Networking and communication
-
Feature
07 May 2024
Polar Bear Pitching: Hot mobile apps come in from the cold
Flexing its current technological muscle, the city of Oulu in Finland shows that in addition to being a hub of 5G and 6G development, it is also a hot house for mobile apps, even from a hole in the ice Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
19 Feb 2024
Mobile’s next generation: The 6G-based hyper-connected future of living and work
We continue our look at the work in the field of 6G communications in the Finnish city of Oulu, most notably at its university, and see what products and services the new network will support Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
19 Apr 2007
Skype to the desk phone saves company a bundle
Skype on the desk phone has helped a Chicago-based furniture maker save a considerable amount of money on long-distance voice charges. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
18 Apr 2007
How do I calculate the time taken for a file to be transferred over a WAN link?
Calculate the time it will take for a file to transfer over a WAN link with the help of Dr. Hughes in this expert response. Continue Reading
By- SearchNetworking Staff
-
News
18 Apr 2007
Convergence certification provides evaluation standard
Voice and data convergence are more prevalent and enterprises are looking for certified professionals to administer the combined networks -- leading CompTIA to develop its Convergence+ certification, designed to validate qualified convergence professionals. Continue Reading
By- Kate Dostart
-
News
17 Apr 2007
Storage consolidation: Disks and disk subsystems overview
Any storage consolidation effort must involve a serious consideration of disk subsystems and the specific disk types that those systems will contain Continue Reading
-
News
16 Apr 2007
How is SIP winning favor over H.323?
What are the similarities, differences and major reasons between SIP and H.323. And why is one winning? Continue Reading
By- Christian Stegh
-
News
10 Apr 2007
Capacity planning software specifications
Gauging storage needs over time is one of the biggest challenges faced by IT administrators, and a new generation of capacity planning tools is emerging to help forecast growth and utilisation of storage resources. Continue Reading
-
News
09 Apr 2007
HP renews SMB storage campaign
With the launch of the new All-in-One 1200 and the shifting of executives to a new SMB business unit, HP is focused on its low-end products in an effort to boost growth. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
05 Apr 2007
Goldman Sachs: Interest in NetApp SAN products wanes
A survey by the investment firm shows enterprise storage buyers had a declining interest in NetApp SAN products over the last year. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
04 Apr 2007
Storage vendors propose FC over Ethernet standard
A group of nine storage vendors led by Emulex is proposing a Fibre Channel over Ethernet (FCoE) standard . Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
04 Apr 2007
Wireless VoIP market to grow rapidly
VoIP and Voice over Wi-Fi markets are expected to be strong in 2007 and remain so through 2012. Continue Reading
By- Kate Dostart, Associate Editor
-
News
01 Apr 2007
News Wrap 2.0
TechTarget ANZ's slightly skewed look at this weeks news. Continue Reading
By- Simon Sharwood
-
News
01 Apr 2007
Network security, content security markets to grow in 2007
The network security appliance and software markets are expected to continue growing steadily in 2007, while content security sales will begin to affect most enterprises' networking budgets. Continue Reading
By- Kate Dostart
-
News
29 Mar 2007
VoIP network monitoring improves VoIP deployment
VoIP network monitoring and pre-deployment analysis are becoming more important as VoIP application overlay becomes denser Continue Reading
By- Kate Dostart, Associate Editor
-
Tip
28 Mar 2007
How do I get my LAN computers to reach the Internet?
Get your LAN computers to reach the Internet in this response from wireless expert Lisa Phifer. Continue Reading
By- Lisa Phifer, Core Competence
-
Tip
28 Mar 2007
What are the criteria for evaluating an indoor wireless network?
In this Q&A., learn how to evaluate an indoor wireless network with criteria provided by expert Lisa Phifer. Continue Reading
By- Lisa Phifer, Core Competence
-
News
27 Mar 2007
VoIP's inherited data security problems
VoIP security problems present a challenge for voice and network staff. This article explains how to secure both your call servers and endpoints, and how best to divide this work between voice and data personnel. Continue Reading
By- Gary Audin, Delphi Inc.
- News 25 Mar 2007
-
News
25 Mar 2007
Why is VoIP authentication essential?
