Networking and communication
-
News
04 Nov 2024
How AI is impacting global connectivity
Jürgen Hatheier, international CTO of Ciena, discusses the role of connectivity in the age of artificial intelligence and how the company is helping service providers navigate this transformative period Continue Reading
By- Aaron Tan, TechTarget
-
News
25 Oct 2024
How Infoblox is tackling multicloud complexity and boosting security
Infoblox CEO Scott Harrell discusses the company’s new Universal DDI service designed to address the growing challenges of managing network security in hybrid IT environments Continue Reading
By- Aaron Tan, TechTarget
-
News
23 Jul 2007
LeftHand refreshes iSCSI SAN software
Version 7.0 of LeftHand's iSCSI SAN software contains dozens of new features, including support for four-way replication and brushed-up thin provisioning. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
23 Jul 2007
NAC growth sluggish as companies consider network security options
Companies are taking a wait-and-see approach, hoping the technology's maturity will make it more cost effective. Continue Reading
-
Tip
23 Jul 2007
Open source PBX: Risk or value?
Open source IP PBX systems like Asterisk have benefits and risks. Learn what they are and assess your readiness for the IP PBX implementation in this tip from Gary Audin. Continue Reading
By- Gary Audin, Delphi Inc.
-
News
22 Jul 2007
Black Hat Las Vegas 2007: Special news coverage
SearchSecurity.com covers all the controversy at this year's show with news, features, podcasts, interviews, exploits and more direct from Las Vegas. Continue Reading
-
News
19 Jul 2007
VoIP performance testing fundamentals
This guide discusses why it is important to run regular VoIP network performance testing and some of the ways it can be done. Continue Reading
By- SearchVoIP ANZ Staff
-
News
19 Jul 2007
Wireless interference can be frustrating (and fun?)
Since Wi-Fi operates in unlicensed bands, the enterprise wireless spectrum can be shared by other, seemingly innocuous devices like Bluetooth and wireless game controllers. But interference from such devices, or from having too many devices on one wireless network, can have a strong impact. Continue Reading
By- Andrew R. Hickey
-
News
18 Jul 2007
For Boeing, data security, network access still hazy
Boeing is trying to reshape its network security architecture to better protect sensitive systems from threats without degrading employee productivity. Continue Reading
By- Robert Westervelt, TechTarget
-
Tip
18 Jul 2007
Hardening your router: Increasing security with ACLs
Learn how to harden your router to increase network security using ACLs in this step-by-step, automated, ten-minute demo. Continue Reading
By -
News
17 Jul 2007
Unified communications infrastructure threats and defense strategies
Unified communications systems promise exciting productivity gains for workers and cost savings for businesses, but many often underestimate the security threats facing them. John Burke outlines the threats facing unified communications and how to defend against them. Continue Reading
By- John Burke, Nemertes Research
-
News
17 Jul 2007
Branch offices get security, services boost
Juniper Networks released a handful of new branch office offerings, including two new services routers, two secure services platforms and two network management appliances. Continue Reading
By- Andrew R. Hickey
-
News
10 Jul 2007
Updating a QoS strategy for VoIP traffic
Learn how to update your QoS strategy for VoIP traffic in this tip from Tom Lancaster. Continue Reading
By- Tom Lancaster
-
News
09 Jul 2007
Unified messaging system updates company's voicemail
Installing a new unified messaging system helped one company in its daily struggles with an outdated voicemail system. Continue Reading
By- Kate Dostart, Associate Editor
-
News
04 Jul 2007
Cisco users upbeat about security direction
Cisco customers say the vendor's security strategy is headed in the right direction, which is why they believe the networking giant's IronPort integration will be smooth sailing. Continue Reading
By -
Feature
03 Jul 2007
Data migration product specifications
Part of the Tiered Storage Buying guide focusing on product specifications for data migration tools. Continue Reading
-
News
01 Jul 2007
VoIP measurement boosts customer service efficiency
iSelect Technology Manager Jason Egbers says the company's new VoIP measurement tools have helped it improve contact center operations. Continue Reading
By- Adam Turner
-
News
28 Jun 2007
SIP fundamentals
Session Initiation Protocol (SIP) will allow true interoperability, eventually enabling every IP-based device and application to communicate seamlessly with one another. This guide discusses some of the basics of SIP, including vulnerabilities, testing and hardware. Continue Reading
-
News
27 Jun 2007
Instant messaging usage increase highlights need for policies
Instant messaging is a valuable business tool for some enterprises. For others, it's a security risk. Either way, a recent Burton Group report suggests that all companies should have an IM usage policy, even if they haven't deployed IM yet. Continue Reading
By- Kate Dostart
-
Tip
25 Jun 2007
VoIP/IP Telephony vendor security solutions
Are vendors' VoIP security features all you need, or is it prudent to buy additional security tools to lock down your network? Continue Reading
By- Gary Audin, Delphi Inc.
