Networking - News, Features, and Slideshows
- Ruckus goes after small business with app-managed Xclaim Wi-Fi
- Startup builds on Wi-Fi chips for cheaper 'last mile' to home broadband
Networking in pictures
As small businesses make their Wi-Fi more enterprise-like, Ruckus Wireless wants to meet them where they live with that hallmark of consumer tech, the mobile app.
By Stephen Lawson | 30 October, 2014 05:32
A partnership that lets Wi-Fi users get on free public networks in San Francisco and San Jose, California, with a one-time joining process now also covers a hotspot along the River Thames in London.
By Stephen Lawson | 25 October, 2014 11:22
The Internet can ease travel concerns in many ways, including flight-delay information, maps of road congestion, and ride-sharing apps. But a Wi-Fi network at the Austin, Texas, airport can now answer one of the great unknowns: How long will I have to wait in line at security?
By Stephen Lawson | 23 October, 2014 11:43
Picture this: You're sitting down
By Patrick Miller | 14 January, 2011 01:11
We're at an awkward stage as the age of network-streamed multimedia matures. Broadband and cell providers have only recently realized the public's enormous appetite for streaming video, VoIP, and the combination of both.
By Jon L. Jacobi | 10 December, 2010 02:33
Managing the wireless environment at the average college or university can be a difficult task at the best of times, and when students and staff start using personal hotspots the sort that provide wireless data access from the same -- it's not the best of times.
By Jon Gold | 08 October, 2014 03:16
The definition of Software Defined Networking (SDN) continues to broaden, today including functions such as configuration automation and orchestration. While these tasks aren't strictly SDN, the fact is software is used to define some aspect of the network infrastructure in both cases, so vendors have stretched the definition of SDN to bring configuration automation and orchestration platforms into the mix. In fairness, the line gets blurry, as some modern orchestration systems use programmatic interfaces to provision the network instead of traditional configuration tools such as SSH or SNMP.
By Ethan Banks | 09 September, 2014 23:39
From the vantage point of most people, even technical folks, Active Directory (AD) seems like it's doing pretty well. How often can you not log in when you sit down at your PC? How often do you fail to find someone in the corporate directory in Outlook? How many times have you heard of an AD outage?
By By Jonathan Sander, Strategy & Research Officer, STEALTHbits | 06 September, 2014 06:07
Sprint's new lower-priced shared data plan sounds ambitious, but analysts say it doesn't go far enough and won't address the carrier's network performance sore spot.
By Matt Hamblen | 20 August, 2014 20:20
Whitepapers about Networking
TheInfoPro's unique Market Window uses IT professionals ratings of vendors on 14 separate criteria to calculate scores for Vendor Promise and Vendor Fulfillment, allowing comparison of vendors’ effectiveness at strategy, marketing, delivery and execution. In prior studies, this research appeared in the Vendor Performance report.
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
- FTStudio Design ManagerVIC
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTAccount Manager - DataNSW
- FTDigital Performance Manager - MediaNSW
- FTSenior SEO ManagerNSW
- FTDigital Marketing CoordinatorNSW
- FTClient Service Director - Search: SEO & PPCNSW
- FTChief Information Officer - CSIROACT
Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
- Sorry movie goers, Google Glass, other wearables banned from cinemas
- Drupal: If you weren't quick to patch, assume your site was hacked
- After rocket explosion, no air, water pollutants detected
- Microsoft releases stopgap POODLE protection for Internet Explorer
- Smartphone share of overall mobile phone sales stalling at 70 percent
- Pirate Bay co-founder found guilty of hacking in Denmark
- Apple Pay rival MCX defends security after hackers steal emails
- Germany backs plan to retain personal flight data across EU
- Startup Capriza scores $27M to Zapp legacy apps into mobile ones
- China: Facebook not banned, but must follow the rules
- Google AI project apes memory, programs (sort of) like a human
- Nintendo targets new health business with sleep sensor
- Vodafone asks how data retention applies to M2M
- China's Xiaomi surges to become world's third largest smartphone vendor
- Cunningham Lindsey uses Wi-Fi units to work during natural disasters