Wireless LAN infrastructure continues to grow, up 14 percent year over year. Market research firm Dell'Oro breaks down the numbers.
Showing results 1 to 20 of 25
IT infrastructure library guidelines remain relevant but need more examples on implementation and reflect current trends such as cloud and mobility, urge observers.
Hewlett-Packard unveiled plans to take its Converged Infrastructure product lines and prepackage them to speed up implementation.
IBM has hitched its smarter cities bandwagon to the Queensland University of Technology (QUT), teaming up to handle the implementation challenges of deploying intelligent transport infrastructure.
As the government sets a deadline for negotiations with Telstra on the terms under which it would move its customers and infrastructure into the National Broadband Network (NBN), financial-services firm Goldman Sachs JBWere (GSJBW) has said that the newly released NBN implementation study "erodes" Telstra's bargaining position.
As first reported on ZDNet.com.au, NBN Co has selected Oracle as its lead software provider, adding IBM for infrastructure hosting and Accenture for implementation and support.
BES Express is intended for SMEs that want to use the BlackBerry infrastructure, but don't need its more advanced features
AirMagnet, the wireless LAN infrastructure monitoring company bought earlier this year by Fluke, has announced today a version of its monitoring system specifically designed for 802.11n.
At the Green:Net conference in San Francisco, John Clark of GridPoint and Richard Lowenthal of Coulomb Technologies discuss how the largest obstacle for next-generation electric cars is standards. The executives believe that standards in IT infrastructure and the power grid are necessary for any successful large implementation.
Akamai disputes Limelight Networks' take on its infrastructure and my recent post, Limelight Networks: Why the Olympics didn't 'Melt' the Internet. Limelight, however, says its implementation facts are accurate and that it absolutely stands behind its words.
One of the biggest problems with wireless LAN security standards is the lack of an intermediate solution. Your only choices in securing a wireless LAN were to deploy enterprise grade WPA wireless LAN security which requires RADIUS (Remote Authentication Dial In User Service) servers in addition to a PKI (Public Key Infrastructure) or you deployed shared secret technology using WPA-PSK.
Yesterday, I asked for people to share their thoughts via a guest blog on virtualization in Ed Tech. Guest blogger Erik Josowitz provided us with the following (thanks, Erik). Feel free to talk back or submit your own guest blog with some specific experiences or implementation details. Virtualization is great tool but, like any Swiss-Army knife, success with it depends on the task at hand. One of the places that people get into trouble with virtualization is when they try to use out-of-the-box virtual infrastructure with non-technical audiences. Virtualization is a great solution but often is not a complete solution.In education we've frequently seen challenges that look like appropriate places to implement a virtualization solution, only to find that the end-result is not fully usable by the intended audience. One example is providing hands-on lab environments to support application training. Success in the workforce today depends on high-level application skills and there is no better way for students to attain those skills than through hands-on use of the software applications. Many educational institutions provide computer lab environments to help support their student population and provide access to necessary software applications. Many of these lab environments have become the source of IT management problems as they become virus-ridden, get subverted as distribution sites for pirated software or music, or just plain have the normal IT management issues associated with a shared resource in a public environment. For many institutions their student population brings with them their own PCs which solves one problem but creates another. The lab issues diminish but the problems of providing secure access to software (and software licenses) often takes its place.The answer, we've found, is virtual lab management - using virtualization to deliver secure computing environments as a shared resource. Virtual labs allow administrators to serve up a clean and unchangeable environment for each student - in the lab or on their own PC - on-demand. This makes it easy to provide access to applications that students either can't afford individually or that their home PCs cannot support. It makes it simple to track and monitor lab usage and to control the use of resources so that systems are not subverted into file servers. Virtual lab management sits on top of virtualization (from Microsoft or VMware) and tells it what to deliver and to who. It makes it easy for non-technical users to select the types of applications they need from a menu and to gain access to those environments without needing to understand virtualization, networking, hosts systems or anything about how it gets delivered. Best of all, virtual labs make it easy to manage capacity. By scheduling time in the lab environment the shared resource is managed for maximum utilization. If more capacity is needed it is simple to add additional resources to the system. The end-users simply see an increase in availability.Virtualization may not be a panacea for educational institutions, but for a subset of problems, a centralized virtual lab may enable technology administrators to focus their time and attention on enabling learning rather than administering systems.
One of the touted features of the $200 OLPC laptop is the peer-to-peer mesh topology networking feature that can theoretically bring an Internet infrastructure where there is no network infrastructure. The problem is that peer-to-peer wireless LAN mesh topology sounds better than it actually works and there's a good reason it isn't used commercially.
This is an excellent tool for replicating virtual machines (VMs) running on VMware ESX Server 3.x and VirtualCenter 2.x. Although the suite is relatively new, impressive usability features hint at Double-Take’s long history in replication.
In a guest post, Stephen Walli -- a software consultant specializing in open-source, and a former Microsoft program manager for the Shared Source implementation of the ECMA Common Language Infrastructure -- shares his two cents on Microsoft's recent open-source-related moves.
Insurance Australia Group (IAG) has cut down its server count by 600 machines over the past 12 months through the implementation of virtualisation software. IAG head of infrastructure Andrew Cresp said the company currently ran 900 servers after struggling with 1,500 around a year ago in its primary datacentre in Melbourne.
One of the fastest ways for hackers to breech security systems is to circumvent Layer 2 which is your LAN switching infrastructure. Unfortunately that also happens to be one of the most overlooked aspects of Information Security with most security audits focusing on policy and compliance issues on the upper layers of the stack.
Virgin Blue is implementing a new service management system this month as the airline moves towards adopting the Information Technology Infrastructure Library (ITIL) framework.Virgin Blue general manager of information technology, Nick Brant, said the airline had purchased BMC's Remedy service management software at the start of the year -- following a tender -- and was in the final stages of implementation.
The wireless LAN market is expanding year after year along with the rapid spread of broadband infrastructure, Research and Market says. Recent advances in technology have made commercial deployments of wireless networks possible, opening up a potentially huge business opportunity.
A recent survey by In-Stat/MDR has led the high-tech market research firm to conclude that Wireless Local Area Networks (WLANs) are moving beyond simply being an "overlay" to the wired LAN, to becoming a more pervasive and integral part of business customers' network infrastructure.