Your IP is:

216.73.216.0

[More Detail]


Instant Port Checker

IP:[get my ip] Port1:[EL2/PR2/PM3]   [XON NVR] Port2: Port3:

Skip to content

Can Ruckus, San Jose Revive Municipal Wi-Fi?

San Jose’s downtown is newly awash in Wi-Fi from Ruckus Wireless. But is a catchy slogan and established technology enough to triumph in the failure-prone municipal wireless space?
Network Computing

Categories: General.

Tags: , , , ,

How To Configure Cisco Nexus 5500 Port Profiles

Cisco Nexus 5500 port profiles let network engineers apply multiple port configurations with a single command. Port profiles can reduce errors and enforce standard configurations. We show you how with sample code.
Network Computing

Categories: General.

Tags: , , , , ,

Samsung? BlackBerry? Who Will Win the Containerization Wars?


MDM (mobile device management) has become a commodity technology over the years. It is also embarrassingly limited in its ability to secure devices and data on those devices. But it is, ironically, standardized by the rigid definition of what Apple will support.

So when security companies like Apperian develop their MAM (mobile application management) solutions to advance security beyond what Apple does, things can get messy.

Categories: General.

Tags: , , ,

The Data Center Disaggregated: Promises and Problems

Facebook’s Open Compute Project aims to make data center elements, including server components, easily interchangeable. But tech and market barriers stand in the way.
Network Computing

Categories: General.

Tags: , , , ,

Watching Workers: Where’s The Line?


Employers may be within their rights to monitor workers, but those rights have limits and repercussions. Employers often find that watching workers is necessary, but they need to watch their step as they do so.

The issue surfaced at Harvard University recently after revelations that administrators searched 16 faculty email accounts last fall to find the source of leaks to the media about a prior cheating scandal.

Categories: General.

Tags: , , ,

Vidyo Rethinks Enterprise Video Conferencing

Vidyo provides enterprises with a software alternative to proprietary, and often expensive, video conferencing systems.
Network Computing

Categories: General.

Tags: , , , ,

Opinion: CISPA isn’t the evil, privacy-infringing legislation you think it is

A bill that would foster stronger cyber security by enabling government and private sector companies to share information is facing opposition from privacy and civil liberties groups. The controversy is misguided, though, and the legislation is a step in the right direction.

CISPA, or the Cyber Intelligence Sharing and Protection Act, was introduced last year by the ranking members of the House Permanent Select Committee on Intelligence—Mike Rogers (R-MI) and Dutch Ruppersberger (D-MD). The legislation’s goal is to establish a framework for government and private companies to share sensitive information in the effort to identify and block cyber attacks more effectively.

Categories: General.

Tags: , , , , , ,

VMware’s NSX End Game Is Hybrid Clouds

NSX, VMware’s data center network virtualization platform, is really about public and hybrid clouds, where VMware has plans for growth. Here’s why.
Network Computing

Categories: General.

Tags: , , ,

Storage Vendors, Flash Manufacturers, Buy Into Startups

Storage startups are getting interest—and money—from storage vendors and flash manufacturers. But investment doesn’t always mean the promise of viability.
Network Computing

Categories: General.

Tags: , , , , ,

How Server-Side Storage Memory Impacts VDI Costs


In my last column I posited that advances in storage technology — mostly innovative use of memory-based storage — is making virtual desktop infrastructure (VDI) projects more likely to generate a return on investment beyond just an operational one.

Moving beyond operational VDI project justification is critical for the large-scale deployment of VDI projects. It is simply easier to justify to non-IT decision makers something that will save the organization dollars than it is to rationalize something that will save IT department time or increase security.

Categories: General.

Tags: , , , ,