VoIP authentication advice. Continue Reading
By- SearchVoIP Staff
-
News
25 Mar 2007
VoIP protocols
VoIP protocols -- the strengths and weaknesses of each. Continue Reading
By- SearchVoIP Staff
-
Feature
22 Mar 2007
VoiceCon Spring: A transition show for the VoIP industry
VoiceCon Spring was all about unified communications. Zeus Kerravala provides highlights of the more interesting points from the show. Continue Reading
-
News
22 Mar 2007
Midrange storage array specifications
Product snapshots highlighting key specifications for a cross section of midrange storage array products. Continue Reading
-
News
22 Mar 2007
11n will boost speed, prompt upgrades
802.11n's speed will be a welcome boost for end-users, but will create headaches as admins face network upgrades to deal with the demand for bandwidth it unleashes. Continue Reading
By- Andrew R. Hickey
-
News
20 Mar 2007
NAC panel says technology may not add up
A panel discussing the potential of using network access control (NAC) says the technology may not be worth the price of deploying and maintaining it. Continue Reading
By- Robert Westervelt, TechTarget
-
Tip
19 Mar 2007
Network summarization -- Supernetting and wildcard masks
Supernetting allows one routing table entry to represent an aggregation of networks. Network engineers need to understand supernetting, how to read routes received from other providers and how to create an access list that references these multiple networks in a single summarized statement. In this tip, you'll learn more about the IP addressing-related topics of network summarization, supernetting and wildcard masks. Continue Reading
By -
News
19 Mar 2007
Power over Ethernet power consumption: The hidden costs
Power over Ethernet (PoE) has many advantages in a VoIP migration, but some companies overlook the amount of power needed to run PoE for VoIP and the costs and cooling requirements that come with it. Continue Reading
By- Andrew R. Hickey
-
Feature
18 Mar 2007
Mobile data services development trends in 2007
Darrell Jordan-Smith takes a look at new data services architectures and development tools emerging in 2007 and the ongoing development efforts of the Java Community and others. Continue Reading
By- Darrell Jordan-Smith
-
News
18 Mar 2007
Cisco stamps on Brocade in Q4, Dell'Oro says
For the second quarter in a row Cisco is gaining SAN switch market share on Brocade, according to the latest report by the Dell'Oro Group. But the numbers are causing a firestorm. Continue Reading
By- Jo Maitland, TechTarget
-
News
18 Mar 2007
VoIP security worries are plentiful, potent
VoIP creates a new set of security issues for your network, as expert Ed Skoudis explains. Continue Reading
By- Ed Skoudis, SANS Technology Institute
-
News
18 Mar 2007
New gigabit standard: How fast is fast enough?
Last June, the 10GBASE-T standard was published promising 10 Gbit operations on copper cabling. This standard was originally targeted toward data centers, but the Ethernet Alliance and IEEE are working on increasing this standard to potentially 40 or 100 more gigabits -- so what speed is fast enough? Continue Reading
By- TechTarget Staff
-
News
15 Mar 2007
Open source IP telephony on hold?
Is open source telephony ready for your business? Read on to learn if it's the real deal. Continue Reading
By- Amy Kucharik, TechTarget
-
News
15 Mar 2007
Carrier MPLS support for VoIP
Achieving QoS for reliable voice transmissions can be the biggest challenge of deploying VoIP. Multi-Protocol Label Switching (MPLS) might be the answer! Continue Reading
By- Robbie Harrell
-
News
11 Mar 2007
Wi-Fi interference
In this research report, undertook the challenge to quantify the problem of interference in wireless LANs and defined a methodology for evaluating the effects of interference on WLANs. Continue Reading
-
News
07 Mar 2007
Microsoft outlines software-centric VoIP, UC
Microsoft unveils its vision of a software-based VoIP system to enable unified communications. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
06 Mar 2007
Cisco, IBM announce new unified communications platform
Cisco and IBM today announced a new unified communications platform that will allow users to access collaboration applications and tie together the capabilities of both companies' solutions. Continue Reading
By- Andrew R. Hickey
-
News
05 Mar 2007
Nortel switch release focuses on unified communications
Nortel today released two new switch series aimed at unified communications deployments. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
Tip
05 Mar 2007
VoIP security - problems inherited from data networking
VoIP security problems present a challenge for voice and network staff because IP telephony brings with it not only the security problems of data networks but also new, added threats specific to VoIP. In this tip, learn about the data network security threats that your voice staff must confront, how to secure both your call servers and endpoints, and how best to divide this work between voice and data personnel. Continue Reading
By- Gary Audin, Delphi Inc.
