Automating UCS Manager Configuration with Ansible

Brett Johnson News
  • Cisco UCS Manager is the management plane service for Cisco UCS solutions. Using a policy-based management approach, server configurations are decoupled from the physical hardware.
    By Brett Johnson , 10/19/2018

What to Look for in a Network Monitoring Application

John Edwards News
  • Keeping tabs on network operations and performance is a 24x7 job. The right monitoring application makes the task easier.
    By John Edwards , 10/18/2018

The Network Automation Paradox: Why People are Key to Its Success

Michael Bushong News
  • The industry’s inability to move forward with network automation despite its benefits means it’s time to try a new approach. That approach must focus on people to accelerate the pace of automation adoption.
    By Michael Bushong , 10/17/2018

Mobile Security Still Needs More Work in Most Enterprises

Network Computing Editors News
  • A recent survey on mobile security confirms what most suspect. Most enterprises still have much work to do to bring mobile security up to par, especially for devices that spend most of their time connecting to data...
    By Network Computing Editors , 10/16/2018

Packet Level Network Telemetry – Broadening the Monitoring Horizons of SDN

By Aalok Shah, Sr. Engineer at VOLANSYS News
  • The adoption of new networking technologies demands more sophisticated and flexible telemetry mechanisms for monitoring, maintaining, and troubleshooting the networks.
    By By Aalok Shah, Sr. Engineer at VOLANSYS , 10/16/2018

Should You Migrate Your DevOps Architecture to the Cloud?

Bill Kleyman News
  • Evolving DevOps practices will require a new level of agility and speed to deployment. Advancements in the cloud sector have organizations wondering how the two can work together.
    By Bill Kleyman , 10/15/2018

Cisco CCNA Cyber Ops Certification – Achieve or Avoid?

Alex Bennett News
  • If you’re working in a Security Operations Center, or aim to work in one, the CCNA Cyber Ops should be high on your list of qualifications to achieve. Few certifications cover this area.
    By Alex Bennett , 10/12/2018

4 Tips for Safeguarding Your SD-WAN

By Trent Pham, head of security products, Windstream Enterprise News
  • Be mindful of these four areas of security when considering an SD-WAN solution. By incorporating security measures like these into an SD-WAN solution, businesses gain assurance that their data, network, IT assets, and...
    By By Trent Pham, head of security products, Windstream Enterprise , 10/12/2018

5 Reasons Why Hardware Choices are Critical for HCI

By Chad Dunn, vice president, product management, Dell EMC VxRail and VxRack SDDC News
  • With so much emphasis placed on the software in software-defined infrastructures, the hardware is often overlooked. Don’t make this mistake. It takes real work to make components behave as a system.
    By By Chad Dunn, vice president, product management, Dell EMC VxRail and VxRack SDDC , 10/11/2018

9 Best Practices for Managing Infrastructure in a Containerized Environment

  • Containers may make life easier for developers, but they can complicate matters for the operations team. These best practices can help.
    By CYNTHIA HARVEY , 10/11/2018

Too Many Choices! Picking the Right PoE for Your Application

Jason Hintersteiner News
  • Selecting a PoE power source for a powered device can be challenging since there are many options. Here is a brief overview to help you narrow down your choices and make the right decision.
    By Jason Hintersteiner , 10/10/2018

Why Orchestration Does Not Equal Automation

Patrick Moore, Director of Network Automation Strategy, Itential News
  • Orchestration is often used interchangeably with automation. The reality is these terms are very different. Understanding the distinction is important. It’s time to set the record straight.
    By Patrick Moore, Director of Network Automation Strategy, Itential , 10/09/2018

CompTIA Names Top 10 Emerging Technologies

Lisa Morgan News
  • New technologies keep on coming, but which are better to invest in now versus later? CompTIA's recently released a prioritized list of top 10 emerging technologies.
    By Lisa Morgan , 10/08/2018

Why Cybersecurity Training Must Become a Priority

By Renee Tarun, Vice President, Information Security, Fortinet News
  • Because the threat landscape continues to evolve rapidly, organizations are having a hard time keeping pace with the evolving cybersecurity skills required to manage their complex environments.
    By By Renee Tarun, Vice President, Information Security, Fortinet , 10/05/2018

Monitoring Windows Services for Free

Tony Fortunato News
  • Network analysts cannot simply rely on existing solutions when troubleshooting problems. Get creative and build your own Windows services monitoring tool.
    By Tony Fortunato , 10/05/2018

Move to the Cloud with Microsoft and Live Happily Ever After -- Maybe

Jeff Kalberg, Chief Technology Evangelist, IGEL News
  • Windows 10 in the cloud offers long-term benefits. However, it is paramount to address infrastructure issues before making the Windows desktop to the cloud move.
    By Jeff Kalberg, Chief Technology Evangelist, IGEL , 10/04/2018

7 Common Network Latency Culprits

Andrew Froehlich Slideshow
  • If you can quickly identify and remediate these problems, applications are far more likely to operate as intended.
    By Andrew Froehlich , 10/04/2018

6 Ways SD-WAN Simplifies Network Management

John Edwards News
  • SD-WAN offers network management capabilities that can streamline operations while lightening workloads.
    By John Edwards , 10/03/2018

Getting Multi-cloud Right with Per-app Architectures

Lori MacVittie News
  • How by-the-app solutions can tackle common cloud migration roadblocks including ramp up, risk management, and operational overhead.
    By Lori MacVittie , 10/02/2018

4 Traits of a Cyber-Resilient Culture

Ericka Chickowski News
  • Companies with a solid track record of cybersecurity share these practices and characteristics.
    By Ericka Chickowski , 10/01/2018