Networks Whitepapers

Enterprise Wireless LAN Testing

Novarum conducted performance tests with current enterprise 802.11ac wireless LAN systems from Aruba and Cisco. This testing goes beyond simple drag race throughput tests by looking at real world scenarios involving high-density throughput and client roaming as well as real applications including VLC media streaming.

Preparing your network for the mobile onslaught

The smart phone. The laptop. The tablet computer and the e-reader. These mobile devices are sparking what IDC terms a technological “hyper disruption”—a massive platform shift that occurs only four or five times a century. Cisco estimates that the number of mobile-connected devices now exceeds the earth’s population.

Deriving business value from the Internet of Things

Today, billions of devices, sensors and chips—many of them simple, everyday objects—can communicate with us and with each other. Hospitals can monitor and regulate pacemakers long distance, factories can automatically address production line issues, and hotels can adjust temperature and lighting according to a guest’s preferences, for example.

Four Key Trends Impacting Mobile Infrastructure Strategy

This white paper analyzes the key building blocks required to deploy a mobile enterprise infrastructure solution. The discussion focuses on the professional consulting and integration services designed to support a mobile enterprise infrastructure strategic initiative. This white paper provides insight into the key trends and challenges for deploying a mobile solution in today’s enterprise organization.

Protect Against Advanced Evasion Techniques

The network security paradigm is currently shifting toward a new reality as advanced hacking methods become more prevalent and harder to detect. An example of such a method is advanced evasion techniques (AETs). Although evasions have been documented extensively in the last 15 years, security vendors have systematically ignored the significance of evasions. Some vendors

The Security Industry’s Dirty Little Secret

The debate over advanced evasion techniques (AETs). To assess what IT security professionals understand about AETs and what measures have been put in place to stop them, McAfee commissioned Vanson Bourne in January 2014 to survey 800 CIOs and security managers from the US, UK, Germany, France, Australia, Brazil, and South Africa.

Using Packet Analysis for Quality of Experience Monitoring

The IT industry is increasingly recognizing and leveraging the value and utility of packet-level analysis—also called Deep Packet Inspection or just Packet Analysis—for quickly and accurately identifying the true source and nature of network and application reliability and performance problems. Packet analysis involves ‘capturing’ (making a copy of) and inspecting network packets that flow between

IT Rental Company Empowers Salesforce with Collaboration

Following a management buyout, Hamilton Rentals found it necessary to separate its IT and communications infrastructure from the parent company, a situation that presented both challenges and opportunities for IT Manager Russell Bauckham. “We needed an IP-based phone solution that would be affordable and that we wouldn’t outgrow,” he says. “We also needed to connect