-
News
25 Jun 2007
Instant messaging usage increase highlights need for policies
A Burton Group report suggests that all companies should have an IM usage policy, even if they haven't deployed IM yet Continue Reading
By- Kate Dostart, Associate Editor
-
News
25 Jun 2007
Meet Mr. Asterisk
Adam Turner meets the creator of the Asterisk open source IP PBX and explores the future of the software, which is making major enterprise inroads. Continue Reading
By- Adam Turner
-
News
24 Jun 2007
Gigabit Ethernet and 10 Gigabit Ethernet: Technology overview
This overview of Gigabit Ethernet and 10G lays the foundation for understanding Gigabit Ethernet technology and the advantages it brings to your network. Continue Reading
By- SearchNetworking ANZ Staf
-
News
24 Jun 2007
VoIP performance testing fundamentals
VoIP network performance testing can mean the difference between a VoIP system working at a high level QoS and a weak system that runs so poorly customers could take their business elsewhere. This guide discusses why it is important to run regular performance testing and some of the ways it can be done. Continue Reading
By- SearchVoIP ANZ Staff
-
News
21 Jun 2007
HP users mull blade storage
HP's "blade everything" strategy is starting to emerge in storage. Users at the HP Technology Forum this week mulled the possibilities for the technology. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
19 Jun 2007
Securing the enterprise VoIP perimeter
How to make VoIP work without sacrificing firewalls or network perimeter security. Continue Reading
By- Gary Audin, Delphi Inc.
-
News
17 Jun 2007
Burton Group Catalyst Conference San Francisco 2007
SearchSecurity.com brings you the latest news, interviews, podcasts and more from the Burton Group Catalyst Conference 2007 in San Francisco. Continue Reading
-
News
17 Jun 2007
VoIP security testing fundamentals
Testing your VoIP security system against all the threats that exist on the network can be a full time job. This guide documents how a VoIP system can be tested and suggest some of the available tools to use -- with a focus on fuzzing tools and methods. Continue Reading
-
Tip
17 Jun 2007
What's in a VoIP packet -- An introduction to bandwidth for VoIP
Learn what makes up a VoIP packet, how headers work, what protocols transport voice traffic over the Internet and how this traffic uses network bandwidth. Continue Reading
By- Gary Audin, Delphi Inc.
