News

Networking and communication

  • September 25, 2006 25 Sep'06

    IP telephony unites New Orleans nonprofit after Katrina

    Hurricane Katrina nearly disbanded the Catholic Charities Archdiocese of New Orleans, until the nonprofit rolled out a hosted voice solution

  • September 24, 2006 24 Sep'06

    Cisco bulks up data center switching

    Cisco Systems Inc. today made significant announcements in its data center switching line: an 8-port, 10 GigE module; a blade switch for Fujitsu Siemens; and a Web-based script-sharing community.

  • September 24, 2006 24 Sep'06

    Cisco bulks up data center switching

    Cisco Systems Inc. today made significant announcements in its data center switching line: an 8-port, 10 GigE module; a blade switch for Fujitsu Siemens; and a Web-based script-sharing community.

  • September 20, 2006 20 Sep'06

    Reporter's notebook: Hidden gems of Interop

    The Interop conference in New York this week featured the usual suspects talking about their newest offerings and the industry at large.

  • September 19, 2006 19 Sep'06

    NAC, VPNs and behavior analysis in the Interop spotlight

    Security for the enterprise network was emphasised at Interop New York as vendors rolled out and upgraded NAC, VPN, network behavior analysis, and other threat protection products.

  • September 18, 2006 18 Sep'06

    VoIP user experience tested

    Most VoIP monitoring is focused on quality of service, but one new company is taking a different tack and looking at the quality of experience.

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage, page 2

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 14, 2006 14 Sep'06

    Set up an ad hoc WiFi network

    What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; ...

  • September 14, 2006 14 Sep'06

    Calling network management vendors: It's time to get on board with VoIP

    Despite the hype, full-scale VoIP deployments are hard to find. According to our research at Yankee Group, over 80% of U.S. enterprises have VoIP deployed somewhere in their organization in some shape or form. This includes departmental trials and ...

  • September 12, 2006 12 Sep'06

    Dell and EMC: Five more years

    Dell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ.

  • September 12, 2006 12 Sep'06

    Is there a generic blueprint for an IP-based call center?

    Is there a generic blueprint for an IP-based call center? Where could I find one?

  • September 11, 2006 11 Sep'06

    VoIP still a confusing area for SMBs

    A study released at today's VON conference in Boston suggests that SMBs -- despite their growing use of VoIP -- are still confused about VoIP technology.

  • September 06, 2006 06 Sep'06

    Fast Guide: VoIP encryption

    A guide to encryption within VoIP networks

  • September 06, 2006 06 Sep'06

    VoIP startup untethers would-be mobile workers from wireline office phones

    VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators.

  • September 06, 2006 06 Sep'06

    VoIP startup untethers would-be mobile workers from wireline office phones

    VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators.

  • September 05, 2006 05 Sep'06

    ControlGuard targets rogue devices

    ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used.

  • September 05, 2006 05 Sep'06

    VoIP outsourcing: Save money and gain flexibility

    VoIP outsourcing is the way to go for organisations looking to deploy voice services quickly and flexibly without a major investment in skills and upkeep.

  • September 05, 2006 05 Sep'06

    VoIP outsourcing: Save money and gain flexibility

    VoIP outsourcing is the way to go for organizations looking to deploy voice services quickly and flexibly without a major investment in skills and upkeep.

  • September 05, 2006 05 Sep'06

    Cisco accelerates the branch

    Cisco rolls WAN optimization, application acceleration and Wide Area File Services (WAFS) in a single branch box to complement its Application Control Engine (ACE) data center optimization product.

  • September 05, 2006 05 Sep'06

    Instant messaging boom brings security concerns

    Instant messaging (IM) has made significant inroads to the enterprise, but using public IM applications may open up security holes in the network

  • September 04, 2006 04 Sep'06

    Revamped Cisco WAFS worth the wait, users say

    Months late, Cisco has finally released a combined Wan optimisation and WAFS product, while startups like Riverbed have been snapping up the customers. But some Cisco beta testers say it has been worth the wait.

  • September 04, 2006 04 Sep'06

    Instant messaging boom brings security concerns

    Instant messaging (IM) has made significant inroads to the enterprise, but using public IM applications may open up security holes in the network.

  • August 31, 2006 31 Aug'06

    Interoperability issues for a 6500 Cisco switch and a 3Comm 7700

    In this response, Sudhanshu Gupta talks about the interoperability issues that go along with a 6500 Cisco switch and a 3Comm 7700.

  • August 31, 2006 31 Aug'06

    Connecting ISDN PRI to a VPN via a Cisco AS5350

    Sudhanshu Gupta examines how to connect an ISDN PRI to a VPN using a Cisco AS5350.

  • August 31, 2006 31 Aug'06

    Routing phone calls to a POTS

    Sudhanshu Gupta explains how to route all phone calls to a POTS, in this Q&A.

  • August 31, 2006 31 Aug'06

    Configuring managed and unmanaged switches

    In this Q&A, Sudhanshu Gupta answers which cable to use with managed and unmanaged switches.

