EXPERT ANALYSIS

LATEST CONTENT



Web-Scale IT: The Enterprise Impact
Commentary  |  8/17/2015  | 
3 Comments
Enterprises can follow the lead of big cloud companies with an architectural approach that includes open hardware and DevOps to increase data center agility and cost efficiency....

802.11ac Adoption Fueling The Mobile Enterprise
Commentary  |  8/14/2015  | 
6 Comments
With gigabit speeds and coverage efficiencies, wireless technology that rivals the performance of the traditional wired desktop will finally enable a fully mobile workforce....

Containers Spell Security Threats For Mobile
Commentary  |  8/14/2015  | 
1 Comment
Containers are gaining popularity, but for mobile usage introduce security vulnerabilities....

Cisco Warns Of Malicious Firmware
News  |  8/13/2015  | 
3 Comments
Attackers are using rogue firmware to take over Cisco IOS networking devices, according to Cisco security bulletin....

5G Expectations Soar
Commentary  |  8/13/2015  | 
21 Comments
The next-generation of wireless technology is generating big-time predictions as the industry gears up for its potential benefits....

Where Should WAN Functionality Live?
Commentary  |  8/13/2015  | 
5 Comments
Improving outdated WAN architecture is not a simple decision, due to the growing number of technology options and services....

When Will Enterprises Adopt SDN?
Commentary  |  8/12/2015  | 
0 Comments
Enterprises need straightforward use cases that clearly demonstrate value before they begin adopting SDN....

Automation And Orchestration: Speed Vs. Efficiency
Commentary  |  8/12/2015  | 
0 Comments
We need to go beyond automating network tasks via SDN into the realm of orchestration and DevOps to eliminate inefficiency....

Symantec Sheds Veritas Business For $8 Billion
News  |  8/11/2015  | 
7 Comments
Cybersecurity giant sells data storage unit to investor group, putting an end to its failed foray into storage....

SDN Security Under Scrutiny
Commentary  |  8/11/2015  | 
2 Comments
A researcher at Black Hat reveals ONIE vulnerabilities, showing that SDN isn't immune to security problems. However, the nature of white-box switches promises rapid fixes....

Network Change Management Best Practices
Commentary  |  8/10/2015  | 
8 Comments
No one wants to be that person who caused the network to crash while implementing a change. Here are some steps to help ensure successful network changes....

Cloud Backup Tools: 7 Factors To Weigh
Commentary  |  8/10/2015  | 
12 Comments
Data backup and recovery technology is critical for cloud services. Here's how to make the right choice....

No Lazy Days of Summer In Storage
Commentary  |  8/08/2015  | 
0 Comments
The dog days of August are when the storage industry heats up, with two major events. Contributor Howard Marks will be speaking and joining the fun at Flash Memory Summit and VMworld....

Pain-Free Migration To The Public Cloud
Commentary  |  8/07/2015  | 
1 Comment
Thinking of moving applications to the public cloud? Follow these guidelines to ensure unexpected expenses and problems don't erode potential benefits....

Log Analysis: Untapped Network Intelligence
Commentary  |  8/07/2015  | 
3 Comments
Don't overlook log data as a resource for detecting network problems and improved network planning....

Software-Defined UC: Way Overdue
Commentary  |  8/07/2015  | 
0 Comments
With unified communications environments getting exponentially more complex, management needs to get far more automated....

Defending Industrial Ethernet Switches Is Not Easy, But Doable
News  |  8/07/2015  | 
0 Comments
Attacks and vulnerabilities against ICS and SCADA can be detected and monitored if operational folks know their network infrastructure....

HP, Cisco Ranked As Top WLAN Vendors
News  |  8/06/2015  | 
3 Comments
HP reaps rewards from its acquisition of Aruba Networks, asserting itself as an enterprise WLAN market leader alongside rival Cisco, according to IHS research....

Converged Infrastructure Vs. Disaggregated Systems
Commentary  |  8/06/2015  | 
4 Comments
Deciding whether converged systems or network disaggregation is right for your organization requires looking beyond the hype....

Why I'm Listening To John Chambers' Dire Warning
Commentary  |  8/06/2015  | 
4 Comments
The final keynote by Cisco's former CEO reeked of fire and brimstone. But do regular IT pros need to worry about an impending IT apocalypse?...

Securing BGP Not As Difficult As You'd Think
News  |  8/06/2015  | 
0 Comments
But few service providers and organizations bother to deploy security for BGP, security expert says....

Terracotta VPN Piggybacks On Network Of Compromised Windows Servers
News  |  8/05/2015  | 
1 Comment
APT groups use this VPN service to launch attacks against organizations around the world....

Secrets To Private Cloud Success
Commentary  |  8/05/2015  | 
0 Comments
Make implementing a private cloud easier by carefully selecting a platform and adopting a consumption-based, pay-as-you-go service delivery model....

Dark Reading News Desk Live At Black Hat 2015
News  |  8/05/2015  | 
1 Comment
Please join host Sara Peters and her guests for the latest in security from the Dark Reading News Desk show at Black Hat USA 2015, premiering Wednesday....

Networking Career: How To Make It To The Big League
Commentary  |  8/04/2015  | 
3 Comments
Networking pros who want to make the leap from a small shop to a big network environment can learn from how our newest network engineer got the job....