Upcoming Events

A Network Computing Webcast:
SSDs and New Storage Options in the Data Center

March 13, 2013
11:00 AM PT / 2:00 PM ET

Solid state is showing up at every level of the storage stack -- as a memory cache, an auxiliary storage tier for hot data that's automatically shuttled between flash and mechanical disk, even as dedicated primary storage, so-called Tier 0. But if funds are limited, where should you use solid state to get the best bang for the buck? In this Network Computing webcast, we'll discuss various deployment options.

Register Now!


Interop Las Vegas 2013
May 6-10, 2013
Mandalay Bay Conference Center
Las Vegas

Attend Interop Las Vegas 2013 and get access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest tech.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Get Ready For A Wire-Free Enterprise

Done right, Wi-Fi can be deployed with greater security than wired networks, which often leave ports unprotected in cubicles and conference rooms. Because security concerns have long been a drag on WLAN adoption rates, it's now standard form to use 802.1X to ascertain a connection's user credentials and the Advanced Encryption Standard to encrypt traffic until it reaches a wireless controller in the data center or at the network edge. Those still using a VPN overlay on an open wireless network, take note: Unless you have specific application requirements or hardware limitations, now is the time to move to 802.1X with AES.

A wireless network's greatest vulnerability is in performance-degrading interference or denial-of-service techniques, some facilitated by options in the 802.11n standard. Your wireless infrastructure management system may be able to pinpoint the source of malicious traffic, or else a product from an overlay wireless intrusion-prevention system vendor like AirDefense, AirMagnet, or AirTight can do that and more. Work on the 802.11w standard is progressing to offer management frame protection, among other capabilities, to fill gaps.PEOPLE, GET READY
If you have some sentimental attachment to the copper feeding your desktop, consider that your future workforce has spent the past four years in a wireless oasis. Most colleges and universities provide Wi-Fi in a substantial portion of their classrooms and public spaces, some in their dorms. Freshly minted graduates expect mobility when they step into the workforce, and that starts with Wi-Fi access in the office.

If businesses want to attract young talent, staying on the cutting edge isn't optional. To see how close we can come to going wire-free, we broke down wireless communication into three areas: data, voice, and video.

Conventional office applications account for the majority of data access. Whether e-mail, productivity suites, or line-of-business applications, data apps consume the largest amount of a knowledge worker's time and have been successfully mobilized, in and out of the office.

Wireless voice is often thought of in terms of cellular services, but voice over Wi-Fi, or Vo-Fi, increasingly is considered a key application for wireless networks. CIOs are generally cautious about running voice over their enterprise WLANs, for good reason: Unless the wireless network was engineered with voice in mind, whether it be first- or third-generation gear, poorly implemented quality-of-service functions and a weak signal will lead to disappointed users. All the major WLAN infrastructure vendors have spent considerable time working with enterprise-class Vo-Fi providers, such as Cisco, Polycom (formerly SpectraLink), and Vocera, developing deployment guides to assist VARs and IT groups with configuring the WLAN for QoS.


Page: « Previous Page | 1234 5 | 6789  | Next Page »


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
IaaS Providers
Cloud Computing Comparison
With 17 top vendors and features matrixes covering more than 60 decision points, this is your one-stop shop for an IaaS shortlist.
IaaS Providers

Research and Reports

The Virtual Network
February 2013

Network Computing: February 2013

Upcoming Events



TechWeb Careers