-
News
14 Jun 2007
AIIA outlines federal election wish list
The Australian Information Industry Association (AIIA) has released its policy expectations for political parties in the upcoming 2007 federal election. Continue Reading
By- Voice&Data Staff
-
News
12 Jun 2007
VoIP call quality and reporting software improves QoS
Technology developed to power IPTV networks is also helping improve VoIP quality of service. Continue Reading
By- Kate Dostart
-
Feature
08 Jun 2007
Deploying VoIP: Five things every CIO should know
Navigating the complexity of a VoIP deployment can be overwhelming and it may seem like you need a technical degree to understand it. Here are five tips to help steer through the fog of a VoIP migration. Continue Reading
By- Zeus Kerravala, Senior Vice President, Yankee Group
-
News
08 Jun 2007
VoIP market evolves in 2007
VoIP will see market changes this year as IP PBX sales increase and market leaders shift their focus. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
07 Jun 2007
VoIP performance testing fundamentals
VoIP network performance testing can mean the difference between a VoIP system working at a high level QoS and a weak system that runs so poorly customers could take their business elsewhere. This guide discusses why it is important to run regular performance testing and some of the ways it can be done. Continue Reading
-
News
07 Jun 2007
VoIP market evolves in 2007
The VoIP market will mature and grow this year, according to new research. Continue Reading
By- Andrew R. Hickey
-
News
05 Jun 2007
Avaya to merge with Silver Lake and TPG Capital
Telephony giant Avaya will be acquired by a private equity firm. Continue Reading
By- Voice&Data Staff
-
News
04 Jun 2007
Deploying VoIP: Five things every CIO should know
Navigating the complexity of a VoIP migration can be overwhelming. Here are five tips to help steer through the fog of a VoIP deployment. Continue Reading
By- Zeus Kerravala, ZK Research
-
News
04 Jun 2007
WAN storage guide -- Chapter 1: WAN basics
A WAN basically connects two or more LANs. While this may sound like a relatively straightforward goal, the implications of WAN connectivity have had a profound influence on networking. This chapter covers basic WAN information. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Feature
04 Jun 2007
Unified communication case studies: What you need to know
Learn how others overcame the expected and the unexpected challenges of a UC deployment in our case studies. Continue Reading
By- SearchVoIP.com editors
-
Feature
01 Jun 2007
WAN storage guide -- Chapter 1: WAN basics
The implications of WAN connectivity have had a profound influence on networking. We look at some of the practical WAN issues, such as bandwidth, cost, latency and reliability. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
01 Jun 2007
Check Point promises more VoIP security, fewer slowdowns
Check Point's enhanced Open Performance Architecture is designed for deeper security of technologies like VoIP without the network performance problems that often come with it. Continue Reading
By -
News
31 May 2007
VoIP rush heats up cooling debate
Increased VoIP adoption is putting pressure on data centres' power and cooling requirements Continue Reading
By- Simon Sharwood
-
News
31 May 2007
It's cool to think about heat
If you're not thinking about power and cooling, you're behind the curve. Continue Reading
By- Simon Sharwood
-
News
31 May 2007
Cisco, Nortel frontrunners in Avaya acquisition rumors
Cisco and Nortel are said to be amongst those circling the still-live body of VoIP vendor Avaya, but analysts disagree on which, and why. Continue Reading
By- Andrew R. Hickey
-
News
30 May 2007
Brocade gets into the HBA business
Experts say the move, based on a partnership with LSI, could lower HBA pricing across the board and be the first step toward a Brocade-developed storage virtualization product. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
29 May 2007
SAN School: Table of contents
What is a storage area network? What are the benefits and pitfalls of installation? How can a SAN fit into your organization? These questions and more are answered SAN School. Continue Reading
By- SearchStorage.com editors
-
News
29 May 2007
The wireless future offers plenty of voice possibilities
Farpoint Group's Craig Mathias surveys the future of wireless networks and their ability to carry voice traffic. Continue Reading
-
News
29 May 2007
Bridging VoIP islands
WAN optimisation makes it possible to connect campus VoIP connections Continue Reading
By- Andrew Hickey
-
News
25 May 2007
VoIP advice from the trenches
ITKE, or ITKnowledge Exchange, is simply a cool (and quick) way to get a response to your VoIP-related questions. Continue Reading
By- Leigha Cardwell, TechTarget
-
Feature
24 May 2007
Network access control learning guide
From PDAs to insecure wireless modems, users have myriad options for connecting to -- and infecting -- the network. Created in partnership with our sister site SearchSecurity.com, this guide offers tips and expert advice on network access control. Learn how unauthorized users gain network access, how to block and secure untrusted endpoints, and get Windows-specific and universal access control policies and procedures. Continue Reading
-
News
24 May 2007
McAfee launches IPS for 10g networks, but is IT ready?
