Wi-Fi Protected Access (WPA)

Wi-Fi Protected Access (WPA) is an upgrade on the original Wi-Fi security standard, Wired Equivalent Privacy, or WEP, which was found to be sorely lacking almost as soon as it was released. WPA offers much stronger user authentication and better data encryption via the Temporal Key Integrity Protocol (TKIP). Some consumer gear still employs WEP, but any business that allows users to connect to the corporate network via a home access point must demand WPA as the starting point for credible Wi-Fi security.


IEEE Aims High in Home Networking

The newly published IEEE 1905.1 standard seeks to create a flexible environment with four complementary technologies. More >

Time to Get Up to Speed on New 802.11ac Standard

Just as IT departments are getting comfortable with 802.11n, a new Wi-Fi standard is becoming more than a blip on the radar. 802.11ac builds on the previous generations of Wi-Fi in significant ways, More >

High-Speed, Short-Range Networking and Unified Communications

A tremendous amount of attention has been paid to the deep and growing relationship between unified communications and mobility. Indeed, it is safe to say that there is no real UC unless workers can More >

More Articles >


Preparing for Tomorrow’s Network Today

Brocade's Jason Notel explains ways to bolster network functionality now to future-proof systems in order to avoid major upgrades when forward-thinking technologies become commercial products.

More >

Why SDN Does Not Commoditize Networking

Cisco says OpenFlow and specially designed ASICs and other technologies will fulfill the promises of SDN more fully than a strictly commoditized approach.

More >

SDN and the New Economics of Networking

SDN means commodity hardware can now be deployed and repurposed in any form that is desirable. The key is to ensure that open formats are allowed to thrive.

More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making


SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

2015 Wearable Tech Trends: Swank Meets Science

Security Staffing

Tech companies and fashion designers both seem to agree that the wearables of tomorrow will likely be fashion that incorporates technology instead of the other way around.

 More >

Salesforce.com Unifies File Access Across the Cloud

For Your Holiday Reading List: ‘Geeks, Mush Heads and the IT Revolution’

Apigee Bolsters API Analytics

Mobile Apps Potentially Help Save Lives


Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

network02 Evolutionary Dynamics of Complex Communications Networks

Chapter 1.2 focuses on the fundamentals of complex networks and complex network taxonomy and examples.


Secure Domain Name System (DNS) Deployment Guide

Securely implementing the naming structure in your shop is essential.


Fundamental Filtering of IPv6 Network Traffic

In this publication, you will find non-vendor-specific provisioning of IPv6-based network traffic filtering via basic type...

Minimizing Information Leakage in the DNS Minimizing Information Leakage in the DNS

This paper looks at methods for mitigating the risks posed by signature-based DNSSEC extensions....

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


Thanks for your registration, follow us on our social networks to keep up-to-date