1). Cabling your home for computer network - still a requirement? By : cabling-design.com
Cabling your home for computer network - still a requirement?
With proliferation of wireless networking and communication equipment it is oh-so-tempting to cut the cord and save a significant sum of money in the process. But is everything that a regular computer networking user needs can be done using just wireless network? Let’s take ...
2). Cisco CCNA Exam Tutorial: The Best Time To Schedule Your Exam By : Chris Bryant
There’s one time and one time only to schedule your exam. Learn when that is from Chris Bryant, CCIE #12933.
3). Cisco CCNP / BSCI Certification Exam: Five OSPF Details You Must Know By : Chris Bryant
When it comes to the BSCI exam, you have to master a great many details to pass! Learn about five vital but overlooked OSPF details from Chris Bryant, CCIE #12933.
4). Cisco Certification: The Importance Of Building Your Own Practice Lab By : Chris Bryant
CCNA and CCNP candidates often hear that they need hands-on experience to excel on the exams. Chris Bryant, CCIE #12933, tells you why and how to get started building your own home lab.
5). Computer Consulting Profit Secrets By : Joshua Feinberg
Do you own or manage a computer consulting company? Are you having trouble growing your computer consulting company's profits?
If so, then you must learn how to focus on your computer consulting firm's profit and bottom line.
In this article, we'll look at 7 profit secrets and strategies you can use in your computer consu...
6). Computer Network Management By : Frank H.
Today it is almost inconceivable for a business not to have computers, whether it is a construction company or a high technology firm. When a business has more than one computer, they are almost always connected together in a local area network. These networks may be more or less advanced and therefore more or less costly.
7). Computer Networking Fundamentals By : Susan Jan
Computer network is an integral part of our daily lives, with the most important reason being that of communication.
8). Creating a Fool Proof Data Archive System with a Magnetic Tape Library By : Christine Harrell
Most businesses have laws and regulations for how long specific data must be stored, but still many companies don’t have a tape drive, tape libraries, secondary storage or any plan for archiving data.
9). Crime Fighting Computer Systems and Databases By : Sam Vaknin
As crime globalizes, so does crime fighting. Mobsters, serial killers, and terrorists cross state lines and borders effortlessly, making use of the latest advances in mass media, public transportation, telecommunications, and computer networks. The police - there are 16,000 law enforcement agencies in the Unites States alone - is never very far beh...
10). Does The Google Desktop Really Put Your Privacy In Jeopardy? By : Rob Sullivan1
There has been a lot of talk recently about Google Talk and how there are serious privacy concerns with the new application.
The biggest concern seems to come with the ability to search and share multiple computers with one account. In other words, you could use a single desktop search account to search, index and allow you to share fi...
11). Fiber Optics In The Real World By : James Croydon
Optic fibers are used widely in the medical field for diagnosing and treating a variety of ailments. Because optic fibers can be made extremely thin and made into flexible strands, they can be used for insertion into blood vessels, lungs and other parts of the body. Optic fibers have been enabling physicians to look and work inside the body through...
12). Finding Your MAC Address On Wired And Wireless Network Cards By : Darren Miller
The Answer To The Media Access Control Question
Over the past few weeks I have received quite a few e-mails about Ethernet cards, both wired and wireless, and more specifically, about Media Access Control (MAC) addresses. I think the main reason I’ve received so many questions about Ethernet cards and MAC ad...
13). How a Computer Consulting Business Can Help Your Company By : Joshua Feinberg
While many small companies only call in a local computer consulting business when something computer-related breaks, there's a lot to be gained by forging a proactive, long-term relationship with a local computer consulting business in your area.
Consider Getting Advice from a Computer Consulting Business
If you need to ge...
14). How Do Wireless Networks Work? By : John Maxim
Wireless networks work using radio waves instead of wires to transmit data between computers. That's the simple version. If you're curious to know what's going on in more detail, then it's all explained in this article.
Ones and Zeros.
I'm sure you know that computers transmit data digitally, using binary: ones and zeros. ...
15). How To Secure Your Wireless Network By : George Williams
People have more flexible time due to wireless network. Thanks to the invention of wireless. People can now work from home while taking care of their kids or doing house works. No more stress from traffic jam anymore. Is this great?
Well, there is something you should realize. Working from home while using a wireless local area network...
16). Intranet Implementation: The Advantages Of A Web-Based Solution By : -JD
The traditional approach to implementing an intranet is to purchase a software package, modify it for your needs, and install it on your system.