McAfee unveiled a new IPS offering for 10-gigabit Ethernet networks and announced the upgrade and integration of several other products. One analyst offers a mixed assessment. Continue Reading
By -
News
22 May 2007
Mitel acquires Inter-Tel, signaling more consolidation to come
Mitel acquired Inter-Tel last week, signaling a trend toward vendor consolidation in the VoIP market and creating stronger options for SMBs. Continue Reading
By- Andrew R. Hickey
-
News
21 May 2007
Mobile instant messaging enhances company's business processes
A mobile IM service acquired by a hosted VoIP provider encourages more companies to enhance their business processes. Continue Reading
By- Kate Dostart, Associate Editor
-
News
21 May 2007
Microsoft, TCG partner on network access control; Cisco takes own route
Microsoft and the Trusted Computing Group (TCG) have joined forces to create better interoperability between network access control solutions with the announcement of a new specification which ensures that Microsoft's Network Access Protection (NAP) and TCG's Trusted Network Connect (TNC) architecture can work together. Continue Reading
By- Andrew Hickey
-
Tip
20 May 2007
Manipulating VoIP Security
This tip provides an extensive list of sites that track and document VoIP attack tools. Continue Reading
By- Gary Audin, Delphi Inc.
-
News
17 May 2007
VoIP security fundamentals
VoIP security is a challenge for IT staff because IP telephony brings with it not only the security problems of data networks but also new threats specific to VoIP. In this fundamentals guide, learn about network security threats and emerging IP telephony threats, and how to secure your VoIP systems and endpoints from them. Continue Reading
-
News
11 May 2007
Choosing WAN providers: Key questions to ask
When evaluating carrier services for the WAN, it's imperative to ask some key questions regarding customer service, service-level agreements, global coverage, management and monitoring capabilities, and underlying technologies. Make sure these questions are on your checklist. Continue Reading
By- Robin Gareiss, Metrigy
-
News
11 May 2007
VoIP, unified communications adoption continue to rise
VoIP and unified communications adoption continue to rise steadily in the enterprise, according to Infonetics Research's latest report. Continue Reading
By- Kate Dostart, Associate Editor
-
Feature
10 May 2007
ISCSI TCP/IP TOE card specifications
Key specifications for a cross-section of popular iSCSI TOE cards. Continue Reading
-
Feature
08 May 2007
4 Gbit Fibre Channel switch purchase considerations
As SANs scale up, data centres often upgrade and expand the SAN switch infrastructure. Here's what to look for when scaling Continue Reading
-
Tip
06 May 2007
VoIP security -- Free IP telephony fuzzing tools
Protect your organization's VoIP security with free VoIP security tools designed to test IP telephony vulnerability. Continue Reading
By- Gary Audin, Delphi Inc.
-
News
03 May 2007
Network waste to reach $100 billion
Network overspending will cost enterprises more than $100 billion over the next five years, according to recent predictions by Gartner Inc. Continue Reading
By- Andrew R. Hickey
-
Tip
02 May 2007
OSI: Securing the Stack, Layer 8 -- Social engineering and security policy
Network security is essential at every layer of the OSI model, including the mythical eighth layer, where users interact with technology. Since hackers can use social engineering to exploit people, it is important to train your users and implement good security policy. Continue Reading
By- Michael Gregg, Superior Solutions, Inc.
-
News
29 Apr 2007
WEP: Wireless security's broken skeleton in the closet
WEP for wireless security was cracked again recently. Though many will say WEP is obsolete, many companies still use it. Continue Reading
By- Andrew R. Hickey
-
News
24 Apr 2007
Scaling storage networks demands careful consideration
In the Fibre Channel world, scaling often means adding more and faster switch ports to extend the fabric's bandwidth and connectivity. But IP storage (mainly iSCSI) is a growing area of SAN expansion, using ubiquitous Ethernet network technology to pass storage data between storage devices. This requires the use of IP switches and routers, and can involve the deployment of iSCSI TOE host adapters to offload iSCSI traffic from the local server's CPU. This Buying Guide is intended to help clarify the principle considerations involved scaling storage networks and each chapter offers a set of buying points and product specifications that can help readers identify prospective new scaling products. Continue Reading
-
Feature
24 Apr 2007
Storage consolidation: WAN acceleration and WAFS technology overview
One important avenue of storage consolidation is the consolidation of remote office storage; this is where WAN acceleration and WAFS technology comes into play. Continue Reading
-
Feature
24 Apr 2007
Storage consolidation: SRM tools overview
SRM tools are an important part of storage consolidation. They allow admins to monitor the storage environment, allocate and organise available storage, and offer insights into future trends. Continue Reading
-
Feature
24 Apr 2007
IP storage switch and router purchase considerations
The choice of an IP switch or router demands careful consideration of issues including port speed, segmentation, interoperability and security Continue Reading
-
Tip
23 Apr 2007
What can we do to connect our wireless router to our wireless client?