-
News
04 Mar 2007
Unified Communications to dominate VoiceCon
Unified Communications will again be a major focus of VoiceCon Spring. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
04 Mar 2007
Buzz builds around data reduction for primary storage
Analysts predict that in-band compression offerings from StoreWiz, newly updated this week, are the first step toward a new wave of primary storage deduplication products. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
04 Mar 2007
Expert: NAC not a network security cure-all
According to an expert at Black Hat DC, NAC success demands careful planning and a good understanding of the company network; otherwise, implementations can quickly go awry. Continue Reading
By- Robert Westervelt, TechTarget
-
News
04 Mar 2007
NetApp stokes midrange fires with new array
The FAS 3040 is a scaled down version of the 64-bit 3070 architecture; NetApp officials say more moves downmarket will follow. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
01 Mar 2007
Black Hat RFID controversy has bloggers up in arms
This week in Security Blog Log: Infosec pros slam HID Corp., the firm that tried to quash a Black Hat presentation on flaws in its RFID technology, calling HID the latest champion of security through obscurity. Continue Reading
-
News
28 Feb 2007
RFID cloning presentation moves forward despite legal threats
Chris Paget, director of research and development at IOActive spoke mainly about the science behind RFID tags and readers and the inherent security issues of the technology. Continue Reading
-
Feature
28 Feb 2007
RFID dispute: Vendors still hostile toward full disclosure
Many vendors still believe that security by obscurity is still the best policy and make it a priority to silence vulnerability researchers. Continue Reading
-
News
28 Feb 2007
Can setting up a VPN help you get around blocked VoIP ports?
Can setting up a VPN help you get around blocked VoIP ports? Continue Reading
By- SearchVoIP Staff
-
News
27 Feb 2007
Black Hat presenter nixes RFID cloning demo under pressure
A demonstration of a device that could easily clone radio frequency identification (RFID) badges, was pulled from a conference presentation under pressure from a chip maker. Continue Reading
By- Robert Westervelt, TechTarget
-
Feature
26 Feb 2007
Outsourced VoIP helps devastated company recover
Outsourced VoIP helped a Berkeley company keep up business as usual after a fire destroyed its offices. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
25 Feb 2007
HP announces iSCSI VTL for SMBs
HP's new iSCSI VTL devices include automated backup capabilities for users with fewer than four servers. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
25 Feb 2007
Top 10 VoIP search terms
The top ten VoIP search terms and definitions. Keep tabs on the most popular VoIP terms – updated regularly. Continue Reading
By- Leigha Cardwell, TechTarget
-
News
25 Feb 2007
IP PBX: Ten reasons to switch
Should you throw out the old PBX and replace it with a new IP PBX? This tip from WindowsNetworking.com provides ten compelling reasons to do so. Continue Reading
By- Nick Galea
-
News
25 Feb 2007
Gartner: Quad-core slowed 2006 server sales
New Gartner data suggests that quad-core servers are not exciting users. Continue Reading
By- Bridget Botelho, Editorial Director, News
-
News
20 Feb 2007
Cisco routers threatened by drive-by pharming
Millions of Cisco routers in circulation could be compromised by a newly-discovered attack technique Symantec calls drive-by pharming, the networking giant warned in an advisory. Continue Reading
By -
News
20 Feb 2007
All about automation
Automating your IT operations is a trick that creates obvious benefits. In this article, we explain how data center automation can help an entire enterprise. Continue Reading
By- Audrey Rasmussen
-
News
19 Feb 2007
What is presence?
Presence technology makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network. Continue Reading
By- TechTarget ANZ staff
-
News
15 Feb 2007
News Wrap 2.0
We've just discovered a great new application for technology that can save you an incredible amount of time, money and heartache. Continue Reading
By- Simon Sharwood
-
News
14 Feb 2007
VoIP complexities stall implementation for SMBs
VoIP sales in the SMB market are predicted to lead revenue in the next several years, but most SMBs are confused by the number of different solutions. Continue Reading
By- Kate Dostart, Associate Editor
-
News
14 Feb 2007
Cisco VoIP managment guide: Required management tasks
Comprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call success rates, telephony delays and impairments, as well as call quality. VoIP telephony management is categorized here. Continue Reading
By- SearchNetworking Staff
-
Feature
12 Feb 2007
Download SAN Guide Chapter 3: Switches (PDF)
You asked for it, so here it is -- a printable version of our SAN All-In-One Guide. Download Chapter 3: Switches in .pdf format now. Continue Reading
-
News
12 Feb 2007
Skype makes more enterprise inroads
Skype has teamed with FaceTime Communications to give companies more control over Skype use within the enterprise. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
11 Feb 2007
VoIP helps ensure disaster recovery