Over the past few years, another option has grown in popularity – the implementation of a web-based solution.
As you consider the choice between installed software and a web-based...
17). IT Networks: How to Argue for a Bigger Budget By : Joel Walsh, freelance writer
IT network managers have to fight the "if it ain't broke don't fix it" mindset to win resources. With computer networks, that mindset is dangerously complacent. IT networks will keep pumping data until they die or let in hackers. Here are some winning arguments against "if it ain't broke…"
IT Network Maintenance: Better Analogies
18). It's 12 Noon, Do You Know Who's Using Your Network? By : Jason Frovich
The idea of reading email while lounging by the pool, text or instant messaging while doing the laundry, or lounging in the Jacuzzi listening to your MP3 collection is appealing to us all.
Unfortunately, many, or even most, wireless units don't come with security features already functioning. This may not seem like a big issue to someo...
19). Link Load Balancing - Take a Load Off Annie By : Johnny Mayer
Link Load Balancing evens out critical resources on data networks with unpredictable requests issued to a server. For example, a web site with heavy traffic may employ two, three or more servers in a link load balancing program. The link load balancing routines enable a network to “juggle” more traffic that otherwise possible If one server i...
20). Network Monitoring for Serious eCommerce By : amabaie
In the real world, businesses come in every size, from self-employed entrepreneurs like me to mega malls like Wal-Mart.
On the Internet, companies come in every size, too, from a stand-alone ebook sales page with webmaster and owner all in one, to 300 pound gorilla like Amazon, with over a million pages, who requires the entire populat...
21). Network Training for Successful Network and System Management By : James Hunt
Big companies often have a large network that they need to manage and maintain. This type of system management requires staff that has a computer technical education as well as network training...
22). Networking With Fiber Cables By : James Croydon
Fiber cables form one of the most important parts of the networking industry today. Fiber cables are composed of one or more transparent optical fibers enclosed in a protective covering and strength members. Fiber cables are used to transmit data by the mode of light. Various types of fiber cables available are multimode duplex fiber cables, single...
23). Overcoming Small Business Networks Sales Objections By : Joshua Feinberg
Do you need help overcoming sales objections?
Do you sell computer networks, or other IT-related products and services to small businesses?
This article provides tips and hints so you can be overcoming the most common sales objections heard when selling networks to small business prospects, customers, and clients.
24). Password Unification By : Atlas-Tuesday
“Just because you’re big doesn’t mean you have to be dumb.” First let me point out I’m one of those life-long students. Not because if love college, but because I can never make up my mind on what I want to do. After making some big life changes I decided to take a full year away from school. Yesterday I ...
25). Peltier Associates Breaking and Fixing Wireless Security By : Kelly King
To the information security professional wireless networking may be thought of as a four letter word to be avoided at all costs. Regardless of the security implication wireless networking can provide cost efficiency, and because of that wireless technologies are here to stay. While many in the profession believe that wireless networks can be easily...
26). Personal Wireless with Bluetooth By : Joe Byrne
If you already have a wireless network for your computers, you may be very interested in what's coming next. Would you like it if your PDA, your mobile phone, your mp3 player and almost everything else you connect to your computer could be wireless too? It's already a reality...
Personal Area Network.
Using wireless networ...
27). Protect Your Network From Identity Theft Now! By : George Williams
It is deniable that our works and lives are more convenient and easier when using wireless. We can work anywhere and that is why wireless networks are becoming so popular. Especially if you have broadband Internet access, a wireless router can give you instant communication with the world.
Imagine you are sitting by the pool and enjoyi...
28). Reasons to Start a Wireless Network By : Lee Asher
As far as I'm concerned, wireless networks would have to rank as one of the best inventions in history. They really are the best thing since sliced bread. I mean, really, bread is easy enough to cut yourself, but have you ever tried to wire up a network? Its a lot of hard yakka as many would say.
WiFi is the wireless way to handle netw...
29). Router - Denial Of Service Attacks By : Michael Russell
Routers are not perfect. For that matter, nothing is. So if somebody wants to give a router more than it can handle there is a way to do this. We're going to take a look at what are called denial of service attacks.
A router can only handle so much information coming into it at one time. Every machine has its limits and routers are no...
30). Router - Tracing Your Packets By : Michael Russell
Few people will really care about the path that your packet takes when sending a message, but if you're one of those high tech egg heads then this article may be of great interest to you. It can become very addictive so proceed with caution.
If you're using a Microsoft Windows based operation system, then it's very easy to trace the r...
Browse Pages: 1