June 2009- Business is getting more distributed every day, making remote workforce locations more strategic. This e-book shows how Juniper's Distributed Enterprise Solutions Navigator enables you to chart the course to offer one consistent experience, prevent cybercrime, stop threats, and do more while managing less.
May 2009- Network security is a top priority for companies, and this includes securing Cisco routers. It is surprising to some that Cisco routers run many services that could create vulnerabilities. Some of these services are enabled by default. This white paper is not an exhaustive listing of all services enabled on Cisco routers that could create vulnerabilities, nor of all best practices for configuring Cisco routers. It is intended to be a vehicle for discussion regarding ...
April 2009- This white paper discusses the complexity of some of todayís great technologies. If the product is complex to operate, most consumers canít make it work. If they canít make the product work, they return it. If they return it, your company loses money.
April 2008- Intelligent bandwidth can help rein in networking challenges such as ever-increasing demand for services, security, and networked applications.
March 2008- Because VoIP systems are complex, the underlying network must be a stable foundation and comprehensive network visibility is required.
February 2009- Multiprotocol Label Switching (MPLS) began as a way for routers to short-cut the time-consuming process of treating each packet independently, looking up the target IP address each time and in every router along the path. MPLS streamlines the packet forwarding process by introducing a label, assigned by the ingress edge router, into the packet. The beauty of MPLS is that the label itself has no meaning other than what the software gives it. Therefore, the ...
October 2008- As networks continue to stimulate economic growth, collaboration, and interaction, the need for networking talent will grow in importance. To meet this growing demand, Cisco has introduced three new concentrations: CCNA Security, CCNS Voice, and CCNA Wireless. This paper will describes what the CCNA Wireless certification is and its benefits, and what pre-requisites, exams, and training is required to get certified.
March 2008- This white paper introduces the reader to basic router concepts, commands, and configurations. It is designed to address the "basic of the basics concepts" and helps lay a solid foundation for more complex routing concepts.
November 2007- Cisco recently announced major updates to their CCNA curricula, including the new version of the CCNA Composite Exam (640-802 CCNA). According to Cisco, this new curriculum includes "basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based skills. This new curriculum also includes (but is not limited to) the use of these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2),...
January 2008- Routing substrates for overlay networks are an important building block for large distributed applications. This research paper examines the problem of building a locality-aware routing substrate on top of a locality-based coordinate system, where the distance between coordinates approximates network latencies. This paper presents a practical locality-aware routing substrate that takes advantages of recent advances in algorithms for routing in a Euclidean plane. It addressed important challenges, such as routing table construction under imperfect knowledge, ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services