- Best Practices for Deploying Secure Cisco IP Telephony Solutions
- Oct 31, 2012
- Akhil Behl offers a brief discussion of why it's important to secure IP Telephony Networks, how to go about it, and the actual deployment thereof.
|
- Best Practices for Designing a Nagios Monitoring System
- Mar 23, 2007
- David Josephsen provides important advice to help you to make important network monitoring design decisions.
|
- Big Data Analysis with MapReduce and Hadoop
- Jan 9, 2013
- Steven Haines presents an overview of Hadoop’s architecture and demonstrates, from a high-level, how to build a MapReduce application.
|
- BIND 9's New Resource Records
- Nov 20, 2000
- DNS's new version of BIND, BIND 9, implements two new Resource Records to help you take DNS to an advanced level. Learn about them quickly in this article.
|
- Bluetooth FAQs
- Nov 13, 2000
- Several lists of frequently asked questions, or FAQs, can be found on the subject of BluetoothTM wireless communication. Here, Brent A. Miller, an authority on this subject, offers his own Bluetooth FAQs.
|
- Bluetooth Resources: Where to Begin
- Nov 13, 2000
- BluetoothTM wireless communication authority Brent A. Miller presents an informal bibliography of information sources about this new technology and discusses resources that may assist those who are new to the technology and want to learn more about ...
|
- Bluetooth Security Risks in Business
- May 9, 2008
- Nico Darrow tells you how to keep yourself safe from Bluetooth hackers.
|
- Bluetooth Technology and SIG Overview
- Nov 13, 2000
- BluetoothTM wireless communication is a very hot topic in computing, telecommunications, and other industries. Here, author Brent A. Miller provides an introduction to the technology and the organization behind it, as found in Bluetooth Revealed, the ...
|
- Bluetooth™ and Other Wireless Technologies
- Nov 30, 2001
- In this article, derived from the author’s book Bluetooth Revealed, Second Edition, Bluetooth wireless communication authority Brent A. Miller compares Bluetooth wireless communication with other wireless technologies.
|
- Bluetooth™ Qualification Program Overview
- Nov 30, 2001
- In this article, derived from the author’s book Bluetooth Revealed, Second Edition, Bluetooth wireless communication authority Brent A. Miller presents an overview of the Bluetooth qualification program (BQP).
|
- Bluetooth: Unifying the Telecommunications and Computing Industries
- Jul 5, 2002
- Examine how Bluetooth wireless technology is setting the stage for the next step in the information technology revolution. Learn about the Personal Area Network (PAN), piconets and scatternets, and how Bluetooth will enable devices to communicate seamlessly through a standardized communications subsystem.
|
- Bluetooth: Why all the hype?
- Nov 13, 2000
- In this opinion piece, BluetoothTM wireless communication expert Brent A. Miller discusses potential reasons why that technology has garnered so much publicity and industry interest.
|
- Book Review: "Deploying Wireless WANs" and Interview with Jack Unger
- Mar 14, 2003
|
- Border Gateway Protocol, Route Manipulation, and IP Multicast
- Oct 26, 2007
- Prepare for the CCDA exam by reviewing BGP, Route Manipulation, and IP Multicast.
|
- Botnets II: Emerging Threats, Tactics, and Defenses
- Dec 19, 2008
- Carolyn Meinel describes some of the more promising efforts to combat threats from botnets.
|
- Botnets, Part 1: Why They Strike and How to Defend Against Them
- Dec 5, 2008
- Carolyn Meinel describes the threats posed by increasingly sophisticated botnets and dives into some of the latest technology designed to stop them.
|
- Breaking Unwanted TCP Connections by Modifying Your Route Table
- Dec 6, 2001
- Kyle Cassidy and Richard Cardona give you a quick-and-dirty explanation on route tables, to help you take advantage of a free and simple way to block unwanted traffic to specific IP addresses or subnets.
|
- Broadband Routers and Firewalls
- Nov 17, 2006
|
- Building a Human Firewall: Raising Awareness to Protect Against Social Engineering
- Oct 27, 2006
- Thierry Wohnlich proposes an alternate view of information security awareness, a view that takes into consideration the reasons behind the need for awareness, and discusses the role of the individuals in relation to information technology.
|
- Building a MapReduce Application with Hadoop
- Jan 16, 2013
- In the second article in this series on Java programming and Hadoop, Java programming expert Steven Haines explains what a MapReduce application is and how to build a simple one.
|