Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "BYOD"

Total Search Results : 57

Feds Greatest Security Fear? Hacktivists

April 30, 2012 07:46 AM
Potential cyberthreats from foreign governments play second fiddle to concerns over hacktivists and the insider threat, a report finds. BYOD and mobility are second only to social media.

Skytap Streamlines VM Cloud Access

April 26, 2012 09:00 AM
Leveraging Skytap’s cloud just got a lot easier, thanks to the company’s new SmartClient and service enhancements. Improvements to its service offering will ease the provisioning, testing and operations of new VMs.

Security Regs Could Create 'Cyber Havens'

April 04, 2012 11:00 AM
A new report on network security threats says that if some countries adopt tougher security and user privacy regulations, companies may look for cloud service providers in countries where it is cheaper but with lax security. It’s what the Information Security Forum (ISF) calls "cyber havens." The ISF also warns that regulations that impose more disclosure of security weaknesses in the name of transparency may have the unintended effect of inviting cyberattacks on them.

Aternity Goes Beyond Simple MDM

April 03, 2012 09:00 AM
Better network management products have always been about rapidly boiling down complex environments into words and graphics that network administrators can easily draw accurate conclusions from. Server admins and router jockeys alike know the value of good management frameworks for end-user experience measurement, and now Aternity looks to bring the same philosophy and deep views to the mobile device realm.

More Security Breaches: Denial Not An Option!

April 02, 2012 09:00 AM
It has happened again. Another breach. Another report of millions of credit card numbers at risk. Another round of media coverage. Another reminder that despite all the sophisticated technology that enterprises have deployed to protect computer networks, these breaches still happen. But despite the negative publicity that comes from continuing reports of such breaches, the need to be vigilant about thwarting such attacks remains, says Steve Durbin, global vice president of the Information Security Forum (ISF).

Apple Continues Enterprise Blitz-Crawl

April 02, 2012 09:00 AM
Thanks to the rising popularity of the iPad, Apple’s influence within the enterprise is growing, but not with rocketing speed as one might suspect. Still, the advantage appears to be on Apple’s side, even if corporate IT managers view the vendor’s hardware as an afterthought.

The BYOD Security Dilemma

March 29, 2012 01:00 PM
The Information Security Forum this week released a report titled 'Threat Horizon 2014' that looks at the continued global threat to computer networks, businesses and individuals from cybercrime. But one section of the report also looks at 'Internal Threats', which at first glance would seem like another discussion about malicious insiders who attack the network because they’re disgruntled. In fact, the Internal Threats identified in this report are from new technology that comes into an organization, sometimes presenting security issues its advocates weren’t aware of. A case in point is BYOD.

Ruckus Seeks To Re-Invent Muni-Wireless

March 19, 2012 09:00 AM
Around 2005, several US cities tried to make a go of metropolitan wireless networking. Many of the initiatives were costly failures, and just as many morphed into shadows of their intended scales and uses. But in IT, sometimes old ideas come back with new teeth. In a recent announcement, Ruckus Wireless announced a new urban wireless project, and in the most curious of locations. It will be interesting to see how this one pans out, and for multiple reasons.

Taming Apple's Bonjour

March 08, 2012 03:56 PM
By now we know that iPhones and iPads (and a few of those Android things) have infiltrated the enterprise, but much of Apple's approach to networking and interdevice functionality is still a bit, well, consumer-oriented, which has IT scrambling to deal with protocols that often conflict with enterprise IT's goals.

Trying To Stay Sane In A Crazy Wireless World

March 05, 2012 11:00 AM
I'm here to tell you, supporting wireless and mobile clients is nothing like keeping our Ethernet-tethered users happy. In the wired network world, you either get the speed that you're supposed to, or some counter or log somewhere points you to what's wrong. In the wireless realm, the variables are almost infinite. It's way more complicated, and getting worse. A lot worse.

« Previous Page  | 1 | 2 | 3 | 4 |  5 | 6  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers