Commentary
Latest Content
<<   <   Page 2 / 2
Next-Gen WAN: Build or Buy?
Commentary  |  5/28/2014  | 
Enterprises need to consider a number of factors, including security requirements, when choosing between an in-house model or managed network service for their future WAN connectivity needs.
Branch Infrastructure Design: The Cloud Effect
Commentary  |  5/27/2014  | 
Traditional branch office architecture is fraught with complexity as individual office needs come into play. Cloud computing promises to simplify branch design.
Waiting For VMware VVOLs
Commentary  |  5/27/2014  | 
VMware's Virtual Volumes functionality would help solve storage management problems in virtualized environments. But, like Vladmir and Estragon endlessly waiting for Godot, we're still waiting for VVOLs.
The Internet of Things: Not So Scary
Commentary  |  5/23/2014  | 
IoT will increase the flow of data, but should be manageable with proper attention to WiFi requirements and security.
Infrastructure IT Salaries: Flat & Happy
Commentary  |  5/21/2014  | 
When it comes to IT salary, keeping an even keel is OK, according to the results of InformationWeek's annual US Salary Survey for infrastructure pros.
Photonics: Chip Interconnect At Light Speed
Commentary  |  5/21/2014  | 
Using beams of light, instead of electrical connections, to send data between chips promises faster, lower-power devices.
Cisco Live Unfolds: The Chambers Keynote
Commentary  |  5/19/2014  | 
Join us to experience and weigh in on the John Chambers keynote as it happens from Cisco Live, today at 3:30 p.m. PDT.
Cisco Faces Make-Or-Break Week For SDN
Commentary  |  5/19/2014  | 
Cisco is counting on ACI, its software-defined networking strategy, to keep its hold on the enterprise infrastructure market. We'll see how that plays out this week at Cisco Live.
Converged Infrastructure & The Branch Office
Commentary  |  5/19/2014  | 
Today's branch office IT architecture is complicated and inefficient. Converged infrastructure streamlines branch IT and reduces the risk of downtime by centralizing branch data.
Will Ethernet Take Over The Spinning Disk?
Commentary  |  5/16/2014  | 
With its open Ethernet drive architecture, Western Digital's HGST subsidiary joins Seagate's Kinetic drives in using an Ethernet port to access an object store on the disk.
IT Transformation Fuels New Holistic Platforms
Commentary  |  5/15/2014  | 
Enterprises are transforming their IT environments by adopting holistic strategies that go beyond single technology solutions. This trend is leading vendors to expand their portfolios with a comprehensive platform approach.
Cloud Must Search & Integrate Apps
Commentary  |  5/15/2014  | 
Cloud providers must adapt to provide users with "cloudnostic" services that search data stored in many locations and seamlessly integrate apps across platforms.
Building An Information Security Policy, Part 5: Managing Identities
Commentary  |  5/14/2014  | 
The final installment of this series looks at how to assign identifiers to users and devices for a secure network.
3 Steps To A Successful UC Strategy
Commentary  |  5/13/2014  | 
A medical emergency provides lessons in collaboration that can be applied when building or updating a unified communications plan.
Ethernet Innovation Inside The Datacenter
Commentary  |  5/12/2014  | 
With big data analytics, social media, and other new applications pushing east-west bandwidth demand, datacenters are deploying faster Ethernet and unlocking new capabilities.
Beyond VPN: Supporting The Mobile Workforce
Commentary  |  5/12/2014  | 
Today's employees demand support for mobile devices and cloud applications that the traditional hardware-based network cannot supply.
Hard Disk: Not Dead Yet
Commentary  |  5/9/2014  | 
Even with the arrival of flash storage, don't count out the venerable hard disk. Disk still offers a lot of advantages.
Speeding Up Storage Networks
Commentary  |  5/8/2014  | 
With SSDs pushing the limits of networks, it's time to consider how compression and deduplication could help speed storage traffic.
Social WiFi Sign-In: Benefits With A Dark Side
Commentary  |  5/7/2014  | 
Providing social networking credentials to get free WiFi access gives merchants a wealth of customer data for marketing and is a boon for managed service providers. But is the price too high for customers?
Don't Get Burned By Virtual Appliances
Commentary  |  5/7/2014  | 
The Heartbleed bug highlights potential drawbacks of virtual appliances and the flexibility and control offered by installable software.
The Network Is The Computer, Again
Commentary  |  5/6/2014  | 
Today, the old Sun Microsystems tagline rings truer than ever. In our cloud-centric world, perhaps computers don't exist at all anymore.
VMware vSphere Storage APIs: A Guide
Commentary  |  5/6/2014  | 
Get clarity on features in vSphere 5.5 that improve storage performance through storage array integration, storage awareness, and clientless guest backup and recovery.
Choosing Cisco PBX Or Microsoft Lync In The Datacenter
Commentary  |  5/5/2014  | 
These strategies address the question of Cisco vs. Microsoft voice technologies from the datacenter perspective.
IT Is A Quantum World
Commentary  |  5/5/2014  | 
System administrators need to take a quantum mechanical view when weighing the probability of new failure modes that come with new technologies such as deduplication.
NHR End Of Life Alert, May 2014
Commentary  |  5/5/2014  | 
Find out which routing and switching products from major hardware manufacturers will no longer be sold or serviced.
Cloud-Managed WLAN Is Hot, But Not For Everyone
Commentary  |  5/2/2014  | 
The market for cloud WiFi has grown exponentially, providing a range of options suitable for small organizations, but not so much for large enterprises.
Windows Storage Gets Flashy
Commentary  |  5/2/2014  | 
A partnership with Violin Memory to meld Windows Storage Server into an all-flash array boosts Microsoft's storage play.
Cisco PBX & Microsoft Lync: Datacenter Dilemma
Commentary  |  5/1/2014  | 
With the overlap of Cisco and Microsoft in the enterprise, and both vendors pushing their voice technologies, organizations can have a tough time picking a vendor.
Buy Or Build Your Own SDN?
Commentary  |  5/1/2014  | 
An ESG survey shows a broad range of approaches among enterprises when it comes to deploying software-defined networking.
The Fall Of The Storage Tiers
Commentary  |  4/30/2014  | 
With drives and storage appliances rapidly evolving, traditional tiered storage classifications are no longer useful in the enterprise. We need a new system for classifying storage devices based on usage.
Turkey’s Twitter Shoot: Lessons Learned
Commentary  |  4/30/2014  | 
Network engineers can gain insight into resilience, indirection techniques like NAT, and Internet governance from Turkey officials' none-too-successful attempt to shut down the popular messaging service.
WANs For The Cloud Must Pick Up The Pace
Commentary  |  4/30/2014  | 
Next-generation WANs leverage improvements in broadband networking and integrated premises-based technologies to address cloud computing demands.
DevOps: Embrace Failure & Change
Commentary  |  4/29/2014  | 
In order to benefit from cloud computing, enterprises must change their attitudes and integrate platforms like OpenStack via the DevOps model.
Backup's New Data Protection Weapon: Instant Recovery
Commentary  |  4/29/2014  | 
The restore process traditionally associated with backup can be excruciatingly long. Backup systems with an emerging recovery feature can get your applications back up and running in minutes.
50 Shades Of Open SDN
Commentary  |  4/28/2014  | 
The word open is used frequently in the software-defined networking market, but a closer look at three SDN initiatives shows that the meaning of open depends on your point of view.
Exploring Amazon's Mayday: Visual Customer Service Options
Commentary  |  4/28/2014  | 
The Mayday button on Amazon's Kindle opens doors for new approaches to visual customer service, but the benefits, risks, and costs must be considered.
Bye-Bye, Traditional IT Buyer
Commentary  |  4/28/2014  | 
Recent ESG research suggests the writing is on the wall for traditional IT purchasing processes. Three trends are putting pressure on the standard IT procurement formula.
Tech Talk Week 1: Service Provider Network Visibility
Commentary  |  4/28/2014  | 
Welcome to the first in a series of weekly community discussions, as we explore the lack of visibility enterprise customers often have into the service provider network.
WAN Adaptations Needed For Cloud
Commentary  |  4/25/2014  | 
The cloud is putting more demands than ever on the WAN, and the WAN must respond with increased speed, throughput, and flexibility.
Need For Speed Drives WAN Optimization
Commentary  |  4/25/2014  | 
Our annual WAN survey finds usage of WAN optimization and traffic shaping up 4% over last year, despite some predictions in the industry to the contrary.
Infrastructure Challenge: Build Your Community
Commentary  |  4/23/2014  | 
Network Computing provides the platform; help us make it your community.
Edge Devices Are The Brains Of The Network
Commentary  |  4/23/2014  | 
In any type of network, the edge is where all the action takes place. Think of the edge as the brains of the network, while the core is just the dumb muscle.
Fight Software Piracy With SaaS
Commentary  |  4/22/2014  | 
SaaS makes application deployment easy and effective. It could eliminate software piracy once and for all.
SDN: Waiting For The Trickle-Down Effect
Commentary  |  4/22/2014  | 
Like server virtualization and 10 Gigabit Ethernet, SDN will eventually become a technology that small and midsized enterprises can use. But it's going to require some new packaging.
VMware's VSAN Benchmarks: Under The Hood
Commentary  |  4/22/2014  | 
VMware touted flashy numbers in recently published performance benchmarks, but a closer examination of its VSAN testing shows why customers shouldn't expect the same results with their real-world applications.
IT Certification Exam Success In 4 Steps
Commentary  |  4/22/2014  | 
There are no shortcuts to obtaining passing scores, but focusing on key fundamentals of proper study and preparation will help you master the art of certification.
Building an Information Security Policy Part 4: Addresses and Identifiers
Commentary  |  4/21/2014  | 
Proper traffic identification through techniques such as IP addressing and VLANs are the foundation of a secure network.
Scale-Out Storage Has Limits
Commentary  |  4/21/2014  | 
Disk may scale as your storage needs increase, but what do you do when your datacenter is maxed out?
SDN Strategies Part 4: Big Switch, Avaya, IBM,VMware
Commentary  |  4/18/2014  | 
This series on SDN products concludes with a look at Big Switch's updated SDN strategy, VMware NSX, IBM's hybrid approach, and Avaya's focus on virtual network services.
All-Flash Arrays: The VDI Solution?
Commentary  |  4/17/2014  | 
The huge performance provided by all-flash arrays is a boon for virtual desktop infrastructure, but don't be fooled by unrealistic calculations.
<<   <   Page 2 / 2


White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Slideshows
Twitter Feed