Puppet is model-driven, Ruby is procedural, and both are large, messy, open source ecosystems plagued with pitfalls
WordPress may be a popular CMS, but its built-in backup isn't ideal. Here are 10 plugins that can help you keep your entire site safe.
The newest Wi-Fi technology -- 802.11ac -- promises blazing speeds of up to 1.3Gbps, according to claims made by the leading vendors.
During our review of 802.11ac routers, some of the vendors sent along additional products that they thought we might be interested in. Here are short reviews of four WiFi tools that you might find useful in your network.
The Cisco UCS Express family is a new set of blades that add high-performance general-purpose Intel server capabilities to the ISR G2 series of routers.
The Cisco CSR 1000V router is designed for enterprise network managers who want to have a little piece of their Cisco infrastructure in the cloud.
In the early days of Wi-Fi, site surveys were fairly basic and involved running around with a laptop looking at simple signal levels. The next step was mapped-based tools that provided a good visual of Wi-Fi coverage, but still involved carrying a bulky laptop around.
ScienceLogic EM7 brings ultraflexible, ultrascalable, carrier-grade network monitoring to the enterprise
Samba's open source alternative to Microsoft's domain controller is a good start, but not ready for prime time
DD-WRT, Tomato, OpenWRT, M0n0wall, PfSense, and Vyatta suit a wide range of devices and networking needs
Deploying the enterprise mode of Wi-Fi Protected Access (WPA2) with 802.1X authentication provides great Wi-Fi security, but complicates the client configuration and connection process. In bring-your-own-device (BYOD) environments, this can cause user frustration and a spike in help desk calls. The solution is to deploy an automated configuration process so users can easily connect their devices without invention from IT staff.
When we tested mobile device management (MDM) last year, the products were largely focused on asset management - provisioning, protecting and containing mobile devices.
Silver Peak VX virtual appliance matches physical WAN appliances in both features and performance
When we did a roundup of Network Attached Storage devices seven years ago, the products boasted an amazing (for the time) 1TB of disk space. This time around, we're testing six units that sport 8TB or larger storage capacities. While the disk space has exploded, the investment remains modest, sometimes at a lower actual dollar figure than the first batch back in 2005.
We take a close look at 3.0, the latest version of the open-source content-management system, which offers a new implementation that helps site developers design for the mobile platform.
Lenovo's new ThinkPad X1 Carbon ultrabook is fast, stylish and lightweight, although the price is slightly higher than some of its rivals.
With serious data breaches occurring on almost a daily basis, concerns about data protection have skyrocketed. While some experts believe endpoint breaches may no longer comprise the majority of data leaks, the intentional or unintentional release of sensitive data from endpoints within an organization, whether by employees, contractors or guests, remains a serious problem that data loss prevention (DLP) products seek to address.
In principle, the use of a Wi-Fi signal for location and tracking is simple. There's no need for the approach used in RADAR, generating and bouncing a signal off of the object to be located or tracked, because Wi-Fi-equipped devices are usually transmitting data, and with that unique information identifying a given station. Once a given environment is installed with sensors or access points, as required to meet the specifications of a given solution, and any calibration required to tell the infrastructure what to expect when signals are sent from a known location - a form of RF fingerprinting, if you will - you're good to go.
The next revision of Office adds touches of Metro without itself being a Metro app
With the revamped System Center 2012 suite of management tools, Microsoft has launched a powerful new weapon in the battle to control the virtualized data center and the cloud, both private and public.