, there are plenty available, and they come in all shapes and sizes. Get a clearer understanding of exactly what's available so you can ask the right questions to get the ... Continue Reading
-
Is the SANS Top 20 still useful?
This week in Security Blog Log: Some experts ponder whether the SANS Institute's Top 20 vulnerability list is as valuable than it once was. Others weigh in on the VoIP threat. Continue Reading
-
Review: Arbor Networks' Peakflow X 3.6
Hot Pick: Peakflow isn't cheap and requires an intimate understanding of data flows, applications and network infrastructure. But the investment will pay dividends. Continue Reading
-
Review: Network Intelligence's enVision
enVision offers excellent value and is highly configurable, though typically that means you have to put a lot into it to get the most out of it. Continue Reading
-
VoIP convergence: Managing staffing issues
Companies making the transition to IP telephony must find a way to converge their voice and data networks -- and the employees who work on them. Continue Reading
-
Production databases find a home on IP SANs
Dow Chemical will be cutting costs with a NetApp system; AirClic goes with EqualLogic's newest SAS array after evaluating both NetApp and EMC. Continue Reading
-
What storage managers are buying and why, page 4
What storage managers are buying and why Continue Reading
-
What storage managers are buying and why, page 5
What storage managers are buying and why Continue Reading
-
Nokia E62 thin mobile productivity device
In this product review, John Shepler weighs in on Nokia's new E62 mobile device for Cingular Wireless. Continue Reading
-
Wireless network security testing
Attack your own wireless networks to find vulnerabilities before malicious hackers do. Continue Reading
-
Protecting wireless networks: Step 3
Security testing expert Kevin Beaver covers the tools and techniques needed to find and exploit insecure wireless networks. Continue Reading
-
Protecting wireless networks: Step 2
Security testing expert Kevin Beaver covers the tools and techniques you'll need to find and exploit insecure wireless networks. Continue Reading
-
Thwarting IM management challenges
Product review: Information Security magazine's Sandra Kay Miller says Symantec's IM Manager 8.0 has limited public network features, but offers excellent reporting Continue Reading
-
Case study: A valuable solution
A new telephony and call centre solution from Inter-Tel has transformed the way that e.surv Chartered Surveyors is able to work. Continue Reading
-
Be careful you don't get more than you pay for with VoIP
Implementing VoIP is attractive for all companies in particular SMBs. However, there are issues to address that may cost you more than what you save Continue Reading
-
Voicing concerns on Skype
Skype has blazed a trail in the Voice over IP arena; its popularity hasn’t gone unnoticed by the hacker community however Continue Reading
-
VoIP and IPT are hot tickets for the IT industry
Voice over IP (VoIP) and IP telephony (IPT) are the hot tickets in the current IT industry. In the space of two weeks in late May and June 2005, two major European trade shows — VON 2005 and VoIP for Business —have each exhibited a welter of ... Continue Reading
-
The acceptable rules of the mobile game
Mobile networks allow you to connect to your network from almost anywhere by the appropriate methodology. Yet that may also mean... Continue Reading
-
Managed services: Looking to the long term
IT directors looking for an easy way to manage increasing volumes of data by buying more hardware could be storing up problems... Continue Reading
-
Winning the cyber arms race in the classroom
In the struggle for cybersecurity, Lenny Zeltser's most important weapons are the classroom and the pen.
For the past few years he has taught part-time at the SANS Institute, creating a course on how to analyze malicious software... Continue Reading
-
Whisky galore with IP
Chivas can toast future success thanks to a cost-effective IP data network Continue Reading
-
IP everything, essentially
What are the fundamental deliverables of IP networks? How can you use IP networks to gain financial benefits in addition to... Continue Reading
-
The basis of profitability
Not so long ago, you didn't have much choice - your IT and communications requirements were acquired, implemented and maintained... Continue Reading
-
Management matters
Cath Everett finds out how you stay on top of networking. What are the management issues related to your telecoms and networks... Continue Reading
-
Learning Guide: SAN-based backups
Some of the best advice on the ins and outs of SAN-based backups Continue Reading
-
How to secure a wireless Lan
Stuart Okin and Ian Hellen at Microsoft UK give their opinion on how different forms of data encryption can protect wireless Lan... Continue Reading
-
The VPN dilemma
With traditional networks choking on data, Liz Biddlecombe investigates the pros and cons of managing a VPN yourself or... Continue Reading
-
Tags take on the barcode
Radio frequency tags could be the technology that kills off the barcode. Bill Goodwin explains how they work and what is holding... Continue Reading
-
Future mobile
Antony Savvas explores the future mobile network Continue Reading