Gen WiFi Demands A+ Educational Networks
The WiFi network on a college campus has grown from a convenience to a must-have, with IT struggling to control and maintain pervasive coverage at high capacity.
Call Center Lessons Learned
Successful call center operations can make or break your business. Getting your processes and integration standards right are critical to keeping it all running smoothly.
Evaluate UC Requirements In 3 Steps
Unified communications could streamline your business communications and customer service processes. But to implement UC well, you must ask the right questions up front.
How To Increase Value Of Video
Video has become a big part of enterprise strategy, but it can be difficult to store, manage, share, and find. Here's how to make video act more like a text document.
Conquering Distance With Technology
For those of us in the corporate realm, it’s easy to take for granted the changes in communication technology in recent years. A conversation with a friend reminded me of how far we’ve come.
Cisco Certification: 5 Tips For Success
Earning a Cisco certification can boost your IT career, but requires careful planning and training. Here are five tips to help guide your certification strategy.
10 Free Network Analysis Tools
Network management can be a tall task without the right statistics and data about traffic flows, device configurations and user activities. The following utilities offer visibility into various aspects of network activity without breaking the bank. Utilizing these free tools gives network managers a better foothold for improving performance, spotting potential problems and nipping security incidents in the bud.
10 Ways Apple iOS 7 Targets Businesses
Apple has made great strides to appease not just business users, but also the IT administrators and security managers responsible for protecting and managing the infrastructure that supports mobile device use. The release of iOS 7 had many pundits lauding Apple's leadership for listening to the business contingent and releasing a raft of new management and security features that show progress for making iPhones and iPads more than consumer gadgets.
The Case For More Granular Network QoS
Vendor-supplied settings for network quality of service won't cut it when prioritizing critical apps, VoIP and video traffic. Invest in developing a network QoS strategy.
VoIP Planning: 3 Critical Steps
Don't overlook these core considerations when implementing VoIP or you may find yourself in the middle of a disaster. Plan properly to ensure a successful deployment.
The IT Generation Gap
VMworld panel exposes a rift between innovative startups focused on cloud, mobile and social technologies and old IT that clings to its data centers and self-managed applications.
8 Mobile Tools For Security Pros
The influx of employee-owned mobile devices into the workplace has certainly thrown many IT security professionals for a loop, but the same devices that are introducing so much chaos to established security practices also have a lot of potential to be used to bring back some order. The following mobile security tools are a good start for security admins looking for utilities to help them get their job done more efficiently.
Advice to New Network Engineers
Here are two key steps that can help make the difference between a short, unhappy stint and a long, successful career in networking.
The Business Case For Going Mobile
If you don't see a business need for mobile app development, you're missing out. Companies like Starbucks are reaping tremendous benefits by investing in mobile technology.
Tackling Information Infrastructure Complexity
Taking a software and data-driven approach can help reduce costs and maintain availability as IT becomes more complex. Here's a look at Sanbolic, one of the companies in this emerging area.
Cisco and NetApp Update FlexPod For Big Data
New FlexPod designs also support branch offices; Riverbed updates Steelhead, RiOS; Dell updates SonicOS; EfficientIP releases new network management tool; Metalogix launches SharePoint tool.
Security Conferences: Advice From The Trenches
IT security conferences can offer enriching experiences, but also might be draining and irritating without proper planning. Here are some tips for making sure you make the most of your conference experience.
10 Amusing IT Memes
From Google Glass to Linux to tech support hell, these memes put an amusing slant on the day-to-day business of information technology. Whether it's The World's Most Interesting Man on routing, or Morpheus from "The Matrix" with some uncomfortable truths about SDN, these memes should elicit a laugh. If we missed your favorite, or you've made your own, share it in the Comment section below.
How Tape and LTFS Can Relieve Storage Pressure
Most data stored on hard disk has little value, but enterprises are reluctant to part with it. Tape is more cost-effective, and Linear Tape File System (LTFS) makes writing to a tape-based active archive much easier.
Puppet Labs Doubles Node Management
Updated software features dynamic discovery; Enterasys targets high-density data centers with new 7100S switches; Fluke updates OneTouch software; Silver Peak adds hourly option to AWS acceleration; SanDisk software supports bigger caches, multiple SSDs; Sepaton adds Symantec, Tivoli support; Kemp gets UCS certified; Syncplicity provides federated ID management.