Upcoming Events

A Network Computing Webcast:
SSDs and New Storage Options in the Data Center

March 13, 2013
11:00 AM PT / 2:00 PM ET

Solid state is showing up at every level of the storage stack -- as a memory cache, an auxiliary storage tier for hot data that's automatically shuttled between flash and mechanical disk, even as dedicated primary storage, so-called Tier 0. But if funds are limited, where should you use solid state to get the best bang for the buck? In this Network Computing webcast, we'll discuss various deployment options.

Register Now!


Interop Las Vegas 2013
May 6-10, 2013
Mandalay Bay Conference Center
Las Vegas

Attend Interop Las Vegas 2013 and get access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest tech.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Security Channel

Blogs

user-pic

The Hardest Part of BYOD Management? Policy

August 27, 2012 10:41 AM
Posted by Lee H. Badman

Sure, BYOD is a hot topic--but you don't have to allow it. If you do, though, here's why determining your policy should be the first step to BYOD management.

See all blogs by Lee H. Badman

| Full Post

Tags: BYOD management, network management, wireless, mobile device management,

Channel: Wireless, Security, Other, Networking & Mgmt

user-pic

The Yin and Yang of Indoor Navigation

August 08, 2012 10:23 AM
Posted by Lee H. Badman

GPS units have become standard for driving, geocaching and other outdoor activities. But what about indoor navigation needs, like tracking merchandise and engaging customers? Learn who's using and offering location services.

See all blogs by Lee H. Badman

| Full Post

Tags: indoor navigation, location services, Nearbuy, Wifarer, Cisco, Mobility Service Engine

Channel: Security, Wireless, Next Gen Network, Networking & Mgmt

user-pic

Meraki's Managed Wireless Gets Stronger Security, But ...

July 20, 2012 10:16 AM
Posted by Lee H. Badman

Meraki's new code release includes the Air Marshal security module as well as several other features. If you're new to managed wireless, however, here are some things to note.

See all blogs by Lee H. Badman

| Full Post

Tags: managed wireless, Meraki, Air Marshal, wireless security, security policy

Channel: Wireless, Security

user-pic

Public Cloud Is Neither More Nor Less Secure Than Private Cloud

June 26, 2012 02:57 PM
Posted by Mike Fratto

Claims that public cloud is more secure than private cloud are pure FUD and ignore the responsibilities that each party plays in information security. What matters is how well your applications and VM are protected. Learn why.

See all blogs by Mike Fratto

| Full Post

Tags: public clouds, private clouds, cloud security, cloud computing, information security, application management, virtual machines

Channel: Private Cloud, Cloud Computing, Data Protection, Security, Public Cloud

user-pic

BGP Origin Authentication and RPKI

June 14, 2012 09:00 AM
Posted by Greg Ferro

The BGP Origin Authentication is a positive step, writes our blogger, but it has a downside. Learn more about IP address theft.

See all blogs by Greg Ferro

| Full Post

Tags: IP addresses, BGP Origin Authentication, IP network, network security

Channel: Networking & Mgmt, Security

user-pic

Consider Cloud Computing Services Before Your Users Do

May 21, 2012 08:58 AM
Posted by Joe Onisick

Google Docs, Dropbox, Carbonite and other cloud computing services may be hosting your corporate data right now. Learn why you need to accept the cloud and regain control.

See all blogs by Joe Onisick

| Full Post

Tags: cloud computing, Dropbox, Google Docs, Carbonite, IT asset management, data protection

Channel: Cloud Computing, Private Cloud, Security, Public Cloud

<< Previous

Next >>


Best of the Web

VXLAN termination on physical devices

VXLAN is an Experimental IETF draft of protocols to enable the creation of a large overlay, multi-tenant network.

Quick Read

ONF Deadly Serious About OpenFlow-Based SDNs

: OpenFlow is poised to reach over-hyped status, yet there are practical, useful reasons for keeping an eye on Openflow. The biggest cloud players are involved and driving the feature creation.

Quick Read

Practical Introduction to Applied OpenFlow

Get a primer on the Openflow protocol and what it can do for networking.

Quick Read

On Resilience of Spit-Architecture Networks

This research papers investigates the practical issues in split-architecture networks and the placement of the controllers, such as Openflow controllers, in the network.

Quick Read

IaaS Providers
Cloud Computing Comparison
With 17 top vendors and features matrixes covering more than 60 decision points, this is your one-stop shop for an IaaS shortlist.
IaaS Providers

Research and Reports

The Virtual Network
February 2013

Network Computing: February 2013

Upcoming Events



TechWeb Careers