  • August 30, 2006 30 Aug'06

    VoIP outsourcing: Save money while gaining flexibility

    VoIP outsourcing is the way to go for firms looking to deploy voice services quickly and flexibly without a major investment in skills and upkeep.

  • August 29, 2006 29 Aug'06

    AT&T breach affects 19,000 customers

    Online outlaws hacked into an AT&T computer system and stole credit card data on thousands of customers. AT&T has offered to pay for credit monitoring services for those affected.

  • August 28, 2006 28 Aug'06

    Riverbed update offers users more bandwidth, better reporting

    Riverbed announced a package of hardware and software updates, which some customers say they've been waiting for.

  • August 28, 2006 28 Aug'06

    ProCurve rolls out three new switch series

    ProCurve Networking by HP has added three new series of switches to its lineup.

  • August 27, 2006 27 Aug'06

    3PAR adds midrange array for secondary sites

    3PAR has introduced a smaller version of its InServ Storage Server, which it describes as a product-line extension into its existing customer base.

  • August 27, 2006 27 Aug'06

    Duplex mismatch

    This article helps networking engineers understand the issues behind duplex mismatch, one of the most troublesome problems in today's Ethernet networks. Learn why duplex mismatch occurs and how you can prevent it with autonegotiation and hard coding.

  • August 22, 2006 22 Aug'06

    Column: VoIP applications fuel the next wave of VoIP innovation

    The first phase of VoIP is nearing the end and corporations will soon find a variety of third-party desktop applications that run on VoIP. Has VoIP improved the day-to-day for end users?

  • August 21, 2006 21 Aug'06

    Briefs: VoiceCon in the news

    This week at VoiceCon we saw everything from managed VoIP services to IP phones made to make mobile workers right at home, wherever they are.

  • August 16, 2006 16 Aug'06

    Cisco struggles with SIP firewall flaw

    Cisco admits it can't reproduce a SIP security flaw in its PIX firewall that was first identified by a researcher at Black Hat.

  • August 16, 2006 16 Aug'06

    Briefs: VoIP in the news

    Asterisk maker Digium gets major funding; Quintum's VoIP switch offers backup option for branch office; The Cisco Store makes the case for unified communications.

  • August 16, 2006 16 Aug'06

    Wireless security push fueled by paranoia

    Wireless security became a necessity for Intermagnetics, but when the company used its access points to monitor the spectrum, performance suffered.

  • August 15, 2006 15 Aug'06

    Cisco says it can't reproduce PIX flaw

    Ever since a researcher at Black Hat outlined a flaw in the PIX firewall, Cisco has been trying to reproduce the security hole. So far, the company has been unsuccessful.

  • August 15, 2006 15 Aug'06

    Cisco boosts VoIP certification

    The upgraded CCNP midlevel Cisco certification now incorporates VoIP, security and wireless to boost converged network skills among enterprise professionals.

  • August 14, 2006 14 Aug'06

    Wireless security boost for laptops outside the office

    >Most companies do a pretty good job with wireless security within the office walls, but what happens when end users take their laptops home -- or to Starbucks?

  • August 06, 2006 06 Aug'06

    VoIP call quality on the decline

    Advances in technology have made VoIP more common, but that hasn't stopped VoIP call quality from dropping steadily over the last 18 months, according to a recent study by Brix Networks.

  • August 03, 2006 03 Aug'06

    Vendors reject preferential knowledge sharing

    While Cisco continues to investigate a potential PIX firewall flaw, it and other vendors say sharing security information quickly and indiscriminately is always the best policy.

  • August 02, 2006 02 Aug'06

    RFID security issues are cause for corporate concern

    Although small in nature, RFID tags could be used to attack databases and corrupt critical information. It's a growing concern as corporate RFID use skyrockets, yet experts say there are reasonable ways to mitigate the risks and gain the business ...

  • August 02, 2006 02 Aug'06

    Possible Cisco zero-day exploit revealed at Black Hat

    Details of an alleged flaw related to SIP and PIX appliances, briefly mentioned in a Wednesday Black Hat presentation, are being kept under wraps as Cisco and US-CERT investigate.

  • July 26, 2006 26 Jul'06

    Blue Cross bears burden of 'no wireless' policy

    Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something.

  • June 01, 2006 01 Jun'06

    BlueCat appliance offers rock-solid security

    Hot Pick: The Adonis 1000 appliance bundles DNS and DHCP into an enterprise-class appliance for the centralized secure operation of network addressing.

  • February 08, 2006 08 Feb'06

    MEF drives up quality standards in carrier Ethernet

    The Metro Ethernet Forum (MEF) has expanded its certification program to include quality of service parameters in network kit, to ensure service providers can give their customers the service they demand.

  • November 28, 2005 28 Nov'05

    Step 6: Configuring wireless clients

    With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide.

  • November 22, 2005 22 Nov'05

    Influential survey says security 'set back by 6 years'

    Update: The SANS Top 20 vulnerability list for 2005 shows the bad guys attacking flawed apps and paying more attention to network holes.

  • November 21, 2005 21 Nov'05

    Wireless security: Public Wi-Fi could open security holes

    A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own.