Expert Analysis
Latest Content tagged with Applications
Page 1 / 2   >   >>
Great Gifts For Tech Lovers
Slideshows  |  11/25/2015  | 
Gifts for technologists don't have to be boring. Our tech gift guide offers fun and thoughtful options for your geeky friends and relations.
It's Time To Integrate Encryption
Commentary  |  11/24/2015  | 
What's the first step to improving information security? Quit blaming people and focus on enabling technologies like encryption.
3 Ways To Optimize IT Operations
Commentary  |  11/23/2015  | 
A truly effective IT infrastructure can become a competitive advantage. Here's how to make good IT operations even better.
Internet of Things: 5 Real-World Reasons It's Not Going Away
Slideshows  |  11/13/2015  | 
Don't dismiss IoT as a technology of the future. We look beyond the hype and examine some of the ways enterprises are putting the IoT to work today.
3D XPoint: A Memory Game Changer
Commentary  |  11/12/2015  | 
The new memory technology from Intel and Micron will bring massive changes to storage systems with major repercussions in the data center.
IoT: The Enterprise Impact
Commentary  |  11/11/2015  | 
The Internet of Things will place new pressures on many fronts for enterprise networks, including DNS and management requirements.
Riverbed's Take On SD-WAN
Commentary  |  11/4/2015  | 
The software-defined WAN market is hopping. WAN optimization specialist Riverbed tackles the space from a different angle.
How To Control Shadow IT
Commentary  |  11/4/2015  | 
The ready availability of cloud services has eroded IT's control. Here are some ways to wrest it back.
7 Building Blocks For Enterprise IoT
Slideshows  |  11/3/2015  | 
Behind all those flashy applications enabled by the Internet of Things is a stark reality -- enterprises must create a highly reliable and secure infrastructure before they can capitalize on it.
DDoS Mitigation: Pay Attention To The Network
Commentary  |  11/3/2015  | 
DDoS attacks are a growing threat. Monitoring firewall and load balancing activity can help IT teams detect and mitigate DDoS attacks.
IoT Security & Privacy: Reducing Vulnerabilities
Commentary  |  11/2/2015  | 
Ensuring data security and privacy in IoT networks means taking a different approach and building protection in from the start.
8 Wireless Startups & Products Transforming Mobility
Slideshows  |  10/29/2015  | 
The growth and development of wireless technology shows no signs of slowing down. These innovative companies and their products could revolutionize the mobile world.
IT Security Horror Stories
Slideshows  |  10/28/2015  | 
In honor of Halloween and Cybersecurity Awareness Month, these tales from the IT crypt are sure to haunt your nightmares.
Meet The IT Experts Behind Interop
Commentary  |  10/26/2015  | 
Interop welcomes some of the most respected and brightest minds in the IT industry as Track Chairs for its educational program.
Why The Business Needs SDN
Commentary  |  10/20/2015  | 
Software-defined networking provides network programmability, which helps contain operational costs and enables business growth.
Who's Managing Your Cloud?
Commentary  |  10/15/2015  | 
The expectation that cloud providers will manage enterprise systems and applications is sometimes misplaced. Be sure to create effective management guidelines from the start.
Paving The Way For SDN Interoperability
Commentary  |  10/9/2015  | 
Two new abstraction frameworks ensure interoperability between OpenFlow v1.3-enabled hardware-based switches from different vendors.
Technology Drives The 21st Century Office
Commentary  |  10/9/2015  | 
Cloud-based solutions, smarter mobile devices, UC platforms and ubiquitous wireless access are changing the workplace dramatically.
Banks Bet Their Money On Private Cloud
Commentary  |  10/8/2015  | 
As banks move toward a cloud-based infrastructure, they must protect their assets while understanding that the network is a fundamental contributor to the cloud and to their customers' quality of experience.
Why Docker Is The Hottest Technology On The Block
Commentary  |  10/2/2015  | 
We know you've heard about Docker. In this tutorial and video, we explain why it's so popular and exactly what the container technology entails.
DevOps, Hybrid Cloud & Sandboxes
Commentary  |  9/23/2015  | 
With devops and hybrid cloud gaining traction in the enterprise, sandboxes give IT pros a safe way to build and test applications in both on-premise and public cloud environments.
Super Smartphone Apps For Network Administrators
Slideshows  |  9/22/2015  | 
These mobile apps can improve productivity and save precious time for IT pros managing and troubleshooting networks.
Telling Ain't Training: How To Transfer IT Skills
Commentary  |  9/21/2015  | 
Hands-on experience will help you learn an IT skill, but adapting that concept to other platforms or subject areas deepens knowledge even further.
3 Key WAN Architecture Considerations
Commentary  |  9/18/2015  | 
New WAN architectures offer network teams options for dynamic load balancing and policy-based networking, but can complicate troubleshooting.
Troubleshooting MTU & ICMP Issues
Education  |  9/17/2015  | 
In this video, network analysis expert Tony Fortunato demonstrates how to use ICMP to look into slow performance related to packet size.
22 Free Security Tools To Safeguard Your Enterprise
Slideshows  |  9/17/2015  | 
Security is serious business, but it doesn't have to bankrupt your budget. The free tools highlighted here can help diagnose and monitor threats, prevent intrusions, secure passwords, ensure compliance, and much more.
