Networking

Networking news, trends, analysis and practical advice

Free and cheap ways to learn about IT security

range extender

$10 off TP-Link AC1200 Wi-Fi Range Extender Powerline Edition - Deal Alert

Unlike traditional range extenders, the Powerline adapter works beyond your router’s coverage area. And because Powerline works over your home wiring, walls and floors won’t slow down its signal.

apc backup

22% off APC Back-UPS 600VA 7-outlet Uninterruptible Power Supply (UPS) with USB Charging Port - Deal Alert

The new APC BE600M1 Back-UPS has 7 total outlets: 5 battery backup outlets plus 2 Surge Protection outlets, more than ever before. BE600M1 Back-UPS is capable of powering your wireless networking equipment for 2 to 6 hours when power...

170530 intel htcvive
video

Intel shows off wireless VR on the HTC Vive

Intel showed for the first time at Computex in Taipei a prototype wireless HTC Vive virtual reality headset

Because the world is flat now, right?

This company wants to use cellular data connections to keep its remote sites online, and at some locations, just two things stand in the way: reality and an offshore support team in India.

5g

Apple is testing 5G: Why this matters to the iOS enterprise

5G technology is the next wave of networking, and Apple is deeply involved in testing and developing the standard. Why should this matter to you?

Are you sure it's not just in sleep mode?

In the wake of a very bad thunderstorm, this field service pilot fish is dispatched to a client's restaurant to test and replace a patch cord after lightning blew up the cable modem. How long could that take?

There really ARE better ways to stay awake...

Another late night, a bank of network switches in cubeland, a coffee jug and one of those in-the-cup immersion heaters -- all the ingredients for no problem at all, right? Oh, wait...

ransomware

Winning the war on ransomware

By purchasing antivirus that have high detection rates, we can win the war on ransomware.

The working dead: IT jobs bound for extinction

For enterprise protection, antivirus software is no longer enough

Security experts see antivirus software as part of a security setup that includes behavior analytics and artificial intelligence. But it can't catch everything.

windows.firewall.3x2

The Windows firewall is the overlooked defense against WannaCry and Adylkuzz

For defending a Windows PC from LAN side attacks, the built-in firewall gets no respect. It can block TCP port 445 and prevent infection by both the WannaCry ransomware and the Adylkuzz cryptocurrency miner. An XP machine with all...

cable modem

53% off Linksys Cable Modem for Comcast, Eliminate Rental Fees - Deal Alert

If you have broadband internet from Comcast or similar providers, you're probably paying a monthly fee to rent the cable modem. This one is certified by Comcast and compatible with other providers. This may pay for itself in no time.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

So it must not be important, right?

Office manager pilot fish gets a call from an employee complaining that her internet connection is dead -- and fish has some idea what might be going on.

Google Wifi router on table

7 mistakes Google made updating my Google Wifi router

Google Wifi mesh routers may be great on speed and range, but the automated software update process leaves something to be desired.

NOW we can help you!

Software developer's home DSL connection is having issues, so he checks it with a packet analyzer -- and it's a mess of problems. The obvious next step: Call the telco's tech support line with his findings, right?

Asus router warnings on privacy and security

Before buying an Asus router, it would be wise to read Daniel Aleksandersen's review of the stock Asus firmware, especially the privacy issues regarding the included Trend Micro software.

sharks circling underwater

CW@50: Sharky's greatest hits

A collection of some of the most outrageous 'true tales of IT life' that 'pilot fish' have ever shared with Sharky and fellow readers of Computerworld's Shark Tank over the years.

cybersecurityshutterstock 380217166

Face it: Enterprise cyberattacks are going to happen

There are now so many cyberattacks that many enterprises simply accept that hackers will find ways to break into their systems. Companies are combining new and old methods to thwart the bad guys.

Load More