Wireless Infrastructure
Expert Analysis
The Wireless Perfect Storm
Lee Badman, CommentaryVideo
The way data is consumed and delivered continues to change rapidly, causing technology shifts on every front that have dramatic effects on wireless networks. Lee Badman, network engineer and wireless technical lead for Syracuse University, explains where WiFi is headed in light of the combined complexity of factors like software-defined networks, 802.11ac, and LTE.
By Lee Badman ,
CommentPost a comment  |  Read  |  Post a Comment
Top IT Certifications To Jump-Start Your Job
Tony Kontzer,
Working in IT infrastructure means a whole lot more than hardware these days. Boost your career with these hot certifications on virtualization, cloud, security, and more.
By Tony Kontzer ,
Comment1 Comment  |  Read  |  Post a Comment
Welcome To The New Network Computing
Network Computing, CommentaryVideo
Find out why Network Computing is the place where IT infrastructure professionals gather to interact, share, and connect with their peers.
By Network Computing ,
CommentPost a comment  |  Read  |  Post a Comment
Greatest Moments In Interop History
Marcia Savage, Managing Editor, Network Computing
It's hard to believe it's been 26 years since the first commercial Interop conference. Over the years, vendors made splashes with new technologies, Interop grew beyond its Silicon Valley roots, and celebrities like Mr. T joined the action. Here's a look at some of the best moments in Interop's rich history.
By Marcia Savage Managing Editor, Network Computing,
CommentPost a comment  |  Read  |  Post a Comment
How Virtualization Can Simplify Your BYOD Strategy
Bill Kleyman, National Director of Strategy & Innovation, MTM TechnologiesCommentary
Virtualization technologies can help enterprise IT teams support the new user-centric model created by IT consumerization.
By Bill Kleyman National Director of Strategy & Innovation, MTM Technologies,
Comment2 comments  |  Read  |  Post a Comment
IPv6: Sweet Spots of Adoption
Erik Nygren, Chief Architect, AkamaiCommentary
IPv6 adoption has been surging ahead. Find out how it correlates with network operator adoption, mobile devices, and desktop operating systems.
By Erik Nygren Chief Architect, Akamai,
CommentPost a comment  |  Read  |  Post a Comment
Today's Network Security Challenges: No Easy Answers
Tony Kontzer, News
The BYOD trend and proliferation of mobile devices are making life hard for security teams, but solutions are elusive, panelists say at RSA Conference 2014
By Tony Kontzer ,
Comment1 Comment  |  Read  |  Post a Comment
The New Mobile Enterprise: A Smorgasbord Of Choices
Lee Badman, Network Engineer & Wireless Technical LeadCommentary
As wireless technologies take precedence in the enterprise, WLANs have become complex deployments. Here's a look at the evolving array of wireless options.
By Lee Badman Network Engineer & Wireless Technical Lead,
CommentPost a comment  |  Read  |  Post a Comment
A Geek's Guide To The 2014 Oscars
Tony Kontzer,
IT types have always liked certain types of movies: Fantasies, space films, and any flicks that prominently feature technology are always high on the to-see list. The upcoming Academy Awards offer techies no shortage of opportunities to root for the kinds of films they love, as well as the technologies that make them possible. With that in mind, we've gone through the Oscar lineup to identify what are likely to be some of the most geek-friendly moments of this year's awards ceremony.
By Tony Kontzer ,
Comment3 comments  |  Read  |  Post a Comment
Master of Network Interoperability
Susan Fogarty, Editor in ChiefCommentary
If anyone knows about network interoperability, it's Glenn Evans, the lead network engineer for the InteropNet, the infrastructure that supports the Interop conference and more than 300 exhibitors.
By Susan Fogarty Editor in Chief,
Comment1 Comment  |  Read  |  Post a Comment
Building an Information Security Policy Part 1: Network Devices
Natalie Timms, Commentary
An effective security policy requires careful planning to ensure the roles and capabilities of routers, switches and firewalls are properly configured.
By Natalie Timms ,
CommentPost a comment  |  Read  |  Post a Comment
Behind The Scenes Building The InteropNet
Network Computing, News
Network engineers are busy preparing the network infrastructure for the multi-vendor InteropNet that will support the upcoming Interop conference. Preview the action in our video.
By Network Computing ,
CommentPost a comment  |  Read  |  Post a Comment
Reducing Video Surveillance Storage Costs
David Hill, Network Computing BloggerCommentary
The growth of video surveillance data heavily impacts network bandwidth and increases storage demands. Here's a look at how one vendor, Bosch, is working to address these challenges.
By David Hill Network Computing Blogger,
Comment1 Comment  |  Read  |  Post a Comment
DDoS Attacks Against Datacenters On The Rise, Report Says
Tony Kontzer, News
More datacenter operators report distributed denial-of-service attacks against their infrastructure, according to Arbor Networks' annual survey.
By Tony Kontzer ,
CommentPost a comment  |  Read  |  Post a Comment
Best of Interop Product Awards Open
Susan Fogarty, Editor in ChiefCommentary
The Best of Interop 2014 product awards are open for nominations. Be sure to spread the word to vendors of your favorite products.
By Susan Fogarty Editor in Chief,
CommentPost a comment  |  Read  |  Post a Comment
ONF Ramps Up Wireless And Mobile SDN Effort
Marcia Savage, Managing Editor, Network ComputingNews
The Open Networking Foundation's new working group is focused on extending OpenFlow to wireless and mobile networks.
By Marcia Savage Managing Editor, Network Computing,
CommentPost a comment  |  Read  |  Post a Comment
802.11ac Migration: Picking Up Steam In 2014
Network Computing, News
This year will see more enterprises investing in 802.11ac products as they develop plans to migrate to the new wireless standard.
By Network Computing ,
CommentPost a comment  |  Read  |  Post a Comment
The Case For VDI In The BYOD Era
Jim O'Reilly, ConsultantCommentary
Virtual desktop infrastructure is becoming more attractive in the enterprise as BYOD becomes a way of life and new flash arrays boost VDI performance.
By Jim O'Reilly Consultant,
Comment3 comments  |  Read  |  Post a Comment
Endpoint Security Risks On The Rise, But Budgets Flat, Report Says
Network Computing, News
Survey shows that IT security pros are more worried about endpoint security threats, but organizations aren't allocating more resources to combat them.
By Network Computing ,
Comment1 Comment  |  Read  |  Post a Comment
Network Security 2014: 5 Predictions
Network Computing, News
Here are some trends security industry executives say network security professionals can expect to see next year.
By Network Computing ,
Comment1 Comment  |  Read  |  Post a Comment
More Stories
PR Newswire
Hot Topics
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
Video
Slideshows
Twitter Feed