VoIP bolsters your disaster recovery plans and should be at the core of any well-planned disaster recovery strategy. Continue Reading
By- Zeus Kerravala, ZK Research
-
News
11 Feb 2007
VoIP helps ensure disaster recovery
VoIP bolsters your disaster recovery plans and should be at the core of any well-planned disaster recovery strategy. Continue Reading
By- Zeus Kerravala, ZK Research
-
News
10 Feb 2007
Cisco VoIP managment guide: Required management tasks
Comprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call success rates, telephony delays and impairments, as well as call quality. VoIP telephony management is categorized here. Continue Reading
-
News
10 Feb 2007
Cisco VoIP management guide: VoIP management lifecycle
VoIP lifecycle management enables enterprises to safely pursue large production deployments. The management lifecycle includes the following four elements. Continue Reading
-
News
10 Feb 2007
Cisco VoIP management guide: Cisco requires proactive management
Managing Cisco VoIP solutions means network managers must rely on credible, experienced vendors to some extent. Fortunately, many vendors have emerged as trusted, viable partners that can offer an end-to-end management solution for Cisco VoIP environments. With the selection of vendors provided network managers should feel confident in successfully deploying and experiencing the value and benefits of IP telephony. Continue Reading
-
News
10 Feb 2007
Cisco VoIP management guide: Enterprise VoIP management solutions
Enterprise VoIP management solutions require two considerations: the scale of production environment and the need to extend support resources with a systems integrator or service provider. Continue Reading
-
News
10 Feb 2007
Cisco management guide: Selecting a VoIP solution
Selecting a VoIP solution means deciding on independent VoIP tools or a VoIP solution suite of integrated products. Continue Reading
-
News
10 Feb 2007
Cisco VoIP management guide: Recommendations and summary
Enterprises now have solid choices of management solutions for their Cisco VoIP deployment. The short list for any enterprise should include Prognosis, Infovista, or Cisco. Continue Reading
-
News
10 Feb 2007
Cisco management guide: Selecting a VoIP solution
Selecting a VoIP solution means deciding on independent VoIP tools or a VoIP solution suite of integrated products. Continue Reading
By- SearchVoIP Staff
-
News
10 Feb 2007
Cisco VoIP management guide: Recommendations and summary
Enterprises now have solid choices of management solutions for their Cisco VoIP deployment. The short list for any enterprise should include Prognosis, Infovista, or Cisco. Continue Reading
By- SearchVoIP Staff
-
News
07 Feb 2007
VoIP capabilities save hotel money, keep guests connected
"Rip and replace" were three words the Seaport Hotel in Boston didn't want to hear when considering VoIP capabilities. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
07 Feb 2007
EMC plans array-based encryption via PowerPath
EMC's next security move will be array-based encryption through PowerPath by 2008, according to internal documents obtained by SearchStorage. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
07 Feb 2007
Download SAN Guide Chapter 1: Management (PDF)
You asked for it, so here it is -- a printable version of our SAN All-In-One Guide. Download Chapter 1: Management in .pdf format now. Continue Reading
-
News
07 Feb 2007
VoIP security, unified communications need questioned
VoIP security issues and questions about the business need for unified communications have stalled adoption of both technologies. Continue Reading
By- Kate Dostart
-
News
05 Feb 2007
VoIP security, unified communications need questioned
VoIP security issues and questions about the business need for unified communications have stalled adoption of both technologies, according to CompTIA's recent survey. Continue Reading
By- Kate Dostart, Associate Editor
-
News
05 Feb 2007
Gates to outline Microsoft's new strategy for secure computing
Bill Gates is back at RSA. At this year's conference, Gates plans to speak about the evolution of authentication, network policies and data protection, signaling a change in his vision of a "Digital Decade." Continue Reading
-
News
05 Feb 2007
What is the advantage of having unified storage?
There is debate about that. Many customers may prefer to have just one storage system, avoiding specialized storage systems, like NAS for file-based access or a complicated block-based storage system... Continue Reading
-
News
05 Feb 2007
Will all storage systems be unified storage in the future?
I don't think that "all" storage systems will be unified... Continue Reading
-
News
04 Feb 2007
HP fills in gaps with product updates
HP announced updates to several of its products, but analysts are wondering what its ultimate strategy will be for storage virtualisation. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
04 Feb 2007
Open source - What voice managers need to know
Open source technology can make sense for VoIP deployments, and can be used in a hybrid approach with existing proprietary hardware or software. Learn more in this tip. Continue Reading
By- Tom Lancaster
-
News
31 Jan 2007
What is an E&M line? What is the difference between a 2 wire and 4 wire E&M?
