<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Practices</title> <atom:link href="https://www.iphere.com/tag/practices/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Evaluating Networking Products: Best Practices to Get Behind the Sales Pitch</title><link>https://www.iphere.com/evaluating-networking-products-best-practices-to-get-behind-the-sales-pitch</link> <comments>https://www.iphere.com/evaluating-networking-products-best-practices-to-get-behind-the-sales-pitch#comments</comments> <pubDate>Tue, 25 Feb 2014 02:12:49 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Behind]]></category> <category><![CDATA[Best]]></category> <category><![CDATA[Evaluating]]></category> <category><![CDATA[networking]]></category> <category><![CDATA[Pitch]]></category> <category><![CDATA[Practices]]></category> <category><![CDATA[Products]]></category> <category><![CDATA[Sales]]></category> <guid
isPermaLink="false">http://www.iphere.com/evaluating-networking-products-best-practices-to-get-behind-the-sales-pitch</guid> <description><![CDATA[Many lower-cost networking products claim to do the same thing as high-end gear without the high price tag. Here&#8217;s how to get more information before you dive into a misguided pilot project or prematurely dismiss an acceptable alternative. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/evaluating-networking-products-best-practices-to-get-behind-the-sales-pitch/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Private Cloud Infrastructure Design: Go Beyond Best Practices</title><link>https://www.iphere.com/private-cloud-infrastructure-design-go-beyond-best-practices</link> <comments>https://www.iphere.com/private-cloud-infrastructure-design-go-beyond-best-practices#comments</comments> <pubDate>Tue, 19 Jun 2012 14:14:42 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Best]]></category> <category><![CDATA[Beyond]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Design]]></category> <category><![CDATA[Infrastructure]]></category> <category><![CDATA[Practices]]></category> <category><![CDATA[Private]]></category> <guid
isPermaLink="false">http://www.iphere.com/private-cloud-infrastructure-design-go-beyond-best-practices</guid> <description><![CDATA[Are you designing a private cloud infrastructure? Best practices are a crutch&#8211;start with current recommended practices, ask yourself why, and more tips for building a private cloud. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/private-cloud-infrastructure-design-go-beyond-best-practices/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>5 Secure Switch Management Best Practices</title><link>https://www.iphere.com/5-secure-switch-management-best-practices</link> <comments>https://www.iphere.com/5-secure-switch-management-best-practices#comments</comments> <pubDate>Thu, 29 Mar 2012 14:12:58 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Best]]></category> <category><![CDATA[Management]]></category> <category><![CDATA[Practices]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[Switch]]></category> <guid
isPermaLink="false">http://www.iphere.com/5-secure-switch-management-best-practices</guid> <description><![CDATA[One of the easiest things an organization can do to help increase the security posture of their infrastructure is to implement a policy and standard for secure management. Often overlooked, or not fully executed, this is what I consider to be the low hanging fruit of network security. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/5-secure-switch-management-best-practices/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Cisco And Deloitte Wrong: Good Practices More Impactful Than Vendor Choice</title><link>https://www.iphere.com/cisco-and-deloitte-wrong-good-practices-more-impactful-than-vendor-choice</link> <comments>https://www.iphere.com/cisco-and-deloitte-wrong-good-practices-more-impactful-than-vendor-choice#comments</comments> <pubDate>Wed, 22 Feb 2012 02:13:36 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Choice]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[Deloitte]]></category> <category><![CDATA[Good]]></category> <category><![CDATA[Impactful]]></category> <category><![CDATA[More]]></category> <category><![CDATA[Practices]]></category> <category><![CDATA[Than]]></category> <category><![CDATA[Vendor]]></category> <category><![CDATA[Wrong]]></category> <guid
isPermaLink="false">http://www.iphere.com/cisco-and-deloitte-wrong-good-practices-more-impactful-than-vendor-choice</guid> <description><![CDATA[Cisco is fighting back against the notion that a multi-vendor network can simplify operations and reduce TCO. The networking giant commissioned a report by Deloitte that finds operation costs will increase over the life of the equipment in a network that uses equipment from disparate vendors. The fact is, one vendor vs. multiple vendors is [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/cisco-and-deloitte-wrong-good-practices-more-impactful-than-vendor-choice/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>The Cloud Security Alliance Looks To Bring Transparency To Security Practices</title><link>https://www.iphere.com/the-cloud-security-alliance-looks-to-bring-transparency-to-security-practices</link> <comments>https://www.iphere.com/the-cloud-security-alliance-looks-to-bring-transparency-to-security-practices#comments</comments> <pubDate>Wed, 10 Aug 2011 20:14:38 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Alliance]]></category> <category><![CDATA[Bring]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Looks]]></category> <category><![CDATA[Practices]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Transparency]]></category> <guid
isPermaLink="false">http://www.iphere.com/the-cloud-security-alliance-looks-to-bring-transparency-to-security-practices</guid> <description><![CDATA[The Cloud Security Alliance, which is looking to gather up information on how cloud service providers are securing their services. The truth of the matter is that it is not secrecy that builds effective security; it is adopting and adhering to best practices and standards that create a secure environment. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/the-cloud-security-alliance-looks-to-bring-transparency-to-security-practices/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>