- Subscribe to this page:
- RSS
- Email Alert
networking
(75614 results)-
Whitepapers
Advanced persistent threats: not your average malware
August 13, 2012 12:00am PDT
Malware has evolved from nuisances to tools of criminal theft, corporate espionage and state-sponsored warfare. The problem is only getting worse as endpoint devices become increasingly mobile....
Provided by: Kaspersky Lab
-
Whitepapers
The 10 Commandments of BYOD
August 10, 2012 12:00am PDT
The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. Bring Your Own Device (BYOD) was born and employees followed with fervor....
Provided by: Fiberlink Communications
-
Webcasts
Live Webcast: Strategies for managing distributed IT environments
August 10, 2012 12:00am PDT
No matter how the IT landscape changes, protecting your network architecture continues to be extremely critical and unpredictable. Distributed networking and computing spaces often times go...
Provided by: APC by Schneider Electric
-
Q&A;
mac,linux vs window
August 8, 2012 6:05am PDT
mac,linux vs window how can linux ,mac interract with window With a network cable.... Interact in what way, file shares? AD integration? Details would be good Dropbox moves between all three...
3 Started by Bonclash | Latest comment by a.portman@...
-
Discussion Threads
Network Shares Group Policy configuration notes
August 7, 2012 1:57pm PDT
Network Shares Group Policy configuration notes article root Uses of Network Shares Group Policy We have too many shares that expose sensitive data, through the overuse of the "Authenticated...
1 Started by randy.baker@... |
-
-
Blog Post
Microsoft Surface: Arm CEO dismisses appeal of legacy software
August 7, 2012 7:28am PDT
Arm CEO Warren East has played down suggestions that sales of the Arm-powered Microsoft Surface tablet will be harmed by its lack of compatibility with legacy Windows software.
-
Blog Post
The pains and pitfalls of renewing SSL certificates--part 2
August 7, 2012 6:56am PDT
Older hardware may not support the changing requirements of the Web security industry. Mark Pimperton describes his renewal of the SSL certificate for a VPN appliance.
1
-
Whitepapers
DoS & DDoS in Named-Data Networking
August 7, 2012 12:00am PDT
With the growing realization that current Internet protocols are reaching the limits of their senescence, a number of on-going research efforts aim to design potential next-generation Internet...
Provided by: Cornell University
-
Blog Post
Disable guest DHCP with Hyper-V DHCP Guard
August 6, 2012 6:00am PDT
Rickatron shows a nice front-side technique to prevent a rogue DHCP server in your Hyper-V infrastructure.
1
-
Whitepapers
A Conservation-Law-Based Modular Fluid-Flow Model for Network Congestion Modeling
August 6, 2012 12:00am PDT
A modular fluid-flow model for network congestion analysis and control is proposed. The model is derived from an information conservation law stating that the information is either in transit,...
Provided by: KTH - Royal Institute of Technology
-
Whitepapers
Seamless Handover for IMS Over Mobile-IPv6 Using Context Transfer
August 6, 2012 12:00am PDT
Mobility support for the next generation IPv6 networks has been one of the recent research issues due to the growing demand for wireless services over internet. In the other hand, 3GPP has...
Provided by: University of Isfahan
-
Whitepapers
Uncertainty-Dependent Data Collection in Vehicular Sensor Networks
August 6, 2012 12:00am PDT
Vehicular Sensor Networks (VSNs) are built on top of Vehicular Ad-hoc NETworks (VANETs) by equipping vehicles with sensing devices. These new technologies create a huge opportunity to extend the...
Provided by: Silesian University of Technology
-
Whitepapers
A Framework for Ubiquitous IP Communications in Vehicle to Grid Networks
August 6, 2012 12:00am PDT
The electrical grid is a critical infrastructure that is slowly moving towards a more reliable and efficient supply system: the Smart Grid. As part of this migration process, a new group of...
Provided by: University of Waterloo
-
Whitepapers
Take Back The End Point
August 6, 2012 12:00am PDT
With mobile technology taking off, many businesses are having to figure out how they'll handle the inherent security vulnerabilities that come with it. Security was once about building firewalls...
Provided by: Kaspersky Lab
-
Whitepapers
Ten Ways the IT Department Enables Cybercrime
August 6, 2012 12:00am PDT
Running IT is no easy task. With things piling up, it's not difficult for something to slip through the cracks. Unfortunately, these slips ups can start piling up too. When that happens, your IT...
Provided by: Kaspersky Lab
-
Whitepapers
Link Scheduling for Throughput Maximization in Multihop Wireless Networks Under Physical Interference
August 4, 2012 12:00am PDT
The authors consider the problem of link scheduling for throughput maximization in multi-hop wireless networks. Majority of previous methods for this problem are still restricted to graph-based...
Provided by: Illinois Institute of Technology
-
Discussion Threads
Peanut Butter PC: Trying to keep kids safe
August 3, 2012 12:05pm PDT
Peanut Butter PC: Trying to keep kids safe article root Untangle is best While I dont want to be the internet police, there are certain parts of the internet that kids should not visit. I have an...
16 Started by Mark W. Kaelin | Latest comment by Matt Nawrocki
-
Whitepapers
Triggercast: Enabling Wireless Collisions Constructive
August 3, 2012 12:00am PDT
It is generally considered that concurrent transmissions should be avoided in order to reduce collisions in wireless sensor networks. Constructive Interference (CI) envisions concurrent...
Provided by: Tsinghua University
-
Downloads
Get Three Top Tools to Fight Network Bandwidth Hogs - FREE!
August 3, 2012 12:00am PDT
With SolarWinds, managing the performance and security of your network, servers, applications, websites, virtual machines and storage devices has never been easier or more affordable. To prove it...
Provided by: SolarWinds
-
Whitepapers
IDC White Paper: Business Value of Managed Services
August 3, 2012 12:00am PDT
Many organizations invested years ago to automate how they interact and integrate with business network partners. Regardless, they are finding a need to reassess B2B integration to improve their...
Provided by: IBM

































