<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Part</title> <atom:link href="https://www.iphere.com/tag/part/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>SDN Strategies Part 2: Cisco, Arista, HP</title><link>https://www.iphere.com/sdn-strategies-part-2-cisco-arista-hp</link> <comments>https://www.iphere.com/sdn-strategies-part-2-cisco-arista-hp#comments</comments> <pubDate>Wed, 16 Apr 2014 02:16:17 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Arista]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Strategies]]></category> <guid
isPermaLink="false">http://www.iphere.com/sdn-strategies-part-2-cisco-arista-hp</guid> <description><![CDATA[In the second part of this series examining vendors&#8217; SDN products, I look at Cisco ACI, Arista&#8217;s programmable approach, and HP&#8217;s commitment to OpenFlow. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/sdn-strategies-part-2-cisco-arista-hp/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>SDN Strategies Part 1: Vendors Vie For Market, Mindshare</title><link>https://www.iphere.com/sdn-strategies-part-1-vendors-vie-for-market-mindshare</link> <comments>https://www.iphere.com/sdn-strategies-part-1-vendors-vie-for-market-mindshare#comments</comments> <pubDate>Mon, 14 Apr 2014 20:13:51 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Market]]></category> <category><![CDATA[Mindshare]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Strategies]]></category> <category><![CDATA[Vendors]]></category> <guid
isPermaLink="false">http://www.iphere.com/sdn-strategies-part-1-vendors-vie-for-market-mindshare</guid> <description><![CDATA[It&#8217;s a land grab in the software-defined networking market, with heavyweights and startups rolling out an array of technologies for automating the network. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/sdn-strategies-part-1-vendors-vie-for-market-mindshare/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Building An Information Security Policy Part 3: Logical And Physical Design</title><link>https://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design</link> <comments>https://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design#comments</comments> <pubDate>Thu, 20 Mar 2014 02:19:30 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Design]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Logical]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Physical]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design</guid> <description><![CDATA[Careful crafting of the logical and physical aspects of a network is essential for an effective security policy. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Building An Information Security Policy Part 2: Hardware and Software</title><link>https://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software</link> <comments>https://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software#comments</comments> <pubDate>Fri, 28 Feb 2014 02:14:33 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Hardware]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Software]]></category> <guid
isPermaLink="false">http://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software</guid> <description><![CDATA[Here&#8217;s how to select the right network device hardware and software to support your security policy. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Building an Information Security Policy Part 1: Network Devices</title><link>https://www.iphere.com/building-an-information-security-policy-part-1-network-devices</link> <comments>https://www.iphere.com/building-an-information-security-policy-part-1-network-devices#comments</comments> <pubDate>Wed, 19 Feb 2014 20:13:58 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Devices]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Network]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/building-an-information-security-policy-part-1-network-devices</guid> <description><![CDATA[An effective security policy requires careful planning to ensure the roles and capabilities of routers, switches and firewalls are properly configured. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/building-an-information-security-policy-part-1-network-devices/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>802.11ac Wi-Fi Part 4: Road Map Deployment Strategies</title><link>https://www.iphere.com/802-11ac-wi-fi-part-4-road-map-deployment-strategies</link> <comments>https://www.iphere.com/802-11ac-wi-fi-part-4-road-map-deployment-strategies#comments</comments> <pubDate>Fri, 07 Feb 2014 20:14:40 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[802.11ac]]></category> <category><![CDATA[Deployment]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Road]]></category> <category><![CDATA[Strategies]]></category> <category><![CDATA[WiFi]]></category> <guid
isPermaLink="false">http://www.iphere.com/802-11ac-wi-fi-part-4-road-map-deployment-strategies</guid> <description><![CDATA[Here&#8217;s a look at how companies are migrating to the new Wi-Fi standard and tips for laying the groundwork for 11ac Wave 2 products. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/802-11ac-wi-fi-part-4-road-map-deployment-strategies/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>802.11ac Wi-Fi Part 3: Adoption</title><link>https://www.iphere.com/802-11ac-wi-fi-part-3-adoption</link> <comments>https://www.iphere.com/802-11ac-wi-fi-part-3-adoption#comments</comments> <pubDate>Wed, 05 Feb 2014 08:18:21 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[802.11ac]]></category> <category><![CDATA[Adoption]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[WiFi]]></category> <guid
isPermaLink="false">http://www.iphere.com/802-11ac-wi-fi-part-3-adoption</guid> <description><![CDATA[Experts expect sales of products based on the new Wi-Fi standard to surge this year as enterprises look to increase WLAN capacity. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/802-11ac-wi-fi-part-3-adoption/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>802.11ac Wi-Fi Part 2: Wave 1 and Wave 2 Products</title><link>https://www.iphere.com/802-11ac-wi-fi-part-2-wave-1-and-wave-2-products</link> <comments>https://www.iphere.com/802-11ac-wi-fi-part-2-wave-1-and-wave-2-products#comments</comments> <pubDate>Thu, 30 Jan 2014 20:20:53 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[802.11ac]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Products]]></category> <category><![CDATA[Wave]]></category> <category><![CDATA[WiFi]]></category> <guid
isPermaLink="false">http://www.iphere.com/802-11ac-wi-fi-part-2-wave-1-and-wave-2-products</guid> <description><![CDATA[Here&#8217;s what you&#8217;ll find in today&#8217;s 802.11ac certified products, and a peek at what future 802.11ac Wave 2 products may offer. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/802-11ac-wi-fi-part-2-wave-1-and-wave-2-products/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>802.11ac Wi-Fi Part 1: Building Blocks</title><link>https://www.iphere.com/802-11ac-wi-fi-part-1-building-blocks</link> <comments>https://www.iphere.com/802-11ac-wi-fi-part-1-building-blocks#comments</comments> <pubDate>Mon, 27 Jan 2014 20:13:17 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[802.11ac]]></category> <category><![CDATA[Blocks]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[WiFi]]></category> <guid
isPermaLink="false">http://www.iphere.com/802-11ac-wi-fi-part-1-building-blocks</guid> <description><![CDATA[The new Wi-Fi standard builds on 802.11n for gigabit-speed WLANs. Here are some of 802.11ac&#8217;s major enhancements. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/802-11ac-wi-fi-part-1-building-blocks/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>IaaS Performance Benchmarks Part 8: HP Public Cloud</title><link>https://www.iphere.com/iaas-performance-benchmarks-part-8-hp-public-cloud</link> <comments>https://www.iphere.com/iaas-performance-benchmarks-part-8-hp-public-cloud#comments</comments> <pubDate>Tue, 14 Jan 2014 02:15:38 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Benchmarks]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[IaaS]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Performance]]></category> <category><![CDATA[Public]]></category> <guid
isPermaLink="false">http://www.iphere.com/iaas-performance-benchmarks-part-8-hp-public-cloud</guid> <description><![CDATA[As part of my project comparing IaaS services, I tested HP Public Cloud and looked at how HP&#8217;s service compared with those from other IaaS providers. Here&#8217;s what I found. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/iaas-performance-benchmarks-part-8-hp-public-cloud/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>