Many network managers and sysadmins will toil away during the holiday season dealing with remote access issues and other problems, an Ipswitch survey finds.By Marcia Savage Managing Editor, Network Computing, 12/24/20143 comments | Read | Post a Comment
Facebook's open data center designs offer efficiency and flexibility, but should your enterprise follow the Open Compute Project model? Here are some pros and cons.By Jim O'Reilly Consultant, 12/24/20141 Comment | Read | Post a Comment
Software costs add up quickly in today's virtualized datacenters. Does it make more sense to buy a few big servers or a bunch of little ones? I compare the costs.By Howard Marks Network Computing Blogger, 12/23/20140 comments | Read | Post a Comment
Data breaches will continue until we create a deeper appreciation for business data and guard it as closely as our own wallets. Here are some steps in the right direction.By Thomas LaRock Head Geek, SolarWinds, 12/23/20144 comments | Read | Post a Comment
When you've had your fill of technology predictions for 2015, take one more moment to deride the most obvious and least noteworthy of the bunch.By Susan Fogarty Editor in Chief, 12/22/201430 comments | Read | Post a Comment
Infonetics report shows that shipments of 802.11ac access points are picking up. The new WiFi standard offers many enterprise benefits, but watch out for integration issues.By Pablo Valerio International Business & IT Consultant, 12/22/20149 comments | Read | Post a Comment
Migrating workloads to the cloud requires time and effort spent on up-front planning. The first part of this series explains the technical assessments and evaluations required for a successful cloud migration.By Ryan Pelerin Founding partner and COO, WSM International, 12/19/201413 comments | Read | Post a Comment
In today's data centers, firewalls and other stateful security controls can be less effective than stateless controls or a hybrid approach combining both.By Mason Harris Technical Solutions Architect, Cisco, 12/18/20144 comments | Read | Post a Comment
Piles of unstructured data are worse than useless; they pose serious security and privacy risks. John Joseph offers three steps to bring your data storage strategy into the light.By John Joseph President & Co-Founder, DataGravity, 12/17/20149 comments | Read | Post a Comment
Point-to-point wireless bridging can be complicated for a WLAN designer. Aerohive is the latest WLAN vendor to help streamline the process by including the capability in an access point.By Lee Badman , 12/17/201411 comments | Read | Post a Comment
Erasure coding is used in scale-out object storage systems from a variety of vendors and open-source software projects. Just don't expect it to solve all your data protection problems.By Howard Marks Network Computing Blogger, 12/16/20140 comments | Read | Post a Comment
In-car networks could become the next favorite target for hackers. Ethernet offers many options to protect the connected car from malicious attacks.By Ben Gale Technical Director, Infrastructure and Networking, Broadcom, 12/16/201417 comments | Read | Post a Comment
By 2020, 5G will permeate network infrastructures, enabling new robotic services and intelligence, as well as a densely connected digital society and economy. By Antonio Manzalini Senior Manager, Innovation, Telecom Italia, 12/15/201416 comments | Read | Post a Comment
We compared the most popular stackable switches on the market today in a feature-by-feature report. See how models from Cisco, HP, Dell, and Extreme stack up.By Network Computing Editors , 12/15/20142 comments | Read | Post a Comment
InformationWeek 2014 Mobile Security SurveySecuring company data on mobile devices is the top concern when it comes to mobile security. Respondents worry most about data loss due to lost or stolen devices, and less than half of respondents feel confident that data is protected.
Join us for a roundup of the top stories on InformationWeek.com for the week of December 14, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program.