Recent Issues
Latest Issue
NC Feb-Mar 2020
NC Nov-Dec 2019
NC Sep-Oct 2019
WhatsUp Gold 2020
Review | September 2020
Competition in the network monitoring world is intense but WhatsUp...
NetAlly EtherScope nXG
Product Review | June 2020
NetAlly's EtherScope nXG sets new standards for network analysis as...
SolarWinds AppOptics
Product Review | June 2020
Infrastructure and application performance monitoring (APM) are essential tools for...
ZPE Systems Nodegrid Services...
Product Review | May 2020
In these challenging times support staff demand secure remote access...
Cloud Protection for Salesforce...
Review | March 2020
Cloud-based services have caught on fast, offering a range of...
webCRM
Product Review | March 2020
Automation of customer interactions, especially sales, is a challenge, one...
Internet Insights from ThousandEyes...
Product Review | March 2020
We reviewed ThousandEyes in November/December 2018 and were very impressed....
Flowmon Anomaly Detection System...
Product Review | March 2020
Traditional security tools, often signature based, can be very effective...
HCI-Flex from DataCore
Product Review | March 2020
DataCore has a fine reputation in the software-defined storage (SDS)...
ExaGrid EX63000E
Product Review | March 2020
ExaGrid has always been a great choice for enterprise backup...
TeraStation 6000 series from...
Review | February 2020
A revolution in the use, application and regulation of data...
R&S Cloud Protector from...
Review | November 2019
The case for website and web application protection is well...
News
Survey reveals businesses are...
News | September 2020
New report finds 78% of companies use or plan to...
Telehouse plans to expand...
News | August 2020
Located close to its London Docklands campus, the new data...
New HP x770w USB...
News | August 2020
Delivering up to 400MB/s of transfer speed, which equates to...
Vonage Expands Collaboration with...
News | August 2020
Vonage is to expand its VonageContact Center offering to include...
New SonicWall TZ firewalls...
News | August 2020
SonicWall has announced new zero touch-enabled, multi-gigabit SonicWall TZ firewalls...
NetAlly announces cost-effective hardware-based...
News | August 2020
NetAlly's AirMapper™ Site Survey app is now available on the...
Supermicro unveils new generation...
News | August 2020
Supermicro has announced an extension of its market-proven ultra-dense storage...
The data centre dilemma...
News | June 2020
Michael McNerney, VP of Marketing and Network Security at Supermicro...
Nuvias appointed european distributor...
News | June 2020
Cybersecurity solutions provider ColorTokens has appointed the Nuvias Group as...
Highest performance DDoS protection...
News | June 2020
A10 is launching its highest-performance DDoS protection appliance, the A10 Thunder...
Securing against identity theft...
News | June 2020
F-Secure has launched ID PROTECTION, a new solution that provides...
Thermographic fever-screening camera solution...
News | June 2020
D-Link has launched the DCS-9500T Group Temperature Screening Camera to...
Designing in chaos
Feature | March 2020
Applications that deliver high availability and consistent performance don't happen...
Advantage at the Edge...
Feature | March 2020
To benefit from edge computing it is necessary to understand...
The power of two...
Feature | March 2020
Is Edge Computing an alternative to Cloud or are they...
5G at the edge...
Feature | March 2020
5G is set to vastly increase the proliferation of edge...
The edge: open ended...
Feature | March 2020
Some IT is moving to the network edge. Mike Connaughton,...
Transform or be disrupted...
Feature | March 2020
Data management and digital transformation are a significant opportunity for...
Primary key holder
Feature | March 2020
Data security in the cloud has often been assumed, but...
Security & management: net...
Feature | November 2019
There is no shortage of network data to secure and...
System down
Feature | November 2019
Are we more or less tolerant concerning system downtime? Peter...
Digital networking
Feature | November 2019
Digital transformation requires a new networking approach. Pete Lumbis, Technical...
Securing the cyber workforce...
Feature | November 2019
Cloud-based services can be the source of quality solutions to...
A policy to include...
Feature | November 2019
As IT systems becomes more hybrid, the use and management...
Interviews
Supermicro: coming out from...
Interview | June 2020
Network Computing speaks to Supermicro CEO Charles Liang about how...
Inside Track - getting...
Interview | May 2018
Ray Smyth discusses network intelligence, its meaning and its value...
Inside Track - getting...
Interview | September 2017
Ray Smyth discusses the emergence of Voice with Neil Hammerton,...
Inside Track - getting...
Interview | July 2017
Ray Smyth discusses managing IT risk with Darren McKay, IT...
Inside Track - getting...
Interview | July 2016
Ray Smyth explored a new approach to an old problem...
Inside Track - getting...
Interview | May 2016
Ray Smyth considers the customer journey following a recent discussion...
Inside Track - getting...
Interview | March 2016
Ray Smyth reflects on a recent discussion with Leo Tadeo,...
Inside Track - getting...
Interview | January 2016
Ray Smyth reflects on a recent discussion with Dirk Paessler,...
Inside Track - getting...
Interview | November 2015
Ray Smyth reflects on his recent discussion with Derek Watkins,...
Inside Track - getting...
Interview | September 2015
Ray Smyth reflects on his recent discussion with Rohyt Belani,...
Up Close and Personal...
Interview | May 2012
Larry Ponemon is iterviewd by Ray Smyth, editor of Network...
Up Close and Personal...
