Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Security Channel

Blogs

user-pic

Security Snake Oil for Sale

September 11, 2013 04:45 PM
Posted by Michele Chubirka

Traditional security systems aren't doing much to help us manage risk, but we keep buying them. Is it the vendors' fault or ours? And are there better ideas we should explore?

See all blogs by Michele Chubirka

| Full Post

Tags: IDS, AV, signature detection, risk management, compliance, audit

Channel: Networking & Mgmt, Security, Data Center,

user-pic

In Defense Of VMware NSX And The Overlay Approach

September 11, 2013 02:46 PM
Posted by Kurt Marko

By using a network overlay architecture, NSX cleanly segments SDN approaches into two realms: the physical and virtual. The overlay strategy has been criticized, but it makes the most sense.

See all blogs by Kurt Marko

| Full Post

Tags: VMware NSX, SDN, software defined networks, Martin Casado, Cisco, network overlay

Channel: Virtualization, Next Gen Network, Networking & Mgmt, Data Center, Security

user-pic

Philadelphia Eagles Join Stadium Wi-Fi Stampede

September 10, 2013 02:33 PM
Posted by Lee H. Badman

Wireless is all the rage for sports teams as they try to lure fans to stadiums, but designing sports venue WLANs is complex. Here's a look at the Eagles' Wi-Fi rollout.

See all blogs by Lee H. Badman

| Full Post

Tags: Philadelphia Eagles, stadium Wi-Fi, Enterasys, Lincoln Financial Field, Cisco, WLAN, wireless network

Channel: Networking & Mgmt, Wireless, Security

user-pic

Windows 8 Enterprise Benefits And Challenges

September 03, 2013 11:28 AM
Posted by Joseph Granneman

The much-maligned operating system actually offers several security and manageability improvements for businesses. But it still has its downsides.

See all blogs by Joseph Granneman

| Full Post

Tags: Windows 8 enterprise benefits, open source, Windows 8, BitLocker, Windows 7, Start menu

Channel: Data Protection, Wireless, Networking & Mgmt, Security, Content Management

user-pic

WLAN Success During Back-to-School Deluge

August 30, 2013 04:22 PM
Posted by Lee H. Badman

My team onboarded 10,000 wireless devices as students arrived for the start of the fall semester. Here's how we made it a (mostly) painless experience.

See all blogs by Lee H. Badman

| Full Post

Tags: BYOD, WLAN, XpressConnect, supplicant, 802.11n, Bonjour, Cisco, Meraki

Channel: Networking & Mgmt, , Interop, Wireless, Security

user-pic

The 10 Deadliest Networking Mistakes

August 16, 2013 12:29 PM
Posted by Jennifer Minella

Common errors like mismatched masks and duplicate IPs can spell disaster on a network. Here are 10 mistakes to avoid.

See all blogs by Jennifer Minella

| Full Post

Tags: networking mistakes, fiber standards, VLANs, Cisco, HP

Channel: Virtualization, Security, Networking & Mgmt

<< Previous

Next >>


Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers