The aim is to quicken the pace of networking hardware innovation read more »
Data from Google and a security firm appear to show severe disruption to Internet services in Syria read more »
How to use tiny keyboard on wearable computers? Zoom it, say Carnegie Mellon scientists read more »
Network-connected devices have vulnerable protocols that allow them to be easily manipulated, Prolexic says read more »
Printers, routers and many other Internet-connected devices can be used in an attack read more »
Spanish police make arrest read more »more news ..
Router Blogsmore blogs ..
On demand Biztech Briefing-Learn how to effectively deliver mobile work styles and cloud services together.
Check out our latest articles on Microsoft's next-generation operating system.
View the latest capacity management resources including whitepapers, videos and news.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Router In Depth
From software defined networking challenges to killing Cius and corporate restricting moves, it was a busy year for Cisco read more »
Whether thieves or tornadoes threaten your company, protecting your assets from utter catastrophe is easier than you think. read more »
Given the explosive growth in data traffic, Moore's Law is not enough to keep pace with demand for higher network speeds read more »
Ready to throw Ma Bell from the train? Allow us to lend you a hand read more »
Has the US started a cyberwar by admitting that Flame is part of a cyberweapons programme? read more »
Develop and implement your own action plan to avoid these pitfalls read more »more in depth ..
Cisco's 'Internet of Everything' initiative takes it into unchartered territory read more »
Here are some of the best-known free security tools you can try inside your own network read more »
No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »
Which of today's newest shipping technologies will cast the longest shadow over business computing? read more »more slideshows ..
Maximise the effectiveness of collaboration read more »
Delivered high availability dynamic SIP Disaster Recovery read more »more white papers ..