Network hardware
Network hardware products such as routers, switches, hubs, appliances and gateways form the vital infrastructure for successful enterprise IT. We look at the latest trends in technologies in building LANs, WANS and Ethernet networking.
-
E-Zine
13 Oct 2023
CW EMEA: Prepare for AI explosion
In this month’s CW EMEA, we look at generative artificial intelligence, which Accenture claims is the next big thing in enterprise IT. The IT services giant says GenAI will transform 40% of all working hours – and it is putting its money where its mouth is with plans to invest $3bn in AI and create 40,000 AI-focused roles. Part of the huge investment has already been assigned to the creation of an AI and generative AI lab in Brussels focused on the public sector in Europe. We also look at a Deutsche Telekom-led consortium’s demo of multi-supplier non-real-time RAN optimisation, how last month’s Ryder Cup tested out technology to improve how fans digitally consume the event, and find out how Zurich Insurance has cut the time it takes to complete development of ServiceNow applications. Read the issue now. Continue Reading
-
News
01 Jun 2023
DE-CIX switches on Internet Exchange in Finland
Comms tech provider celebrates 10 years of partnership with Internet Exchange operator and home to leading carrier and datacentre neutral interconnection ecosystem Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
17 Oct 2006
Nokia E62 thin mobile productivity device
In this product review, John Shepler weighs in on Nokia's new E62 mobile device for Cingular Wireless. Continue Reading
-
News
04 Oct 2006
Tiered storage becoming tried and true
Tiered storage matches the value of data with the performance (and expense) of storage. Ideally, tiered storage can save money, while easing the access demands to any single storage tier. While tiered storage has clearly brought storage costs and performance into focus, it has yet to reach its full potential in the enterprise. Continue Reading
-
News
26 Sep 2006
Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services'
Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services' Continue Reading
-
News
14 Sep 2006
Three ways to create clustered storage, page 2
Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment. Continue Reading
-
News
12 Sep 2006
Dell and EMC: Five more years
Dell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ. Continue Reading
By- Alex Barrett, News Director, Datacenter Media Group
- News 06 Sep 2006
-
News
06 Sep 2006
VoIP startup untethers would-be mobile workers from wireline office phones
VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators. Continue Reading
By- Amanda Mitchell, News Editor
-
News
05 Sep 2006
ControlGuard targets rogue devices
ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used. Continue Reading
By- Harris Weisman, Contributing Writer
-
News
05 Sep 2006
VoIP outsourcing: Save money and gain flexibility
VoIP outsourcing is the way to go for organisations looking to deploy voice services quickly and flexibly without a major investment in skills and upkeep. Continue Reading
By- Amanda Mitchell, News Editor
-
News
04 Sep 2006
Revamped Cisco WAFS worth the wait, users say
Months late, Cisco has finally released a combined Wan optimisation and WAFS product, while startups like Riverbed have been snapping up the customers. But some Cisco beta testers say it has been worth the wait. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
04 Sep 2006
Protecting wireless networks: Step 3
Security testing expert Kevin Beaver covers the tools and techniques needed to find and exploit insecure wireless networks. Continue Reading
-
Feature
04 Sep 2006
Protecting wireless networks: Step 2
Security testing expert Kevin Beaver covers the tools and techniques you'll need to find and exploit insecure wireless networks. Continue Reading
-
Feature
04 Sep 2006
Wireless network security testing
Attack your own wireless networks to find vulnerabilities before malicious hackers do. Continue Reading
-
News
30 Aug 2006
VoIP outsourcing: Save money while gaining flexibility
VoIP outsourcing is the way to go for firms looking to deploy voice services quickly and flexibly without a major investment in skills and upkeep. Continue Reading
By- Amanda Mitchell, News Editor
-
News
29 Aug 2006
AT&T breach affects 19,000 customers
Online outlaws hacked into an AT&T computer system and stole credit card data on thousands of customers. AT&T has offered to pay for credit monitoring services for those affected. Continue Reading
By -
News
28 Aug 2006
Riverbed update offers users more bandwidth, better reporting
Riverbed announced a package of hardware and software updates, which some customers say they've been waiting for. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
27 Aug 2006
3PAR adds midrange array for secondary sites
3PAR has introduced a smaller version of its InServ Storage Server, which it describes as a product-line extension into its existing customer base. Continue Reading
By- Jo Maitland, TechTarget
-
News
21 Aug 2006
Briefs: VoiceCon in the news
This week at VoiceCon we saw everything from managed VoIP services to IP phones made to make mobile workers right at home, wherever they are. Continue Reading
By- Amanda Mitchell, News Editor
-
News
15 Aug 2006
Cisco says it can't reproduce PIX flaw
Ever since a researcher at Black Hat outlined a flaw in the PIX firewall, Cisco has been trying to reproduce the security hole. So far, the company has been unsuccessful. Continue Reading
By -
News
15 Aug 2006
Cisco boosts VoIP certification
The upgraded CCNP midlevel Cisco certification now incorporates VoIP, security and wireless to boost converged network skills among enterprise professionals. Continue Reading
By- Amanda Mitchell, News Editor
-
News
03 Aug 2006
Vendors reject preferential knowledge sharing
While Cisco continues to investigate a potential PIX firewall flaw, it and other vendors say sharing security information quickly and indiscriminately is always the best policy. Continue Reading
By- Michael Mimoso, TechTarget
-
News
02 Aug 2006
Possible Cisco zero-day exploit revealed at Black Hat
Details of an alleged flaw related to SIP and PIX appliances, briefly mentioned in a Wednesday Black Hat presentation, are being kept under wraps as Cisco and US-CERT investigate. Continue Reading
By- Michael Mimoso, TechTarget
-
News
26 Jul 2006
Blue Cross bears burden of 'no wireless' policy
Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something. Continue Reading
By- Andrew R. Hickey, News Writer
-
Feature
10 Jul 2006
Case study: A valuable solution
A new telephony and call centre solution from Inter-Tel has transformed the way that e.surv Chartered Surveyors is able to work. Continue Reading
-
Feature
17 Feb 2006
Be careful you don't get more than you pay for with VoIP
Implementing VoIP is attractive for all companies in particular SMBs. However, there are issues to address that may cost you more than what you save Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
09 Jan 2006
Voicing concerns on Skype
Skype has blazed a trail in the Voice over IP arena; its popularity hasn’t gone unnoticed by the hacker community however Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
28 Nov 2005
Step 6: Configuring wireless clients
With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide. Continue Reading
-
News
21 Nov 2005
Wireless security: Public Wi-Fi could open security holes
A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own. Continue Reading
By -
News
20 Nov 2005
Wireless security crucial to railway safety
A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe. Continue Reading
By -
News
16 Nov 2005
Wireless security: Companies deal with software updates
A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network. Continue Reading
By -
News
12 Oct 2005
Quiz: What's your infosec IQ?
We've collected our toughest questions to see how well you stand up to a challenge. Put your knowledge to the test and let us know how you do. Continue Reading
-
News
26 Sep 2005
NHS trust creates wireless record
University College London Hospitals (UCLH) NHS Trust has created the UK's largest single wireless network to support 7,000 users across eight hospitals. Continue Reading
-
News
20 Sep 2005
SAS drives product roundup
Serial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
11 Sep 2005
VoIP turns up the heat on firewalls
New research shows that many organizations are increasingly concerned about VoIP security and plan to augment their firewalls within the next year, changing the landscape of the firewall market. Continue Reading
By- Eric Parizo, Senior Analyst
-
News
05 Sep 2005
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels. Continue Reading
-
News
29 Aug 2005
Storage area network quiz
It's all about the storage area network (SAN) -- man. The more you know, the easier it is. Take our SAN quiz and find out where you stand as a SAN guru. Continue Reading
- News 26 Jul 2005
-
News
12 Jul 2005
Tony Asaro: Blogs and more
Read what Tony Asaro is talking about in this month's blog, and listen to him speak in a number of webcasts. Continue Reading
-
News
13 Jun 2005
Gartner underscores five overblown threats
Two Gartner analysts debunk five overhyped security risks they claim are causing companies to miss out on some key emerging technologies. Continue Reading
By- Amy Storer, News Writer
-
News
11 May 2005
A new era of computer worms: Wireless mobile worms
In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm. Continue Reading
-
Feature
15 Apr 2005
The acceptable rules of the mobile game
Mobile networks allow you to connect to your network from almost anywhere by the appropriate methodology. Yet that may also mean... Continue Reading
-
Feature
16 Mar 2005
Managed services: Looking to the long term
IT directors looking for an easy way to manage increasing volumes of data by buying more hardware could be storing up problems... Continue Reading
- News 08 Mar 2005
-
Feature
21 Oct 2004
IP everything, essentially
What are the fundamental deliverables of IP networks? How can you use IP networks to gain financial benefits in addition to... Continue Reading
-
Feature
21 Oct 2004
The basis of profitability
Not so long ago, you didn't have much choice - your IT and communications requirements were acquired, implemented and maintained... Continue Reading
-
Feature
14 Sep 2004
Management matters
Cath Everett finds out how you stay on top of networking. What are the management issues related to your telecoms and networks... Continue Reading
-
News
27 Aug 2004
Over-specify when buying low cost replacement for Frame Relay
A project manager reveals how a VPN saved £275,000 a year Continue Reading
By- Peter Skipwith
-
News
07 Jul 2004
Deals abound for high-end storage
Think high-end storage is out of your reach? Maybe not. Conversations with several storage buyers recently suggest that vendors are scrambling to give buyers the best possible deals. Continue Reading
By- Alex Barrett, Trends Editor
-
News
23 May 2004
Hacking for Dummies: Chapter 10 -- Wireless LANs
Read Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver. Continue Reading
-
News
27 Apr 2004
Backup school: Quiz two, answer six
Here is the answer to Backup school quiz two, question six. Continue Reading
By- Editors
- News 15 Jan 2004
-
Feature
16 Nov 2003
Learning Guide: SAN-based backups
Some of the best advice on the ins and outs of SAN-based backups Continue Reading
-
News
20 Sep 2001
Rambus speeds to take on P4
The company showed its next-generation signalling technology, code-named Yellowstone, at the Rambus Developer Forum in California... Continue Reading
-
Feature
06 Dec 2000
The VPN dilemma
With traditional networks choking on data, Liz Biddlecombe investigates the pros and cons of managing a VPN yourself or... Continue Reading
- Feature 12 Jul 2000