Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "mobile devices"

Total Search Results : 101

8 Mobile Tools For Security Pros

August 15, 2013 02:19 PM
The influx of employee-owned mobile devices into the workplace has certainly thrown many IT security professionals for a loop, but the same devices that are introducing so much chaos to established security practices also have a lot of potential to be used to bring back some order. The following mobile security tools are a good start for security admins looking for utilities to help them get their job done more efficiently.

10 Mobile Business Apps Target Analytics, Productivity and More

November 07, 2012 01:46 PM
The mobility game isn't just for consumer apps anymore. We share mobile business apps from 10 startups that can help drive sales, leverage analytics and streamline team communication.

3 Tips to Keep BYOD from Killing Your Network

October 01, 2012 09:54 AM
BYOD isn't just about security and policy enforcement. Smartphones and tablets affect network resources, too. Here are some tips on IP management, subnet sizing and WLAN design.

Outage Blackballs BlackBerry, Guides Arrow to BYOD Strategy

September 26, 2012 03:18 PM
After finding the right management tool, Arrow Container dumps RIM smartphones for BYODs. Find out why.

BYOD: The New IT Management Headache

September 26, 2012 03:14 PM
Businesses are frantically searching for tools to manage employees' handheld devices. Here's why.

Eight Mobile Apps to Help Road Warriors Boost Productivity, Efficiency

August 27, 2012 02:37 PM
It's a BYOD world out there. Here are eight mobile apps that could make things easier for your road warriors and your enterprise.

Does DNA Hold the Keys to the Future of Data Storage?

August 23, 2012 12:15 PM
Remove storage as the biggest factor restricting the size of PC hardware, and you open up a whole new world of augmented reality.

Are You Ready to Tackle Mobile Application Performance Management?

August 09, 2012 11:48 AM
As mobile devices continue to gain ground, Web apps is losing its dominance. Now it's time for companies to prepare for the realities of mobile application management.

Those Free Mobile Apps May Come at a Price: The Latest BYOD Threat

July 26, 2012 02:48 PM
Research from Black Hat shows that even legitimate mobile apps can still pose threats. Researchers share why, and how companies can address enterprise app security.

Novell Jumps Into the Mobile Device Management Pool--Again

July 26, 2012 09:45 AM
Novell's new ZenWorks Mobile Management aims to help enterprises manage their own devices and BYOD policies. Here's a look at what it offers, and where it may fall short for some.

 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers