- Nexusguard enlists Australian service providers for DDoS defences
- RedHat security finds multiple network devices leak ‘RSA-CRT’ keys
- Despite reports of hacking, baby monitors remain woefully insecure
- Check Point’s SandBlast sandbox spells R.I.P for ROP attacks
- Employees put business data at risk by installing gambling apps on their phones
Network management - News, Features, and Slideshows
Network management in pictures
Ross Derewianko is a systems administrator for <a href="https://www.pingidentity.com/en.html">Ping Identity</a>, a maker of cross-platform identity management and security software. We spoke to him on <a href="http://sysadminday.com/about-sysadmin-day/sysadwhat/">SysAdmin Day</a> to get his thoughts on the holiday and on his job.
Lame jokes about IT support have been around since businesses started using computers, flying in both directions users are dumb, IT is lazy, "did you actually plug it in," "did you try turning it off and turning it back on again," and so on.
Google has alerted users of its <a href="https://developers.google.com/speed/pagespeed/">PageSpeed Service</a> for making websites zippier that it will be killing off the tools as of Aug. 3.
The confluence of mobile, social and big data trends are driving a tectonic transformation and businesses that do not change with these trends will be left behind, analysts from research firm IDC said at Interop 2015.
This week's Interop agenda includes more than 125 sessions covering topics as wide ranging as a status update on the latest trends in software defined networking (SDN) to tips for new application development and delivery methods, infrastructure management, and the pervasive issues of security and mobile workers.
Managing modern networked systems and applications is daunting because infrastructure is complex and things can go wrong in so many parts of the technology stack -- servers, storage, network devices, applications, hypervisors, APIs, DNS, etc. How can you address the challenge?
In the previous column on hacking PingPlotter I discussed how you can use the tool's Web interface and the curl utility to add targets to be tracked, for example, to add a single host you would enter the following on the command line:
An easy step-by-step guide to the Bash command-line shell and shell scripting
We're at an awkward stage as the age of network-streamed multimedia matures. Broadband and cell providers have only recently realized the public's enormous appetite for streaming video, VoIP, and the combination of both.
Network-attached storage (NAS) can make your business easier to run and more efficient in multiple ways.
Laptops used to be the only devices on the company's wireless network. But Wi-Fi has become a ubiquitous standard used by a host of devices -- including desktop PCs, laptops, netbooks, tablets, smartphones, printers, storage devices, and projectors.
Mac OS X 10.7 Lion Server adds innovative features and a new low price tag, but cuts in services and the elimination of advanced GUI administration tools may force some enterprise departments to think twice about the role of Mac servers on their networks.
Major Websites are to test Internet Protocol version 6 (IPv6) by participating in World IPv6 Day, scheduled for June 8. Google, Facebook, and Yahoo, among others, have agreed to ensure that IPv6 entrances to their sites will be available, along with any network infrastructure needed to receive IPv6 traffic.
Home is where the network is: That's the mantra of networking vendors at the Consumer Electronics Show 2011 in Las Vegas this week.
In recent weeks WikiLeaks has been targeted by denial-of-service (DoS) attacks, had its hosting service shutdown, been bounced off of Amazon hosting, had its funding through PayPal, MasterCard and other sources shut down, and its leader arrested on sexual assault-related charges. The fact that WikiLeaks remains stubbornly and defiantly online holds some lessons for other sites when it comes to resilience and survivability.
Whitepapers about Network management
When IT organizations set up private cloud computing environments, it creates a new set of network monitoring challenges that traditional network management tools are unable to address. This white paper details how network management can go beyond just looking at the performance of individual nodes or components to providing holistic Business Service Monitoring (BSM) capabilities.
- Cloud shaking up Australian data centre market: Frost & Sullivan
- Google, Apple $415M deal with tech workers gets final approval
- For future wearables, the network could be you
- ACLU urges court to block NSA's continued phone records collection
- Microsoft browser users kick older IE editions to the curb
- How Greenstone is uniting IT/marketing in the name of audience management
- Rakuten Marketing chalks up rapid Aussie digital advertising growth
- Paid endorsements get Xbox One marketer in trouble with FTC
- Report: Big data analytics delivers revenue dividends
- CMO Interview: Unleashed's Anthony Mordech on the software marketing evolution