Interview | March 2012
Dan Pitt, Executive Director of the Open Networking Foundation
Technology in the community...
Case Study | November 2019
With Wi-Fi taken for granted, an unreliable service can have...
Joining the dots
Case Study | March 2019
A series of acquisitions left M247 with a lot of...
Defenestrating Windows
Case Study | January 2019
With an increasing number of servers and a rise in...
The haul of challenging...
Case Study | January 2019
Bleach of Lavant had a clear vision to move its...
The network clean sweep...
Case Study | November 2018
Danish based Nilfisk is supporting its digital strategy with global...
The digital premium
Case Study | May 2018
Digital transformation is underway for most organisations, but it's not...
Ringing the changes
Case Study | May 2018
Comtec brings an injury management firm back to full health...
An advanced defence
Case Study | May 2018
Saint Security uses the deep packet inspection (DPI) engine R&S®PACE...
Necessity is the mother...
Case Study | March 2018
Sometimes the warning signs of an IT failure only become...
New field of operations...
Case Study | September 2017
When network connectivity causes operational issues its replacement is inevitable....
Preventing drive-by fraud
Case Study | March 2017
Max Anhoury, VP Global Partnerships at iovation explains how the...
Click and collect networking...
Case Study | March 2017
The UK's Click & Collect Experts Doddle reduce costs and...
Opinions
Creating a robust data...
Opinion | September 2020
How many digital transformation strategies will ever extend beyond the...
Managing the challenges and...
Opinion | August 2020
By Sascha Giese, Head Geek™, SolarWinds
Four reasons edge computing...
Opinion | August 2020
By Alan Stewart-Brown, VP of EMEA at Opengear
Remote working in a...
Opinion | June 2020
Organisations have been rapidly growing their remote-access networks and moving...
Securing the remote workforce...
Opinion | June 2020
Organisations of all sizes have been thrown into the deep...
Is your remote working...
Opinion | June 2020
Remote compliance is about more than just GDPR, explains Mike...
Why it's critical to...
Opinion | June 2020
Imagine enterprise networking without cumbersome stacks, exhausting on-site support, or...
The process framework
Opinion | March 2020
Effective cybersecurity needs to be structured. A security framework like...
Network disruption
Opinion | March 2020
Networks are changing rapidly, and so are our expectations of...
Making data active
Opinion | March 2020
Network Attached Storage solutions are helping to make organisation's data...
Understanding the SME Cyber...
Opinion | March 2020
The state of cybersecurity in UK SMEs needs attention. Paul...
Mass data fragmentation
Opinion | March 2020
Transferring everything to the cloud may be an unnecessary and...
COMPANY OF THE YEAR...
Awards | May 2019
WINNER: Allied Telesis
PRODUCT OF THE YEAR...
Awards | May 2019
WINNER: Extreme Networks - Campus Automation
THE INSPIRATION AWARD –...
Awards | May 2019
WINNER: Ian Moyse
THE ONE TO WATCH...
Awards | May 2019
WINNER: ProLabs
THE CUSTOMER SERVICE AWARD...
Awards | May 2019
WINNER: webCRM
THE EDITORS INNOVATION AWARD...
Awards | May 2019
WINNER: ThousandEyes
NETWORK PROJECT OF THE...
Awards | May 2019
WINNER: Mazars/Silver Peak
NETWORK PROJECT OF YEAR...
Awards | May 2019
WINNER: iTrinegy for Land Systems Reference Centre
BENCH TESTED PRODUCT OF...
Awards | May 2019
JOINT WINNER: Nozomi Networks - SCADAguardian
BENCH TESTED PRODUCT OF...
Awards | May 2019
JOINT WINNER: Endace - EndaceProbe Analytics Platform
CLOUD BASED SOLUTION OF...
Awards | May 2019
WINNER: Kemp Technologies - Metered Licensing
SOFTWARE PRODUCT OF THE...
Awards | May 2019
WINNER: Allied Telesis - Vista Manager EX 2.0
Understanding VPN
Technology | March 2020
That which becomes commoditised becomes misunderstood. Thomas Owen, Head of...
Manufacturing Linux Containers
Technology | November 2019
Virtualised operating systems are gaining ground and solving real-world IT...
Cabling for Wi-Fi
Technology | September 2019
The latest design standard for Wi-Fi requires an intelligent approach...
A routing prefix
Technology | September 2019
To many of us the Internet is just a resource...
The IoT opportunity
Technology Focus | May 2019
Diverse organisations are realising that IoT could transform the way...
Edge towards smarter cabling...
Technology | March 2019
Cloud migration is moving network bottlenecks towards the network edge....
The hacker crowd
Technology Focus | July 2017
Can hacking be used as a force for good? Jay...
The Data lake: tranquility...
Technology Focus | November 2016
The promise of advantage from industrial scale data collection is...
The abuse of DNS...
Technology Focus | November 2016
Rod Rasmussen, vice president of cybersecurity at Infoblox, provides an...
IPv6: safeguarding the Internet...
Technology Focus | November 2015
Nathalie Künneke-Trenaman, IPv6 Program Manager at the RIPE NCC explains...
Timing is of the...
Technology Focus | November 2015
Mikko Hannula, Director of Product Management at Coriant explains why...
Technology alone will not...
Technology Focus | January 2015
Rick Bylina, senior manager of product strategy at Infoblox explains...