<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Control</title> <atom:link href="https://www.iphere.com/tag/control/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Clear Access Control List (ACL) Counters in Cisco IOS</title><link>https://www.iphere.com/clear-access-control-list-acl-counters-in-cisco-ios-2</link> <comments>https://www.iphere.com/clear-access-control-list-acl-counters-in-cisco-ios-2#comments</comments> <pubDate>Sat, 22 Nov 2014 08:13:19 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Access]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[Clear]]></category> <category><![CDATA[Control]]></category> <category><![CDATA[Counters]]></category> <category><![CDATA[List]]></category> <guid
isPermaLink="false">http://www.iphere.com/clear-access-control-list-acl-counters-in-cisco-ios-2</guid> <description><![CDATA[When troubleshooting a problem with Access Control lists, one of the things you would want to do is to clear the counters on the ACL matches. In Cisco IOS, you can clear the ACL Matches counters as follows: Clear Counters on All ACLs ciscorouter# clear access-list counters This clears the matches on all the ACLs [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/clear-access-control-list-acl-counters-in-cisco-ios-2/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Debunking The IT Control Freak Myth</title><link>https://www.iphere.com/debunking-the-it-control-freak-myth</link> <comments>https://www.iphere.com/debunking-the-it-control-freak-myth#comments</comments> <pubDate>Thu, 10 Oct 2013 08:13:11 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Control]]></category> <category><![CDATA[Debunking]]></category> <category><![CDATA[Freak]]></category> <category><![CDATA[Myth]]></category> <guid
isPermaLink="false">http://www.iphere.com/debunking-the-it-control-freak-myth</guid> <description><![CDATA[Many in departments outside of IT often view IT professionals as power mongers who strangle their freedom. It&#8217;s time to squash this stereotype for good. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/debunking-the-it-control-freak-myth/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Private, Hybrid Cloud Interest Spurred by Security and Control</title><link>https://www.iphere.com/private-hybrid-cloud-interest-spurred-by-security-and-control</link> <comments>https://www.iphere.com/private-hybrid-cloud-interest-spurred-by-security-and-control#comments</comments> <pubDate>Tue, 20 Aug 2013 20:12:54 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Control]]></category> <category><![CDATA[Hybrid]]></category> <category><![CDATA[Interest]]></category> <category><![CDATA[Private]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Spurred]]></category> <guid
isPermaLink="false">http://www.iphere.com/private-hybrid-cloud-interest-spurred-by-security-and-control</guid> <description><![CDATA[IT is investigating private and hybrid clouds to address concerns around security, control and application suitability, according to two recent surveys. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/private-hybrid-cloud-interest-spurred-by-security-and-control/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>How To Control Applications On Aerohive WLANs</title><link>https://www.iphere.com/how-to-control-applications-on-aerohive-wlans</link> <comments>https://www.iphere.com/how-to-control-applications-on-aerohive-wlans#comments</comments> <pubDate>Thu, 18 Jul 2013 02:23:27 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Aerohive]]></category> <category><![CDATA[Applications]]></category> <category><![CDATA[Control]]></category> <category><![CDATA[WLANs]]></category> <guid
isPermaLink="false">http://www.iphere.com/how-to-control-applications-on-aerohive-wlans</guid> <description><![CDATA[Aerohive includes application visibility and control features that let you identify and set policy around popular applications crossing your wireless network. Here&#8217;s how to set it up. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/how-to-control-applications-on-aerohive-wlans/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Xirrus Adds Application Control To WLAN Arrays</title><link>https://www.iphere.com/xirrus-adds-application-control-to-wlan-arrays</link> <comments>https://www.iphere.com/xirrus-adds-application-control-to-wlan-arrays#comments</comments> <pubDate>Sat, 17 Nov 2012 20:14:36 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Adds]]></category> <category><![CDATA[Application]]></category> <category><![CDATA[Arrays]]></category> <category><![CDATA[Control]]></category> <category><![CDATA[WLAN]]></category> <category><![CDATA[Xirrus]]></category> <guid
isPermaLink="false">http://www.iphere.com/xirrus-adds-application-control-to-wlan-arrays</guid> <description><![CDATA[Xirrus will add deep packet inspection to its wireless arrays to let administrators prioritize, block or limit bandwidth based on specific applications. Xirrus&#8217;s claim to be the first WLAN vendor to do so don&#8217;t ring true, but it&#8217;s still a good idea. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/xirrus-adds-application-control-to-wlan-arrays/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Survey finds most networks are out of control</title><link>https://www.iphere.com/survey-finds-most-networks-are-out-of-control</link> <comments>https://www.iphere.com/survey-finds-most-networks-are-out-of-control#comments</comments> <pubDate>Wed, 05 Sep 2012 08:14:28 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Control]]></category> <category><![CDATA[Finds]]></category> <category><![CDATA[Most]]></category> <category><![CDATA[Networks]]></category> <category><![CDATA[Survey]]></category> <guid
