EXPERT ANALYSIS


Improving DevOps Security Practices

Brett Johnson News
  • Security is often an afterthought, but DevOps engineers should make it a priority by taking these factors into consideration.
    By Brett Johnson , 8/16/2018

NVMe over Fabrics: Fibre Channel vs. RDMA

Sagar Nangare Commentary
  • For enterprises deploying NVMe over Fabric, choosing between Fibre Channel and RDMA can be difficult, because both have advantages and disadvantages.
    By Sagar Nangare , 8/15/2018

Troubleshooting Application Configuration for Security

Tony Fortunato Commentary
  • In this video, Tony Fortunato uses Wireshark to show you how to get an application to run through a firewall.
    By Tony Fortunato , 8/14/2018

8 Networking Startups Shaking Up the Industry

Andrew Froehlich Slideshow
  • The hottest networking startups are leveraging trends like artificial intelligence and interoperability as well as building on tried and true technologies of the past.
    By Andrew Froehlich , 8/13/2018

Redefining Active-Active Network Connections

Peter Welcher Commentary
  • Network device and data center connections often described as "active-active" might be better termed "psuedo active-active."
    By Peter Welcher , 8/13/2018

Cloud Intelligence Throwdown: Amazon vs. Google vs. Microsoft

Kelly Sheridan News
  • A closer look at native threat intelligence capabilities built into major cloud platforms and discussion of their strengths and shortcomings.
    By Kelly Sheridan , 8/10/2018

IoT: The Operational View

Rick Vanover Commentary
  • The internet of things offers many potential benefits for a business, but companies need to consider deployment and management issues before taking the plunge.
    By Rick Vanover , 8/10/2018

Network Security Shrinks to Zero-Trust

Daniel Conde Commentary
  • The traditional network security perimeter has become smaller and smaller as attackers become more sophisticated. But how practical is the zero-trust model?
    By Daniel Conde , 8/09/2018

How to Configure 2 IP Addresses

Tony Fortunato Commentary
  • There are multiple occasions for which you may need two IPv4 addresses. This video from Tony Fortunato explains how to configure them.
    By Tony Fortunato , 8/08/2018

6 DevOps Books for IT Professionals

CYNTHIA HARVEY Slideshow
  • If you’re an IT infrastructure professional, chances are good that your organization has already adopted DevOps or will do so soon. These DevOps books can help you get up to speed.
    By CYNTHIA HARVEY , 8/07/2018

802.11ax WiFi: Promising, but Challenging

Lee Badman Commentary
  • The new standard offers faster WiFi and lots of new features, but WLAN engineers should approach it with a healthy dose of skepticism.
    By Lee Badman , 8/06/2018

Network Security Analysis: A New Approach

Adam Wick, Research Lead, Mobile Security & Systems Software, Galois Commentary
  • A collaborative, peer-to-peer strategy provides several advantages over the traditional siloed approach to detecting and mitigating cyberthreats.
    By Adam Wick, Research Lead, Mobile Security & Systems Software, Galois , 8/03/2018

Multifactor Acquisition: Cisco Plans to Buy Duo for $2.35B

Kelly Sheridan News
  • Cisco intends to use Duo's authentication technology to ramp up security across hybrid and multicloud environments.
    By Kelly Sheridan , 8/02/2018

Applying AI to Network Analytics

John Edwards News
  • AI-powered analytics can streamline network performance and slash costs, but only when humans properly apply the technology.
    By John Edwards , 8/02/2018

Using SDKs to Manage Infrastructure as Code

Brett Johnson Commentary
  • Learn what an SDK is and how it can help you write scripts for infrastructure management.
    By Brett Johnson , 8/01/2018

Selecting an ISP for Business: Factors to Consider

Dan Conde Commentary
  • Price is an obvious consideration when picking an ISP, but security and co-location services are among other important criteria to consider.
    By Dan Conde , 7/31/2018

Top 3 Takeaways from Google Cloud Next '18

Mike Lyon, Scale Computing Commentary
  • At Google Cloud Next '18, hot topics included security, artificial intelligence and machine learning, containers, and hybrid cloud.
    By Mike Lyon, Scale Computing , 7/30/2018

Free WiFi Analysis Tool: WiFiInfoView

Tony Fortunato Commentary
  • In this video, Tony Fortunato explains some WiFi troubleshooting basics and demonstrates a free WiFi utility for Windows.
    By Tony Fortunato , 7/30/2018

AI in Business: Getting Started

Curtis Peterson Commentary
  • Artificial intelligence technologies are within the reach of every business. Here's how to start taking advantage of them.
    By Curtis Peterson , 7/27/2018

Decoding the Sysadmin

SolarWinds Slideshow
  • Celebrate SysAdmin Day with an entertaining look at what those outside of IT think sysadmins do.
    By SolarWinds , 7/26/2018