Commentary
Latest Content
<<   <   Page 2 / 2
Is License-Assisted Access Needed?
Commentary  |  3/13/2015  | 
Some carriers are eyeing the use of LTE in unlicensed 5GHz spectrum as a way to keep up with skyrocketing capacity demands, but the technology isn't an ideal solution.
SDN: An Enabler For NFV
Commentary  |  3/13/2015  | 
Software-defined networking and NFV can be used independently, but SDN makes it much easier to implement and manage NFV.
Nanosecond Storage Performance Latencies? Get Ready
Commentary  |  3/12/2015  | 
Predictable and persistent microsecond storage performance will usher in new possibilities in application development and capabilities in the data center.
3 Active-Active Data Center Myths
Commentary  |  3/11/2015  | 
Operating two data centers at the same time to support customers sounds great, but Ethan Banks offers a dose of reality about the data center design.
4 IT Job Resume & Interview Pitfalls To Avoid
Commentary  |  3/9/2015  | 
Don't sabotage your job search by loading up your resume with jargon, fixating on old experience, or going overboard with certifications.
Cloud Migration: Going Live
Commentary  |  3/9/2015  | 
The final post in this series on best practices for moving applications to the cloud details the elements of a successful go-live event as well as post-migration maintenance.
Get Off My Lawn, Hipster Admins!
Commentary  |  3/6/2015  | 
As an IT manager, there's a delicate balance between fostering realistic technology innovation and acting like an out-of-touch grouch.
Managing Data Security In The Hybrid Cloud
Commentary  |  3/5/2015  | 
The hybrid cloud model helps address security and compliance issues, but there are still a lot of challenges, including cloud encryption.
Tailoring UC To The Elusive Mobile Worker
Commentary  |  3/5/2015  | 
Today's mobile workers have unique technology requirements that enterprises must consider in their unified communications deployments.
Network Forensics Separate Signal From Noise
Commentary  |  3/4/2015  | 
Identifying data breaches in progress and distinguishing false positives from real security attacks requires effective network forensics software.
Network Engineers: Don't Fear The Code
Commentary  |  3/2/2015  | 
The DevOps focus on automation and coding is pushing its way into networks, making network engineers uneasy about learning new skills. But a closer look at the trend shows it's more about the scripting they already do.
NFV Home Lab: Licensing, Storage & Networking
Commentary  |  2/27/2015  | 
In the second part of this two-part blog, Ethan Banks describes the storage and networking considerations that come into play when building a lab for testing network functions virtualization.
Treating The Cloud As A Utility
Commentary  |  2/26/2015  | 
A NIST report indicates that federal agencies want cloud providers to operate with more utility-like standardization.
BGP Security: No Quick Fix
Commentary  |  2/26/2015  | 
The routing protocol is plagued by multiple security vulnerabilities, which attackers are exploiting. However, securing BGP is no small feat.
Software-Defined Storage Vs. Software-Delivered Storage
Commentary  |  2/25/2015  | 
The difference between a software-defined storage product and one that's software delivered has more to do a vendor's go-to-market strategy than technical features.
Software-Defined Storage Takes Shape
Commentary  |  2/24/2015  | 
The term is often misused in the industry, but some credible software-defined storage products have emerged.
NFV: 4 Home Lab Options
Commentary  |  2/23/2015  | 
Network functions virtualization is well suited to the home lab. Ethan Banks describes how he built his NFV lab and the pros and cons of different configurations.
Zero-Knowledge Cloud Storage: Far From Perfect
Commentary  |  2/20/2015  | 
You may get an extra layer of protection with zero-knowledge cloud encryption, but the cloud security system isn't fail-safe.
SDN & NFV: Dynamic Duo Of Next-Gen Networks?
Commentary  |  2/19/2015  | 
The relationship between SDN and NFV may be indirect today, but over time the technologies could become inseparable. Find out why.
Big Data Deployment Trends
Commentary  |  2/19/2015  | 
A recent Enterprise Strategy Group survey shows a diversity of IT infrastructure choices for big data.
Wireless Engineer Career Resources: Break In Or Brush Up
Commentary  |  2/17/2015  | 
Thinking of a career in WiFi? We outline some resources to break into the field or brush up on skills, if you’re a seasoned wireless LAN professional in need of a refresher.
The Rise Of The Cloud WAN
Commentary  |  2/13/2015  | 
The trend of pushing WAN functionality into the cloud -- software-defined WAN -- is gaining steam as enterprises look to reduce WAN complexity and lower costs.
VMware Virtual Volumes Launch A New Storage Era
Commentary  |  2/12/2015  | 
The arrival of VVOLs with vSphere 6 will allow us to provide data services at the VM-level and put an end to impractical LUN management.
STEM Careers: Tackling The Gender Gap
Commentary  |  2/11/2015  | 
In order to get more women in STEM, schools need to step up with curriculum opportunities and IT companies need to build workforce diversity.
Cloud Migration: Managing Execution
Commentary  |  2/11/2015  | 
The third part of this series on moving workloads to the cloud provides guidance for executing the migration, including load testing and security reviews.
How VSAN & VVOLs Will Impact Storage Administrators
Commentary  |  2/10/2015  | 
Software-defined storage is poised to take a leap forward with vSphere 6, VSAN and VVOLs. Storage administrators will need to expand their skills in order to keep up.