isPermaLink="false">http://www.iphere.com/survey-finds-most-networks-are-out-of-control</guid> <description><![CDATA[Do you know what software is in use on your network? A survey released today by Avecto, a developer of Windows privilege management tools, found that three out of four IT professionals have no idea what unauthorized software might be running on their networks. The simplest scenario to manage and protect is one that is [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/survey-finds-most-networks-are-out-of-control/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Visibility and Control Still an Issue With BYOD Policies</title><link>https://www.iphere.com/visibility-and-control-still-an-issue-with-byod-policies</link> <comments>https://www.iphere.com/visibility-and-control-still-an-issue-with-byod-policies#comments</comments> <pubDate>Sat, 23 Jun 2012 14:14:00 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[BYOD]]></category> <category><![CDATA[Control]]></category> <category><![CDATA[Issue]]></category> <category><![CDATA[Policies]]></category> <category><![CDATA[Still]]></category> <category><![CDATA[Visibility]]></category> <guid
isPermaLink="false">http://www.iphere.com/visibility-and-control-still-an-issue-with-byod-policies</guid> <description><![CDATA[Sourcefire rolls out two mobile products to address potential security issues introduced by BYOD policies. Learn more about FireSight and FireAmp Mobile. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/visibility-and-control-still-an-issue-with-byod-policies/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Leap Motion Leapfrogs Kinect for Hands-Free PC Control</title><link>https://www.iphere.com/leap-motion-leapfrogs-kinect-for-hands-free-pc-control</link> <comments>https://www.iphere.com/leap-motion-leapfrogs-kinect-for-hands-free-pc-control#comments</comments> <pubDate>Wed, 23 May 2012 20:15:25 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Control]]></category> <category><![CDATA[HandsFree]]></category> <category><![CDATA[Kinect]]></category> <category><![CDATA[Leap]]></category> <category><![CDATA[Leapfrogs]]></category> <category><![CDATA[Motion]]></category> <guid
isPermaLink="false">http://www.iphere.com/leap-motion-leapfrogs-kinect-for-hands-free-pc-control</guid> <description><![CDATA[Microsoft didn’t set out to be in the business of motion control for PCs, but thanks to an uprising of resourceful hackers (in the good sense of the word), the Kinect motion sensing system originally developed for the Xbox 360 gaming console has been adapted for the cause. But, as Microsoft reluctantly embraces the new [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/leap-motion-leapfrogs-kinect-for-hands-free-pc-control/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Panzura Cloud Storage Gateway Refresh Delivers More Control</title><link>https://www.iphere.com/panzura-cloud-storage-gateway-refresh-delivers-more-control</link> <comments>https://www.iphere.com/panzura-cloud-storage-gateway-refresh-delivers-more-control#comments</comments> <pubDate>Sat, 12 May 2012 20:12:53 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Control]]></category> <category><![CDATA[Delivers]]></category> <category><![CDATA[Gateway]]></category> <category><![CDATA[More]]></category> <category><![CDATA[Panzura]]></category> <category><![CDATA[Refresh]]></category> <category><![CDATA[Storage]]></category> <guid
isPermaLink="false">http://www.iphere.com/panzura-cloud-storage-gateway-refresh-delivers-more-control</guid> <description><![CDATA[Panzura Global Cloud Storage System OS upgrade delivers more control, supports extended file system ACL, 50% more capacity and 10x better performance. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/panzura-cloud-storage-gateway-refresh-delivers-more-control/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Porticor&#8217;s Safe-Deposit Box Strategy Balances Data Control And Security In The Cloud</title><link>https://www.iphere.com/porticors-safe-deposit-box-strategy-balances-data-control-and-security-in-the-cloud</link> <comments>https://www.iphere.com/porticors-safe-deposit-box-strategy-balances-data-control-and-security-in-the-cloud#comments</comments> <pubDate>Sun, 19 Feb 2012 02:13:10 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Balances]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Control]]></category> <category><![CDATA[data]]></category> <category><![CDATA[Porticor's]]></category> <category><![CDATA[SafeDeposit]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Strategy]]></category> <guid
isPermaLink="false">http://www.iphere.com/porticors-safe-deposit-box-strategy-balances-data-control-and-security-in-the-cloud</guid> <description><![CDATA[Data at rest has long been protected by technology called public key infrastructure (PKI), in which data is encrypted when it&#8217;s created by a public key and only decrypted by the authorized person holding the private key. But data protection is complicated in cloud environments. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/porticors-safe-deposit-box-strategy-balances-data-control-and-security-in-the-cloud/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>