<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Building</title> <atom:link href="https://www.iphere.com/tag/building/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Building An Information Security Policy Part 3: Logical And Physical Design</title><link>https://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design</link> <comments>https://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design#comments</comments> <pubDate>Thu, 20 Mar 2014 02:19:30 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Design]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Logical]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Physical]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design</guid> <description><![CDATA[Careful crafting of the logical and physical aspects of a network is essential for an effective security policy. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Building An Information Security Policy Part 2: Hardware and Software</title><link>https://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software</link> <comments>https://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software#comments</comments> <pubDate>Fri, 28 Feb 2014 02:14:33 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Hardware]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Software]]></category> <guid
isPermaLink="false">http://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software</guid> <description><![CDATA[Here&#8217;s how to select the right network device hardware and software to support your security policy. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Building an Information Security Policy Part 1: Network Devices</title><link>https://www.iphere.com/building-an-information-security-policy-part-1-network-devices</link> <comments>https://www.iphere.com/building-an-information-security-policy-part-1-network-devices#comments</comments> <pubDate>Wed, 19 Feb 2014 20:13:58 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Devices]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Network]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/building-an-information-security-policy-part-1-network-devices</guid> <description><![CDATA[An effective security policy requires careful planning to ensure the roles and capabilities of routers, switches and firewalls are properly configured. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/building-an-information-security-policy-part-1-network-devices/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Behind The Scenes Building The InteropNet</title><link>https://www.iphere.com/behind-the-scenes-building-the-interopnet</link> <comments>https://www.iphere.com/behind-the-scenes-building-the-interopnet#comments</comments> <pubDate>Thu, 13 Feb 2014 08:13:13 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Behind]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Interopnet]]></category> <category><![CDATA[Scenes]]></category> <guid
isPermaLink="false">http://www.iphere.com/behind-the-scenes-building-the-interopnet</guid> <description><![CDATA[Network engineers are busy preparing the network infrastructure for the multi-vendor InteropNet that will support the upcoming Interop conference. Preview the action in our video. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/behind-the-scenes-building-the-interopnet/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>802.11ac Wi-Fi Part 1: Building Blocks</title><link>https://www.iphere.com/802-11ac-wi-fi-part-1-building-blocks</link> <comments>https://www.iphere.com/802-11ac-wi-fi-part-1-building-blocks#comments</comments> <pubDate>Mon, 27 Jan 2014 20:13:17 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[802.11ac]]></category> <category><![CDATA[Blocks]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[WiFi]]></category> <guid
isPermaLink="false">http://www.iphere.com/802-11ac-wi-fi-part-1-building-blocks</guid> <description><![CDATA[The new Wi-Fi standard builds on 802.11n for gigabit-speed WLANs. Here are some of 802.11ac&#8217;s major enhancements. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/802-11ac-wi-fi-part-1-building-blocks/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>DIY Storage Part 4: Building Redundancy</title><link>https://www.iphere.com/diy-storage-part-4-building-redundancy</link> <comments>https://www.iphere.com/diy-storage-part-4-building-redundancy#comments</comments> <pubDate>Wed, 17 Jul 2013 02:15:24 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Redundancy]]></category> <category><![CDATA[Storage]]></category> <guid
isPermaLink="false">http://www.iphere.com/diy-storage-part-4-building-redundancy</guid> <description><![CDATA[In building my own SAN to meet some storage needs at work, I figured out how to overcome problems on the path to redundancy and high availability. Here&#8217;s what I learned works for creating a HA array. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/diy-storage-part-4-building-redundancy/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Five Steps to Building a Private Cloud</title><link>https://www.iphere.com/five-steps-to-building-a-private-cloud</link> <comments>https://www.iphere.com/five-steps-to-building-a-private-cloud#comments</comments> <pubDate>Tue, 24 Jul 2012 02:22:45 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Five]]></category> <category><![CDATA[Private]]></category> <category><![CDATA[Steps]]></category> <guid
isPermaLink="false">http://www.iphere.com/five-steps-to-building-a-private-cloud</guid> <description><![CDATA[Taking a staged approach to building a private cloud helps ensure success along the way. Here&#8217;s how to break it down. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/five-steps-to-building-a-private-cloud/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Cybercriminals Building Intricate, Multi-Use Malnets</title><link>https://www.iphere.com/cybercriminals-building-intricate-multi-use-malnets</link> <comments>https://www.iphere.com/cybercriminals-building-intricate-multi-use-malnets#comments</comments> <pubDate>Wed, 15 Feb 2012 20:13:27 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Cybercriminals]]></category> <category><![CDATA[Intricate]]></category> <category><![CDATA[Malnets]]></category> <category><![CDATA[MultiUse]]></category> <guid
isPermaLink="false">http://www.iphere.com/cybercriminals-building-intricate-multi-use-malnets</guid> <description><![CDATA[Cybercriminals have gotten so sophisticated that they build an intricate network infrastructure and use it repeatedly for the distribution of malware, according to a new study from the network security company Blue Coat Systems. These malware networks, or &#8220;malnets,&#8221; lure targets through trusted web sites, then route them to malware through relay, exploit and payload [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/cybercriminals-building-intricate-multi-use-malnets/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Microsoft&#8217;s System Center 2012: Building A Private Cloud</title><link>https://www.iphere.com/microsofts-system-center-2012-building-a-private-cloud</link> <comments>https://www.iphere.com/microsofts-system-center-2012-building-a-private-cloud#comments</comments> <pubDate>Tue, 17 Jan 2012 20:14:13 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[2012]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[center]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Microsoft's]]></category> <category><![CDATA[Private]]></category> <category><![CDATA[System]]></category> <guid
isPermaLink="false">http://www.iphere.com/microsofts-system-center-2012-building-a-private-cloud</guid> <description><![CDATA[Microsoft is beefing up it&#8217;s private cloud offering by enhancing existing modules in System Center 2012, adding an application controller which disconnects apps from the OS, an orchestration module which automates application and virtual machine deployment and management tasks. Microsoft is also reducing System Center 2012&#8242;s licensing options from 113 different combinations to two editions&#8211;a [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/microsofts-system-center-2012-building-a-private-cloud/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Building A Private PaaS</title><link>https://www.iphere.com/building-a-private-paas</link> <comments>https://www.iphere.com/building-a-private-paas#comments</comments> <pubDate>Fri, 05 Aug 2011 14:13:13 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[PaaS]]></category> <category><![CDATA[Private]]></category> <guid
isPermaLink="false">http://www.iphere.com/building-a-private-paas</guid> <description><![CDATA[A great end goal for the cloud model is PaaS. PaaS breaks the 1:1 relationship between OS and application/service and provides for more fluid scalability. Additionally, PaaS platforms can remove the requirement for custom OS and server builds on a per service basis, further reducing administrative overhead. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/building-a-private-paas/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>