Experiencing a persistent inability to connect a wireless router from your wireless client? Lisa Phifer details how to fix this problem. Continue Reading
By- Lisa Phifer, Core Competence
-
News
23 Apr 2007
Weekly compilation of storage news:Dell LTO-4 drive, new Sun array
Dell is first out of the gate with the new LTO-4 drive, which offers native encryption; Sun unveils new array and deepens its relationship with FalconStor. Continue Reading
By- SearchStorage.com Staff
-
News
20 Apr 2007
Convergence certification provides evaluation standard
CompTIA has developed a convergence certification, designed to validate qualified convergence professionals. Continue Reading
By- Kate Dostart, Associate Editor
-
Tip
19 Apr 2007
VLANs -- Controlling wired and wireless traffic
Today, most business networks rely on virtual LANs (VLANs) to partition Ethernets and control the destinations reached by each worker. As users begin to shift between Ethernet and Wi-Fi throughout the work day, it makes sense to apply VLANs to both wired and wireless network access. This tip describes common methods for mapping Wi-Fi stations onto corporate VLANs and suggests when you might want to do so. Continue Reading
By- Lisa Phifer, Core Competence
-
Feature
19 Apr 2007
Skype to the desk phone saves company a bundle
Skype on the desk phone has helped a Chicago-based furniture maker save a considerable amount of money on long-distance voice charges. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
18 Apr 2007
How do I calculate the time taken for a file to be transferred over a WAN link?
Calculate the time it will take for a file to transfer over a WAN link with the help of Dr. Hughes in this expert response. Continue Reading
By- SearchNetworking Staff
-
News
18 Apr 2007
Convergence certification provides evaluation standard
Voice and data convergence are more prevalent and enterprises are looking for certified professionals to administer the combined networks -- leading CompTIA to develop its Convergence+ certification, designed to validate qualified convergence professionals. Continue Reading
By- Kate Dostart
-
News
17 Apr 2007
Storage consolidation: Disks and disk subsystems overview
Any storage consolidation effort must involve a serious consideration of disk subsystems and the specific disk types that those systems will contain Continue Reading
-
News
16 Apr 2007
How is SIP winning favor over H.323?
What are the similarities, differences and major reasons between SIP and H.323. And why is one winning? Continue Reading
By- Christian Stegh
-
News
10 Apr 2007
Capacity planning software specifications
Gauging storage needs over time is one of the biggest challenges faced by IT administrators, and a new generation of capacity planning tools is emerging to help forecast growth and utilisation of storage resources. Continue Reading
-
News
09 Apr 2007
HP renews SMB storage campaign
With the launch of the new All-in-One 1200 and the shifting of executives to a new SMB business unit, HP is focused on its low-end products in an effort to boost growth. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
05 Apr 2007
Goldman Sachs: Interest in NetApp SAN products wanes
A survey by the investment firm shows enterprise storage buyers had a declining interest in NetApp SAN products over the last year. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
04 Apr 2007
Storage vendors propose FC over Ethernet standard
A group of nine storage vendors led by Emulex is proposing a Fibre Channel over Ethernet (FCoE) standard . Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
04 Apr 2007
Wireless VoIP market to grow rapidly
VoIP and Voice over Wi-Fi markets are expected to be strong in 2007 and remain so through 2012. Continue Reading
By- Kate Dostart, Associate Editor
-
News
01 Apr 2007
News Wrap 2.0
TechTarget ANZ's slightly skewed look at this weeks news. Continue Reading
By- Simon Sharwood
-
News
01 Apr 2007
Network security, content security markets to grow in 2007
The network security appliance and software markets are expected to continue growing steadily in 2007, while content security sales will begin to affect most enterprises' networking budgets. Continue Reading
By- Kate Dostart
-
News
29 Mar 2007
VoIP network monitoring improves VoIP deployment
VoIP network monitoring and pre-deployment analysis are becoming more important as VoIP application overlay becomes denser Continue Reading
By- Kate Dostart, Associate Editor
-
Tip
28 Mar 2007
How do I get my LAN computers to reach the Internet?
