- Secure Cloud Networking
- Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
- Transforming Business Performance with Hybrid Network
- Investigative Analytics: An End to the Era of Uncertainty
- Stepping into the Cloud: A Practical Guide to Creating and Implementing a Successful Cloud
January 2014- Organizations have achieved significant benefit from virtualizing servers and storage environments, and now face the daunting task of deploying new network architectures to keep pace. Software-defined networking holds significant promise to deliver a new network architecture that is abstracted and virtualized; however, organization would be well served to learn from previous efforts to virtualize other domains in order to avoid making the same mistakes.
December 2013- Alepo's Policy & Charging Control Function (PCRF) performs real-time policy management across all services and technologies, including LTE, WiMAX, eHRPD, HSPA+, WLAN, and more, empowering mobile operators to truly differentiate their business plans in an increasingly dynamic marketplace.
May 2013- Driven by the rapid evolution of mobile devices, the move to cloud-based applications and data, and the continued development of new wireless technologies, Wi-Fi has become the network of choice for connectivity. Most new devices no longer have wired connectivity-for them Wi-Fi is the only option. IT managers now count Wi-Fi as an essential business facility.
October 2012- According to Forrester, operating expenses account for up to 70% of TCO for access switching networks. Learn how Cisco's network services toolkit, built into the Cisco® Catalyst® Series, simplifies lifecycle management tasks and helps lower TCO.
October 2012- From business strategy to technical design to step-by-step instructions for deploying and configuring network infrastructure, the Cisco? Smart Business Architecture guide is your detailed manual for successful LAN deployment.
October 2012- Lippis says, "No wonder why the Catalyst 6500 is so popular" Gain performance for growth and protect your investment with upgradability. Read Lippis' review of the innovative Cisco Catalyst 6500 Supervisor 2T.
October 2012- In a Magic Quadrant study, Gartner compares the strengths and weaknesses of wired and wireless LAN access infrastructure vendors. Learn why Cisco remains an industry leader and "continues to be on shortlists for all access layer opportunities."
The vision of having one global communications network that covers the earth and allows anyone to get access to any information anytime, anywhere, and on any device is closer today than ever.
However, fulfilling that vision has its issues.
Cloud computing has led to a large-scale integration of information resources across the globe. We are living in a world where everything — from smartphones to tablets to buildings, cars and appliances — is ...
Whether your businesses are connected to the Internet via T1/T3, or Cable, incorporating a mobile broadband backup solution adds uptime whenever there is a loss in connectivity via your wired line.
With CradlePoint routers as your Internet backup solution, you're ensured more uptime for your POS transactions and cloud-based services while gaining significant financial and operational benefits over wired backup solutions including:
• Better reliability
• Lower operating ...
Mobility is the #1 issue facing Enterprise IT today. With the rapid growth of smart devices, organizations are increasingly depending on wireless to transform their businesses.
Learn from Gartner?s Tim Zimmerman the best practices to implement a WLAN.
The Wireless LAN (WLAN) market is maturing, but still generates some significant innovations to compete with wireline and cellular networking. It also continues to produce differentiation, even though core features have become commoditized, and consolidation among vendors continues.
As wireless expectations and demands continue to rise, and as WLANs continue to meet those demands, wired networks will increasingly become the difficult-to-justify cost that WLANs were a few years ago. The question is not ...
March 2012- A BYOD solution should automate the device onboarding process for employees and guests, as well as the administration and enforcement of policies, by gathering information about the context of the device, user and connection. BYOD also requires real-time visibility and reporting to quickly measure, enforce, and meet compliance mandates.
March 2012- Long derided as an overhyped concept, network access control (NAC) has emerged as an important solution for mitigating the risks of consumerization. Network and security managers will use NAC to retain control of the network in a "bring your own device" (BYOD) environment.
Download this whitepaper to learn how state and local governments can leverage next-generation mobility to imrpove access for workers and citizens, while protecting privacy/data easing/unifying management and lowering total cost of ownership.
April 2010- While many forms of wireless-LAN assurance and verification tools have become available over the past decade or so of the history of the WLAN and Wi-Fi, one of the last to be addressed is the ability to examine activity at the physical layer(PHY) – in other words, to look at what’s happening in the air itself, what we call spectral assurance (SA). SA is particularly important not just because the frequencies used by WLANs ...
March 2010- Unified networking is now firmly established as one of the key directions for LAN deployments going forward. As is the case with the improvement in visibility and strategic direction resulting from the ratification of the 802.11n standard,there is little question today regarding the viability of the unified approach, nor with the system vendors’ ability to field product lines implementing the concept. Learn about the benefits of unified networks in this whitepaper from Farpoint Group. ...
Healthcare and life sciences organizations depend on knowledge workers – physicians, researchers, technicians, nurses, analysts, statisticians, salespeople and other professionals – who count on being able to work anytime, anywhere.
A recent report from Forrester® Consulting confirms that healthcare organizations are among the most mobile in the world, and among the most concerned with issues like regulatory compliance and data security.
Employees today are connecting their laptops to the Internet from everywhere: homes and offices, airports and train stations, hotels and retail stores, street corners and moving cars.
These mobile workers expect simple connectivity and fast performance. They expect to be able to use whatever access method is most convenient, but they don’t pay much attention to cost or security. So it is no surprise that wireless costs are spiraling upward, while security ...
January 2010- The electrical power generation, transmission, and distribution system has survived for decades with limited intelligence. But the emergence of independent power producers, green power sources, and new regulatory regimes is making it imperative to add smarts to the grid.
June 2009- IT managers face a difficult task in trying to offer robust services and applications while reducing IT costs and complexity. With unified communications, IT managers can offer streamlined communication solutions and advanced productivity applications throughout the network. Find out how.
March 2009- The crucial interoperability of wireless network devices built around the 802.11 standard is threatened by the advent of new and faster technologies. The IEEE is trying to cope by introducing the 802.11n standard--but it’s still in draft form. Meanwhile, how can manufacturers cope with the confusion and promise surrounding 802.11’s future? The situation is outlined, and a forward path, based on strategic testing, is proposed.
July 2008- The Radiant Networks StatAware Healthcare solution tracks equipment, medical staff, and patients to improve workflow, reduce costs, and increase satisfaction. The StatAware solution has combined the Cisco Unified Wireless Network and Mobility Services Engine with AeroScout’s WiFi-based RFID tags and MobileView application to cost effectively automate asset management.
April 2009- Today’s Web applications, IP video streams, VoIP systems, and mobile devices are placing more and more demand on wireless networks. This white paper explores 802.11n technology and applications, while offering business leaders a solid educational foundation for making wireless deployment and purchasing decisions.
November 2008- Michael F. Finneran, Principal, dBrn Associates, discusses802.11, WLANs, WiFi, WLAN switching options, security, WEP, and more in this recent presentation.
November 2008- A presentation by dBrn Associates on the challenges of indoor cellular coverage and potential solutions for improvement.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services