This blog is created to discuss all things related to the world of networking. Desgin, installation and configuration of networks. Maintenance and monitoring of networks and discussion of latest networking related technologies.
EMC Data Protection enables businesses to accelerate IT Transformation through a Protection Storage Architecture that brings together backup, DR and archiving to increase scalability while driving down complexity and cost. Avoid accidental architectures that will slow your business down. Learn more.
1994: It was a simpler time, when IBM sold an operating system called OS/2 version 3.0 (a.k.a. OS/2 Warp) and corporate lawyers could plausibly imagine people venturing onto the Internet and being shocked - shocked! - to find "objectionable" content there. READ MORE
Find out what steps to take that can lead your organization down the smooth path to SAM deployment. This SAM primer can help you and your organization mitigate software non-compliance issues and optimize software license management while containing costs. Read Now
Distributed denial-of-service attacks against financial firms and other industries have been mounting, so today the Cloud Security Alliance (CSA) announced it is establishing the Anti-Bot Working Group to help fight this threat. READ MORE
HP this week released the 13.5 version of its cloud platform, which is the software that serves as the basis for the company's public cloud offering. Toward the bottom of a note about new features, HP mentions something quite interesting: HP's cloud no longer inherently supports Amazon Web Service's cloud Elastic Compute Cloud (EC2). It may not sound like a big deal, but it marks a strategic shift... READ MORE
JPMorgan Chase & Co. has said they plan to issue breach notifications to nearly 500,000 customers, or two percent of the bank's 25 million UCard users, after hackers breached their network in July. However, because there's no evidence that funds were stolen, the bank will not issue replacement cards. READ MORE
Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more efficient and effective investigations. Learn More.
Just when IT execs are getting a handle on how to accommodate employees' personal smartphones and tablets in the workplace, the technology industry has thrown up a new challenge -- wearable computers. READ MORE
In this paper, we highlight the common reasons why midsize companies often do not realize significant ROI with their ERP system implementations and suggest solutions for getting the most value from their applications. Learn More.
Whether you receive a phishing email inviting you to click on a specific link or whether you stumble upon it while Web surfing, here are 10 types of links you should never click on.
JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).