Get your LAN computers to reach the Internet in this response from wireless expert Lisa Phifer. Continue Reading
By- Lisa Phifer, Core Competence
-
Tip
28 Mar 2007
What are the criteria for evaluating an indoor wireless network?
In this Q&A., learn how to evaluate an indoor wireless network with criteria provided by expert Lisa Phifer. Continue Reading
By- Lisa Phifer, Core Competence
-
News
27 Mar 2007
VoIP's inherited data security problems
VoIP security problems present a challenge for voice and network staff. This article explains how to secure both your call servers and endpoints, and how best to divide this work between voice and data personnel. Continue Reading
By- Gary Audin, Delphi Inc.
- News 25 Mar 2007
-
News
25 Mar 2007
Why is VoIP authentication essential?
VoIP authentication advice. Continue Reading
By- SearchVoIP Staff
-
News
25 Mar 2007
VoIP protocols
VoIP protocols -- the strengths and weaknesses of each. Continue Reading
By- SearchVoIP Staff
-
Feature
22 Mar 2007
VoiceCon Spring: A transition show for the VoIP industry
VoiceCon Spring was all about unified communications. Zeus Kerravala provides highlights of the more interesting points from the show. Continue Reading
-
News
22 Mar 2007
Midrange storage array specifications
Product snapshots highlighting key specifications for a cross section of midrange storage array products. Continue Reading
-
News
22 Mar 2007
11n will boost speed, prompt upgrades
802.11n's speed will be a welcome boost for end-users, but will create headaches as admins face network upgrades to deal with the demand for bandwidth it unleashes. Continue Reading
By- Andrew R. Hickey
-
News
20 Mar 2007
NAC panel says technology may not add up
A panel discussing the potential of using network access control (NAC) says the technology may not be worth the price of deploying and maintaining it. Continue Reading
By- Robert Westervelt, TechTarget
-
Tip
19 Mar 2007
Network summarization -- Supernetting and wildcard masks
Supernetting allows one routing table entry to represent an aggregation of networks. Network engineers need to understand supernetting, how to read routes received from other providers and how to create an access list that references these multiple networks in a single summarized statement. In this tip, you'll learn more about the IP addressing-related topics of network summarization, supernetting and wildcard masks. Continue Reading
By -
News
19 Mar 2007
Power over Ethernet power consumption: The hidden costs
Power over Ethernet (PoE) has many advantages in a VoIP migration, but some companies overlook the amount of power needed to run PoE for VoIP and the costs and cooling requirements that come with it. Continue Reading
By- Andrew R. Hickey
-
Feature
18 Mar 2007
Mobile data services development trends in 2007
Darrell Jordan-Smith takes a look at new data services architectures and development tools emerging in 2007 and the ongoing development efforts of the Java Community and others. Continue Reading
By- Darrell Jordan-Smith
-
News
18 Mar 2007
Cisco stamps on Brocade in Q4, Dell'Oro says
For the second quarter in a row Cisco is gaining SAN switch market share on Brocade, according to the latest report by the Dell'Oro Group. But the numbers are causing a firestorm. Continue Reading
By- Jo Maitland, TechTarget
-
News
18 Mar 2007
VoIP security worries are plentiful, potent
VoIP creates a new set of security issues for your network, as expert Ed Skoudis explains. Continue Reading
By- Ed Skoudis, SANS Technology Institute
-
News
18 Mar 2007
New gigabit standard: How fast is fast enough?
Last June, the 10GBASE-T standard was published promising 10 Gbit operations on copper cabling. This standard was originally targeted toward data centers, but the Ethernet Alliance and IEEE are working on increasing this standard to potentially 40 or 100 more gigabits -- so what speed is fast enough? Continue Reading
By- TechTarget Staff
-
News
15 Mar 2007
Open source IP telephony on hold?
Is open source telephony ready for your business? Read on to learn if it's the real deal. Continue Reading
By- Amy Kucharik, TechTarget