What is an E&M line? What is the difference between a 2 wire and 4 wire E&M? Continue Reading
By- SearchVoIP Staff
-
News
29 Jan 2007
Managed VoIP -- 10 tips for a smooth migration
Migrating to managed VoIP doesn't have to be a headache. Here, Verizon Business offers 10 top tips to ensure you get what you need. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
29 Jan 2007
VoIP call features give users more bang for their buck
2006 saw an increase in the popularity of VoIP and encouraged many competing service providers to offer features such as voicemail and Caller ID as standard in their best-selling service plans. Continue Reading
By- Kate Dostart, Associate Editor
-
News
29 Jan 2007
Hybrid drives hit NAS boxes
DNF will be making hybrid drives available in all of its storage products, but it doesn't recommend them for IP SANs. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
29 Jan 2007
Managed VoIP -- 10 tips for a smooth migration
Migrating to managed VoIP doesn't have to be a headache. Here, Verizon Business offers 10 top tips to ensure you get what you need. Continue Reading
By- Andrew R. Hickey
-
News
28 Jan 2007
Brocade unveils McData integration roadmap
McData's directors and FICON routers will remain separate product lines for now; McData's SAN management software will replace Brocade's Fabric Manager. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
28 Jan 2007
VoIP case studies: What you need to know
Case studies are the next best thing to being there. Learn how others overcame the expected and the unexpected challenges of a VoIP migration in our case studies series. Continue Reading
By- SearchVoIP.com editors
-
News
27 Jan 2007
Network visualization, automation: At odds?
Visualization is a powerful tool. But in the context of network management, the prevalence of graphs may indicate that your network management system (NMS) is not ready to meet the requirements of autonomic network performance. Why so? Loki Jorgenson explains in this tip. Continue Reading
-
News
25 Jan 2007
Network-based attacks
The second tip in our series, "How to assess and mitigate information security threats." Continue Reading
-
Feature
24 Jan 2007
VoIP security monitoring gets proactive
VoIP security and traffic monitoring have become imperatives, but it can still be tricky on a converged VoIP and data network. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
24 Jan 2007
iSCSI SANs grow in midmarket, enterprise
Because transporting "SCSI over IP" leverages ubiquitous Ethernet networks, that translates to lower cost, easier maintenance and simpler management, which makes SAN deployment more attractive for SMEs. Continue Reading
-
News
24 Jan 2007
RSVP ready to manage VoIP, video traffic
Though its 10 year past was riddled with failures, RSVP is fast returning as one of the best tools for managing QoS for VoIP and video. Continue Reading
By- Subha Dhesikan
-
News
23 Jan 2007
Cisco fixes IOS flaws
Attackers could exploit three Cisco IOS flaws to cause a denial of service or launch malicious code. The networking giant has released fixes. Continue Reading
By -
News
18 Jan 2007
Can Caller ID on VoIP calls be customized?
Can I create the CID, name, area code and phone number that will display when I place a call via VoIP? Who do you like for VoIP service? Continue Reading
By- SearchVoIP Staff
-
News
18 Jan 2007
What considerations do I need to make when setting up a VoIP system to our remote office?
What considerations do I need to make when setting up a VoIP system to our remote office? Continue Reading
By- SearchVoIP Staff
-
News
18 Jan 2007
WAN/WAFS platform specifications
Product snapshots highlighting key specifications for a cross section of WAFS and WAN optimisation products intended for small, medium, and large organisations. Continue Reading
-
News
17 Jan 2007
Reasons why enterprise networking and security roles must stay separate
Enterprise network managers are responsible for configuring and managing network devices, but should they be accountable for tasks that are typically handled by the information security team? Contributor Shon Harris examines why networking and information security tasks should not be shared. Continue Reading
By- Shon Harris , Logical Security
-
News
17 Jan 2007
VoIP security testing fundamentals
VoIP security testing fundamentals are discussed in this guide -- how to test a VoIP system, what tools to use, how to use fuzzing to test VoIP security. Continue Reading
By- SearchVoIP ANZ Staff
-
Feature
16 Jan 2007
EqualLogic CEO says IPO on the way
EqualLogic's CEO talks about the company's plans to go public, its intent to add 10 GigE to its products and why he thinks not all iSCSI products are created equal. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
16 Jan 2007
Routing: Five common, easily avoided errors
Router configuration errors don''t have to take down your network. Learn five common routing mistakes -- and how to avoid them -- in this tip. Continue Reading
By- Tom Lancaster
-
News
15 Jan 2007
Core Security offers powerful testing tool
We highly recommend Core Impact 6.0 to security engineers to verify the vulnerability of their networks. Continue Reading
By- Mike Poor, Contributing Writer
-
Feature
10 Jan 2007
WiMax clearing path to mainstream
A number of industry moves have made WiMax almost ready for the mainstream. But there's good news and bad news to consider before making the move. Continue Reading