IP network News
May 12, 2015
In telecom news, Joytel plans to expand its service in Florida markets using dark fiber from Allied Fiber, while Huawei looks to thrive in the wake of Nokia's Alcatel-Lucent deal.
April 30, 2015
CSX is keeping tabs on its vital communications and signaling infrastructure by upgrading its network monitoring capabilities.
March 25, 2015
SN blogs: This week, analysts discuss how big data initiatives are affecting businesses; one expert warns about the dangers of unknown appliances in the data center.
February 24, 2015
Avaya says its SDN architecture leverages OpenDaylight, OpenStack and OpenFlow to deliver programmable network services faster than competing technologies.
IP network Get Started
Bring yourself up to speed with our introductory content
In this book chapter excerpt, author Amir Ranjbar gives advice on the new CCNP TSHOOT 300-135. Continue Reading
RFC 1918 specifies ranges of IP addresses for use in private networks. These private IP addresses cannot be routed on the Internet. Continue Reading
The ballooning amount of data generated by users and applications is fueling the development of hybrid WANs. Here's what you need to know. Continue Reading
Evaluate IP network Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
With Microsoft Power BI, the company is demonstrating a shift in focus to enable business users to better analyze data. Continue Reading
You’ve invested heavily in video conferencing. Was it worth it? New analytics tools try to answer that question by reporting on video conferencing usage. Continue Reading
A jump in multi-vector attacks highlights the threat of distributed reflection denial-of-service attacks. Enterprise threats expert Nick Lewis explains how these threats differ from traditional DoS attacks and offers prevention techniques. Continue Reading
Manage IP network
Learn to apply best practices and optimize your operations.
Vulnerability management in the cloud can be complicated. Expert Rob Shapland explains how to perform vulnerability scans in AWS under the shared responsibility model. Continue Reading
Virtualization documentation can swallow up huge chunks of time if you have to retrace your steps. Recording what you do as you do it could save lots of time down the road. Continue Reading
What happens when a bored IT admin meets a hotel Wi-Fi network that does not want to cooperate? Continue Reading
Problem Solve IP network Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Exchange 2013 supports roles across multiple server nodes, but it's still important to balance workloads to prevent strain. Continue Reading
Before you let mobile workers use their tablets and smartphones to access virtual desktops and applications, consider the kinds of sessions you host, whether the UE will be any good and how many IP addresses it will take. Continue Reading
While many Web proxies are legitimate, some attackers use them to hide their attacks. Expert Nick Lewis explains how block the malicious proxies. Continue Reading