IP network News
March 25, 2015
SN blogs: This week, analysts discuss how big data initiatives are affecting businesses; one expert warns about the dangers of unknown appliances in the data center.
February 24, 2015
Avaya says its SDN architecture leverages OpenDaylight, OpenStack and OpenFlow to deliver programmable network services faster than competing technologies.
January 09, 2015
News roundup: The FBI maintains North Korea was behind the Sony Pictures hack, in spite of naysayers. Plus: Malware campaign attributed to Russia; new Mac OS X bootkit; cyberattack causes physical damage.
December 18, 2014
Attackers used spear phishing emails to swipe credentials from several ICANN staff members and accessed the non-profit organization's systems.
IP network Get Started
Bring yourself up to speed with our introductory content
RFC 1918 specifies ranges of IP addresses for use in private networks. These private IP addresses cannot be routed on the Internet. Continue Reading
The ballooning amount of data generated by users and applications is fueling the development of hybrid WANs. Here's what you need to know. Continue Reading
What do agencies need to consider before going through the Department of Homeland Security's network security scanning? Expert Mike Chapple answers. Continue Reading
Evaluate IP network Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
With Microsoft Power BI, the company is demonstrating a shift in focus to enable business users to better analyze data. Continue Reading
You’ve invested heavily in video conferencing. Was it worth it? New analytics tools try to answer that question by reporting on video conferencing usage. Continue Reading
A jump in multi-vector attacks highlights the threat of distributed reflection denial-of-service attacks. Enterprise threats expert Nick Lewis explains how these threats differ from traditional DoS attacks and offers prevention techniques. Continue Reading
Manage IP network
Learn to apply best practices and optimize your operations.
Vulnerability management in the cloud can be complicated. Expert Rob Shapland explains how to perform vulnerability scans in AWS under the shared responsibility model. Continue Reading
Virtualization documentation can swallow up huge chunks of time if you have to retrace your steps. Recording what you do as you do it could save lots of time down the road. Continue Reading
What happens when a bored IT admin meets a hotel Wi-Fi network that does not want to cooperate? Continue Reading
Problem Solve IP network Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Exchange 2013 supports roles across multiple server nodes, but it's still important to balance workloads to prevent strain. Continue Reading
Before you let mobile workers use their tablets and smartphones to access virtual desktops and applications, consider the kinds of sessions you host, whether the UE will be any good and how many IP addresses it will take. Continue Reading
While many Web proxies are legitimate, some attackers use them to hide their attacks. Expert Nick Lewis explains how block the malicious proxies. Continue Reading