Computer networking news, reviews, solutions, and analysis for IT professionals
  • Investing in Wi-Fi: Finding the ROI

    Posted May 27, 2003 - 8:26 pm

    This article offers some detailed numbers on just what Wi-Fi adopters are getting back on their investments. Necessary reading for any IT manager contemplating a wireless initiative.
  • Grid computing boosts hacker network

    Posted May 22, 2003 - 2:09 pm

    Evil-doers of the world unite! Grid computing is today being used for all sorts of research projects aimed at improving the human condition, from finding a cure for smallpox to powering the search for extraterrestrial intelligence, but a new grid project has emerged that seeks to crack encryption used in commerce.
  • MPLS VPNs: The real deal

    Posted May 22, 2003 - 12:55 pm

    Level set: where an IPsec VPN creates a circuit across the Internet, MPLS creates circuits across a service provider's network. What does MPLS mean for security? What does it mean for your enterprise? Read on and find out.
  • IBM loses insurer's data

    Posted May 22, 2003 - 10:43 am

    IBM's on-demand initiative took a blow earlier this year when one of its data centers 'lost' a hard drive containing financial details for an estimated 180,000 clients of a Canadian life insurance company.
  • Wireless sniffers put to the test

    Posted May 20, 2003 - 5:12 pm

    While wireless sniffers don't necessarily offer the tools to fully analyzer a problem, they are invaluable for figuring out exactly where a problem lies. Read on to find out more about how real physical location matters as much as network topography in the new wireless world.
  • Wireless LAN deployment and security: Using wireless analyzers

    Posted May 20, 2003 - 4:46 pm

    If you're at sea wondering how to monitor and regulate your business's WLAN, this article will point you in some helpful directions. You'll learn about the WLAN analyzers that are available and find out more about their capabilities.
  • Sneak an AiroPeek at WLAN stats

    Posted May 20, 2003 - 4:39 pm

    There are a number of products on the market that help you determine the limits of your WLAN coverage and sniff out rogue access points. This article compares three - Network Associates' Sniffer Wireless, Network Instruments' Expert Observer, and WildPackets' AiroPeek NX - in a real-world context. Read on to find out more about the strengths and weaknesses of each.
  • Troubleshooting your 802.11 WLAN

    Posted May 20, 2003 - 4:18 pm

    This article gives detailed instructions on how to troubleshoot your wireless LAN network. Extensive attention is paid to just how you can best use a wireless network analyzer to fine-tune your network.
  • Scanning the airwaves

    Posted May 20, 2003 - 4:12 pm

    A forward-thinking manager will be thinking about troubleshooting even the most preliminary WLAN. This article contains all you need to know about WLAN analyzers - their capabilities, their potential, and the products available in this space.
  • Wireless LAN analyzers: No WLAN required

    Posted May 20, 2003 - 4:06 pm

    A WLAN analyzer can be an important tool for your IT team even if you don't have a WLAN network installed. You can use an analyzer to scope out potential interference that might affect a future network - or to see if your employees are connecting to rogue access points and compromising your wired network setup.
  • Managing software licenses in a U.C. world

    Posted May 20, 2003 - 3:01 pm

    As if the myriad of software licensing options weren't already confusing enough, the "on-demand" model of utility computing adds another layer of complexity. But when you're paying for what you use, it's critical to your bottom line to manage software licences very tightly.
  • New insurance products for the hosting industry

    Posted May 18, 2003 - 6:21 pm

    Beyond SLAs, firewalls, and virus protection, learn what steps your organization needs to take to mitigate risk in this age of hosting.
  • Legal risks of on-demand computing

    Posted May 16, 2003 - 4:01 pm

    On-demand computing differs from traditional outsourcing in at least one important respect: the very nature of on-demand means that there are unknowns.
  • Patch as patch can

    Posted May 16, 2003 - 2:56 pm

    With legislation that demands compliance to privacy guidelines and security attacks on the rise, IT management can't afford to play Russian roulette with patches. Take the appropriate steps to put a solid patch process in place.
  • CA's on-demand road map

    Posted May 14, 2003 - 7:41 pm

    CA's Unicenter product lies at the heart of the company's on-demand strategy, providing network and system management. And not too far in the future, look for security and storage management offerings as well.
  • Getting the right SMS ad message out

    Posted May 12, 2003 - 7:58 pm

    Legitimate marketers have a tough row to hoe in attempting to move to the wireless world without enraging consumers. This article looks at how it might be pulled off.
  • Irish firm launches 3G porn blocker

    Posted May 12, 2003 - 7:52 pm

    Pornographic emails are already the bane of the wired world - and with the advent of multimedia messaging for mobile phones, the problem may just get worse. To prevent a potential PR disaster, an Irish phone carrier is implementing its own filter to block pornographic images. Read on to find out how it works.
  • Irish mobile carriers unprepared to deal with spam

    Posted May 12, 2003 - 7:45 pm

    At a recent conference on mobile marketing, none of the major Irish wireless carriers had any solid proposals to combat wireless spam. Does this illustrate the position that legislation is needed since there's no incentive for self-policing?
  • EU proposal could jam the spam

    Posted May 12, 2003 - 7:39 pm

    Just as Europe has seen some of the earliest instances of wireless spam problems, so the European Union parliament is taking some of the first legal steps to stop it. Read on to find out more.
  • Wireless spam to hit North America

    Posted May 12, 2003 - 7:34 pm

    Wireless spam, long a scourge in Europe and Japan, is on its way to the US and Canada. North of the border, popular brewer Labatt's is already launching its wireless marketing campaign.
  • The future of wireless spam legislation

    Posted May 12, 2003 - 7:23 pm

    This review takes a look at the legislative future of wireless spam. It examines current law in Europe and Japan, and contemplates the future of U.S. legislation.
  • Korean wireless firms fight against mobile spam

    Posted May 12, 2003 - 7:17 pm

    In SMS-mad South Korea, wireless firms aren't waiting for government regulation to put an end to wireless spam: they're offering free blocking services to their customers. Read on to find out the details.
  • Spam on the run: US legislatures turn their attention to mobile spam

    Posted May 12, 2003 - 7:10 pm

    What started with an unwanted SMS message during "Riverdance" may help put a lid on wireless spam in the U.S. Read on to find out the latest regulatory efforts against wireless spam.
  • SNIA takes open management to the next level

    Posted May 11, 2003 - 3:55 pm

    The Storage Networking Industry Association (SNIA) announced the startup of a six-month CIM-SAN-2 Developers Demonstration Program, the aim of which is to speed progress of the SMI-Specification.
  • Software smart enough to make its own decisions

    Posted May 9, 2003 - 4:12 pm

    On its first foray into autonomic computing, Tira Wireless Inc. is using ThinkControl automated management software from Think Dynamics Inc. (recently acquired by IBM) to ease its network traffic problems.
Join us:






Join today!

See more content
Ask a Question