New Cisco WiFi Product Targets SMBs
News  |  9/15/2015  | 
Mobility Express, which doesn't require a separate WLAN controller appliance, is designed to streamline deployment for small businesses.
Brocade Unveils Updated SDN Controller
News  |  9/15/2015  | 
Brocade's new controller based on the open source OpenDaylight Project features improved reliability and interoperability.
5 Ways Life Would Stink Without IT Professionals
Slideshows  |  9/14/2015  | 
What would happen if we suddenly had to live without the help of IT pros? The results could be scary.
IT Maturity: A Three-Part Harmony
Commentary  |  9/11/2015  | 
IT departments can move beyond putting out fires to focus on innovation and optimization by carefully combining people, process and technology.
Troubleshooting IP Helper Address Issues
Education  |  9/10/2015  | 
IP helper addresses are often used to manage broadcast protocols, especially when it comes to DHCP, but be on the lookout for potential problems they can cause.
Managed Cloud Providers: 3 Questions To Ask
Commentary  |  9/10/2015  | 
Before outsourcing to a managed cloud service provider, ask these questions to get past the hype and ensure the CSP is up to the task.
Digital Transformation & The Healthcare Industry
Commentary  |  9/8/2015  | 
To build a digital foundation, healthcare companies are revisiting their IT infrastructure with a focus on cloud-based technologies and SDN.
Network Troubleshooting: Latency Vs. Retransmission
Education  |  9/3/2015  | 
In this video, learn how changing the location of network test tools can help identify problems with latency and retransmission.
Beyond Redundancy: Improving IT Availability
Commentary  |  8/28/2015  | 
IT leaders must look at redundancy and availability in a more comprehensive way to develop a strategy for true IT resilience.
Selecting Storage: It's All About The Applications
Commentary  |  8/26/2015  | 
Choosing the right storage for your applications depends on using the PACE model, evaluating Performance, Availability, Capacity and Economics.
5 Real Ways To Approach Security Automation
Commentary  |  8/20/2015  | 
We've all heard about the benefits of automating system configurations to avoid human error, but introducing it to your infrastructure may be easier said than done. Here are five real-world ways to get started.
4G Edge Routers On The Rise
Commentary  |  8/17/2015  | 
Enterprise networks are increasingly leveraging 4G edge router technology for flexibility in providing connectivity for POS terminals, IoT devices and more.
Containers Spell Security Threats For Mobile
Commentary  |  8/14/2015  | 
Containers are gaining popularity, but for mobile usage introduce security vulnerabilities.
Pain-Free Migration To The Public Cloud
Commentary  |  8/7/2015  | 
Thinking of moving applications to the public cloud? Follow these guidelines to ensure unexpected expenses and problems don't erode potential benefits.
Log Analysis: Untapped Network Intelligence
Commentary  |  8/7/2015  | 
Don't overlook log data as a resource for detecting network problems and improved network planning.
Software-Defined UC: Way Overdue
Commentary  |  8/7/2015  | 
With unified communications environments getting exponentially more complex, management needs to get far more automated.
6 Must-Have Enterprise Productivity Tools
Slideshows  |  8/5/2015  | 
Productivity is the name of the game for today's enterprises to work faster and smarter. We outline the key tools you should leverage to help your employees collaborate and your business compete.
Dark Reading News Desk Live At Black Hat 2015
News  |  8/5/2015  | 
Please join host Sara Peters and her guests for the latest in security from the Dark Reading News Desk show at Black Hat USA 2015, premiering Wednesday.
10 Leaders In Internet Of Things Infrastructure
Slideshows  |  8/4/2015  | 
The Internet of Things needs a strong backbone for the many billions of connected devices and apps most prognosticators expect. Find out which companies are building the IoT behind the scenes.
Network Troubleshooting: Consider The Load Balancer
Commentary  |  7/30/2015  | 
Packet analysis can discover issues in your network, but if there is a load balancer in the mix, you'll want to follow these best practices.
IoT: Centralized Vs. Distributed Architectures
Commentary  |  7/30/2015  | 
How do we create cohesive networks to support the Internet of Things?
Network Orchestration Smarts Up
Commentary  |  7/28/2015  | 
In this era of digitization, multimedia and cloud, the network needs to evolve from connectivity to business continuity.
Wi-Fi Aware And Wi-Fi Sense Spark Concerns
Commentary  |  7/27/2015  | 
Two new consumer WiFi technologies could impact enterprise WLAN security and performance.
WiFi Best Practices For Quality Assurance
Commentary  |  7/24/2015  | 
Today's WiFi networks require a more strategic approach than just dropping APs everywhere in order to ensure quality of service.
Page 1 / 2   >   >>

White Papers
Register for Network Computing Newsletters
Current Issue
Research: 2014 State of the Data Center
Research: 2014 State of the Data Center
Our latest survey shows growing demand, fixed budgets, and good reason why resellers and vendors must fight to remain relevant. One thing's for sure: The data center is poised for a wild ride, and no one wants to be left behind.
Twitter Feed