Network management - News, Features, and Slideshows
Network management in pictures
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
By By Andrew Harding, Vice President of Products, VSS Monitoring | 07 November, 2014 04:21
Riverbed tacked three new software modules onto its SteelCentral network management product today, broadening the features already available through that framework.
By Jon Gold | 11 August, 2014 23:22
F5 Networks CEO John McAdam said Tuesday at his company's Agility conference in New York that, in essence, the future of IT is complicated, confusing and riddled with security threats - and that's a good thing.
By Jon Gold | 06 August, 2014 07:00
This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.
By Linda Musthaler | 19 July, 2014 00:56
We're at an awkward stage as the age of network-streamed multimedia matures. Broadband and cell providers have only recently realized the public's enormous appetite for streaming video, VoIP, and the combination of both.
By Jon L. Jacobi | 10 December, 2010 02:33
Laptops used to be the only devices on the company's wireless network. But Wi-Fi has become a ubiquitous standard used by a host of devices -- including desktop PCs, laptops, netbooks, tablets, smartphones, printers, storage devices, and projectors.
By Logan G. Harbaugh | 27 October, 2011 08:27
Mac OS X 10.7 Lion Server adds innovative features and a new low price tag, but cuts in services and the elimination of advanced GUI administration tools may force some enterprise departments to think twice about the role of Mac servers on their networks.
By John Rizzo | 25 July, 2011 23:40
Major Websites are to test Internet Protocol version 6 (IPv6) by participating in World IPv6 Day, scheduled for June 8. Google, Facebook, and Yahoo, among others, have agreed to ensure that IPv6 entrances to their sites will be available, along with any network infrastructure needed to receive IPv6 traffic.
By Keir Thomas | 13 January, 2011 09:55
In recent weeks WikiLeaks has been targeted by denial-of-service (DoS) attacks, had its hosting service shutdown, been bounced off of Amazon hosting, had its funding through PayPal, MasterCard and other sources shut down, and its leader arrested on sexual assault-related charges. The fact that WikiLeaks remains stubbornly and defiantly online holds some lessons for other sites when it comes to resilience and survivability.
By Tony Bradley | 09 December, 2010 07:29
Whitepapers about Network management
When IT organizations set up private cloud computing environments, it creates a new set of network monitoring challenges that traditional network management tools are unable to address. This white paper details how network management can go beyond just looking at the performance of individual nodes or components to providing holistic Business Service Monitoring (BSM) capabilities.
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTStudio Design ManagerVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
- FTStudio Design ManagerVIC
- FTSenior SEO ManagerNSW
- FTAcquisition Marketing ExceutiveNSW
- FTProgram Manager - Integration & SolutionsNSW
- FTChief Information Officer - CSIROACT
Security is an intrusive mechanism that is often seen to interfere with normal business operations. Nonetheless, security is essential to the normal operation of the business, and the right security mechanisms and approaches can minimize performance degradation.
- Microsoft Band customers get scrooged even before holidays start
- Microsoft study finds everybody wants DevOps but culture is a challenge
- Google delays demise of old-style Chrome plug-ins
- Stratasys now sells professional-grade 3D printers on Amazon
- Want a 100TB disk drive? You'll have to wait 'til 2025
- Tablet craze calms down as iPad shipments decline
- DT and Informatica service links Cloud, on-premises apps, data
- Twitter, in time for the holidays, puts digital coupons in your feed
- Bitdefender security appliance for home networks seeks to replace end-point antivirus
- Pew poll: Limited knowledge on privacy policies, more on net neutrality
- Mobile broadband modems are losing their appeal with consumers
- UK faults tech firm for not alerting authorities before soldier's murder
- HP talks cloud delivery options, the importance of OpenStack, how it competes on price
- 60 things European legislators don't want Canada to learn about air passengers
- Big IT vendors mostly mum on commercial drone plans