Users need application-aware networksNew Networks have to become app-aware if they are to provide demanding businesses with the performance they need, argues Cisco's engineering director.
A Linux primer for networkers If you need a network monitor, Linux on a spare PC is an ideal starting point - and it's nowhere as hard to get going as some might claim.
Know your wireless enemy Defending your WLAN is a lot easier if you know how it can be attacked.
Building the branch office from the ground up Sometimes there is no alternative to locating your branch IT within the branches themselves, but there is no reason why you need to manage it from within the branch as well.
The Mobile Edge - how to converge networks The mobile edge is a way of connecting users to information beyond the enterprise network perimeter. This white paper from Aruba discusses how it can be used to provide users with access to information and services wherever they need it - in head office or a branch office, at home and on the road.
SyncML links communications devices This platform-agnostic standard provides a way to synchronise servers and a wide range of clients - especially mobile devices - across a network.
Itheon Portable Network Consultant and Itheon QoS A well presented and simple to use tool that lets you gather IP traffic and performance data, report on the results, set off alerts when something goes wrong - and then diagnose the problem too.
A networking Swiss Army knife A set of tools for security testing, forensics, network reconnaissance and information gathering, plus everyday network analysis and diagnostics too.
Sunbelt's networked fail-over Double-Take allows you not just to replicate or mirror servers over the LAN, but you can fail-over and fail-back as well.
Cisco delivers 10Gig Ethernet to the closet If you want Gig Ethernet to the desktop, you probably need 10Gig to the closet, and that's just what Cisco's latest supervisor engine for its Catalyst 4500 switch is designed to deliver.
WatchGuard FireBox SSL VPN A simple VPN device for remote access that can be set up by non-experts. It grew on our reviewer.
Turning up the heat on identity managementNew HP's CTO for identity management explains why authentication and identity are such hot topics for anyone involved in building and managing networks, applications and systems.
A view from the networking trenches A veteran network administrator offers his thoughts on how to persuade bosses, support users, protect data and plan ahead.
Securing a US university's networkNew Berkeley's comms and network services director tells how the university is working to rebuild its reputation for IT excellence.
When your VoIP vendor goes bye-bye References and specs aren't enough; check the financials before hiring a company to do a major installation.