Copper Vs. Fiber: What's Best In The Next-Gen Data Center?
Commentary  |  2/10/2015  | 
Copper cables can provide better performance, reliability and efficiency than fiber cables for organizations under pressure to improve their data center deployments.
Upgrading To 802.11ac WiFi: 4 Coping Strategies
Commentary  |  2/6/2015  | 
The latest version of WiFi, 802.11ac, is still making its way into the enterprise, in the lull before Wave 2 products arrive. Follow these tips to make the upgrade process less painful.
Big Data Deployment: Finding The Best Model
Commentary  |  2/5/2015  | 
What's the best IT infrastructure for big data? Here are some of the fundamental choices to consider.
Peer-To-Peer Cloud Storage Promises Security, Reliability
Commentary  |  2/4/2015  | 
Cloud storage services that use a decentralized model for storing data offer a viable alternative, especially for SMBs.
All EVO:RAIL Appliances Are Not Created Equal
Commentary  |  2/3/2015  | 
The arrival of EMC's VSPEX Blue hyper-converged appliance highlights the differences between products jockeying for attention in the growing collection of those based on VMware's EVO:RAIL.
When Enterprise WLANs Go Bad
Commentary  |  2/2/2015  | 
The Marriott wireless debacle underscores the difficulty of managing WLANs, which are often neglected in the enterprise.
OpenStack: Driving The Software-Defined Economy
Commentary  |  1/30/2015  | 
OpenStack is only one example of the new era of software currently disrupting our established industries.
4 NFV Myths Debunked
Commentary  |  1/29/2015  | 
Network functions virtualization has spawned a number of misconceptions about what it is and how it works. Here's a reality check.
IT Monitoring Scalability Planning: 3 Roadblocks
Commentary  |  1/27/2015  | 
Planning for growth is key to effective IT monitoring, but it can be stymied by certain mindsets. Here's how to overcome them.
Crafting Effective UC Training
Commentary  |  1/26/2015  | 
Getting the most out of your UC investment requires a usage and adoption program that teaches employees not only how to use the communication tools, but also the benefits.
Choosing High-Capacity Drives
Commentary  |  1/26/2015  | 
From hard drives for specific uses to hybrid drives and various capacity-increasing technologies, there are a lot of options. How do you decide which is best?
Data Encryption On The Rise
Commentary  |  1/23/2015  | 
With corporate demand for data security growing, full data encryption is becoming a default feature in the mobile space.
The Case For WLAN Interoperability
Commentary  |  1/22/2015  | 
Many new wireless devices don't play well on enterprise WLANs. It's time for the Wi-Fi Alliance to step up and fix the fragmented WiFi market.
Beware IT's Villain: The 'Complexifier'
Commentary  |  1/20/2015  | 
Individuals who focus on complicating things can derail IT projects. Here's what to watch out for and how to deflect their negative effect.
What Will Replace Flash?
Commentary  |  1/19/2015  | 
Technologies such as RRAM are vying to upstage flash memory, but have a long way to go. Meanwhile, flash suppliers are making improvements.
Network Segmentation & SD-WAN
Commentary  |  1/16/2015  | 
The Target breach highlighted the need to segment networks and isolate traffic. Adding software-defined networking capabilities to the WAN can help.
Moving Mission-Critical Applications To The Cloud
Commentary  |  1/15/2015  | 
Here are three steps enterprises and private clouds need to take to meet the availability requirements of critical business applications.
Your Network's Next Step: Cisco ACI Or VMware NSX
Commentary  |  1/14/2015  | 
When it comes to SDN, Cisco's Application Centric Infrastructure and VMware's NSX are often discussed interchangeably, but they are really very different. Joe Onisick explains how they compare and can even work together.
Open Source Storage Gains Traction
Commentary  |  1/13/2015  | 
Ceph, along with Gluster, took big steps forward in 2014, positioning the open source storage technologies for the mainstream.
What's Your Wi-Fi Strategy For 2015?
Commentary  |  1/12/2015  | 
Enterprises that don't seize the opportunity to unlock IT value through wireless connectivity run the risk of being left behind.
DevOps & Diverse Infrastructure
Commentary  |  1/12/2015  | 
Don't let complex IT environments with a lot of non-virtualized infrastructure stop you from developing a DevOps practice.
Shifting To SDN? 3 Ways It Will Affect Network Monitoring
Commentary  |  1/9/2015  | 
Software-defined networking will affect your performance monitoring and applications visibility, so plan ahead.
Google Fiber, Utility Poles & The FCC
Commentary  |  1/8/2015  | 
If the FCC gives Google access to public telecom infrastructure for deploying Google Fiber, it could open the door for many broadband providers.
Achieving Infrastructure As Code
Commentary  |  1/7/2015  | 
Treating your network device configurations like source code is an intriguing idea. What's needed to enable widespread adoption of this practice?
<<   <   Page 2 / 2


Slideshows
Cartoon
White Papers
Register for Network Computing Newsletters
Current Issue
Research: 2014 State of the Data Center
Research: 2014 State of the Data Center
Our latest survey shows growing demand, fixed budgets, and good reason why resellers and vendors must fight to remain relevant. One thing's for sure: The data center is poised for a wild ride, and no one wants to be left behind.
Video
Twitter Feed