Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

BYOD vs. Network Bandwidth: How Blue Coat Tackles Selfish Apps

New devices that support bandwidth-hungry applications are invading the network--it's time to embrace and control them.

There's a lot of Internet applications out there with a lot of different network usage models. Some are chatty, some are optimized. Some are bursty, others are constant network bandwidth users. Even if you can figure out what applications are coming into your enterprise and understand their bandwidth needs, that's only part of the problem. Some of the apps are critical to the company, and others--like, say, YouTube--are less so. Many who've tried to manage the melee have given up in favor of just adding more bandwidth. And that was a viable solution until the recent rise of what Blue Coat calls the selfish application.

More Insights

Webcasts

More >>

White Papers

More >>

Reports

More >>

What's a selfish application? It's any app that from time to time downloads a lot of data and does it as fast as it can--regardless of the needs of other apps on the network. In other words, most apps are selfish. The difference these days is the quantity of data they're downloading and the likelihood that lots of other people are running the same apps and downloading similar quantities of data. Think of all the Flash updates, or iOS refreshes, or YouTube users on their personal devices. The data sets have gotten bigger, and the number of users is growing daily. So if you weren't managing your WAN bandwidth before, it might be time to start.

Blue Coat gave a quick demo of how YouTube can suck up available network bandwidth, and how its Mach5 and PacketShaper products can manage bandwidth limitations for particular apps. For the most part, the problem of bandwidth-hungry apps is newer than the Blue Coat features to limit them. The problem is compounded by employees, visitors and contractors bringing in their own devices and expecting access to the Internet and internal resources. It can be further exacerbated by heavy use of SaaS applications.

Blue Coat does have a new major release of its software, which has been shipping for just a month now. Version 9.1 now handles IPv6 and increased the throughput capability when run on Blue Coat's fastest hardware.

Art Wittmann is a freelance journalist and writer with 30 years of experience in IT and IT journalism. Wittmann specializes in IT infrastructure, cloud computing and data center issues. Email him at artwittmann@yahoo.com Follow him on twitter @artwittmann


Related Reading


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers