Networking - News, Features, and Slideshows
- Vulnerability in embedded Web server exposes millions of routers to hacking
- Australia gets poor marks for connectivity satisfaction
Networking in pictures
A serious vulnerability in an embedded Web server used by many router models from different manufacturers allows remote attackers to take control of affected devices over the Internet.
By Lucian Constantin | 19 December, 2014 06:16
The NBASE-T Alliance -- a recently formed umbrella group of networking industry players dedicated to keeping standard Ethernet cabling relevant -- announced a dozen new members on Monday, including big names such as Intel, Qualcomm and Brocade.
By Jon Gold | 16 December, 2014 23:20
T-Mobile CEO John Legere will cozy up to Yahoo Tech's David Pogue during what the carrier is calling its Un-carrier 8.0 event on Tuesday -- a mystery webcast that promises to include some news and knowing Legere, probably some colorful language.
By Bob Brown | 16 December, 2014 07:27
Riverbed Technology is the latest major tech company to bow out of public trading, announcing a US$3.6 billion takeover by private equity firm Thoma Bravo on Monday. The price is the highest ever paid by Thoma Bravo, and works out to $21 for each share of Riverbed currently in circulation.
By Jon Gold | 16 December, 2014 06:28
While the three largest venture capital deals of the year in the technology industry went to consumer-focused startups, most of the other top investments went to companies building products that could reshape the enterprise IT landscape.
By Brandon Butler | 16 December, 2014 05:58
Picture this: You're sitting down
By Patrick Miller | 14 January, 2011 01:11
We're at an awkward stage as the age of network-streamed multimedia matures. Broadband and cell providers have only recently realized the public's enormous appetite for streaming video, VoIP, and the combination of both.
By Jon L. Jacobi | 10 December, 2010 02:33
The Internet of Things may be a new idea, but machines talking to other machines is not.
By Stephen Lawson | 19 December, 2014 06:13
Managing the wireless environment at the average college or university can be a difficult task at the best of times, and when students and staff start using personal hotspots the sort that provide wireless data access from the same -- it's not the best of times.
By Jon Gold | 08 October, 2014 03:16
The definition of Software Defined Networking (SDN) continues to broaden, today including functions such as configuration automation and orchestration. While these tasks aren't strictly SDN, the fact is software is used to define some aspect of the network infrastructure in both cases, so vendors have stretched the definition of SDN to bring configuration automation and orchestration platforms into the mix. In fairness, the line gets blurry, as some modern orchestration systems use programmatic interfaces to provision the network instead of traditional configuration tools such as SSH or SNMP.
By Ethan Banks | 09 September, 2014 23:39
From the vantage point of most people, even technical folks, Active Directory (AD) seems like it's doing pretty well. How often can you not log in when you sit down at your PC? How often do you fail to find someone in the corporate directory in Outlook? How many times have you heard of an AD outage?
By By Jonathan Sander, Strategy & Research Officer, STEALTHbits | 06 September, 2014 06:07
Whitepapers about Networking
This guide is intended for companies, organizations, and IT professionals who are looking for a network and application monitoring tool that provides a holistic view of application performance, including performance monitoring, from the end-user perspective.
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
Facebook, the world’s largest social networking site, needed to ensure that its remote access portal and Citrix XenApp virtual application environment could provide fast, reliable connectivity and Performance—without becoming a pathway for network intrusion and data theft. Read More
- US rejects North Korea offer to investigate Sony hack, reaches out to China
- North Korea wants joint probe into Sony hack, warns of consequences if not
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright