SOFTWARE LISTING:
The Cisco Catalyst® 2950 Series Intelligent Ethernet switches is an affordable line of fixed-configuration Fast Ethernet and Gigabit Ethernet switches that extend intelligence to the metro access edge.
EGUIDE:
This expert guide discusses why physical networks don’t cut it for the cloud, addressing multi-tenancy in the private cloud and the cloud VLAN challenge.
WHITE PAPER:
In this whitepaper you will learn about the evolution of Ethernet, the reasons VLANs were introduced, and the ways that VLANs can be used.
PRESENTATION TRANSCRIPT:
In this presentation transcript, get help setting goals for your network before jumping into server virtualization, and discover how these goals can be applied to any sized business. Gain insight on connecting your network to a disaster recovery network, and considerations to make when migrating to the cloud.
EGUIDE:
Access this Tech Guide from SearchNetworking.com to learn how you can update your campus LAN to address the modern needs of your network, including application delivery and mobility.
WHITE PAPER:
In this white paper, we will address the basics of this Layer 2 technology and help you get your network switch up and running. For our examples, we will use Cisco's 2950 switch.
EGUIDE:
This Tech Guide from SearchNetworking.com explores emerging network virtualization protocols and strategies, and uncovers the need for software-defined networking in cloud environments.
EZINE:
This month's issue Network Evolution takes a hardcore look at the hybrid cloud horizon to explore the future possibility of networking across disparate clouds.
EBOOK:
Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
WHITE PAPER:
Enterprises are increasingly facing the task of integrating a variety of access services and devices onto their Virtual Private Networks (VPN). This white paper takes a closer look at some key issues that arise when bringing access methods into your VPN.