EXPERT ANALYSIS

LATEST CONTENT



Debunking Four Myths about Flow Data
News  |  12/18/2018
0 Comments
Enriched flow data technology has greatly matured with granularity for solving network incidents, configuration issues, capacity planning, and more. ...

Top 5 Principles in Becoming ‘Agile’ During Digital Transformation
News  |  12/17/2018
0 Comments
Organizations embarking on a digital transformation utilizing Agile concepts should give close consideration to these principles and the accompanying Do's and Don'ts. ...

Cloud Security Concerns: IT vs. LoB
News  |  12/14/2018
0 Comments
Data shows a divide in perceptions on cloud security between IT and lines of business. ...

2019 Predictions with Infrastructure Implications
News  |  12/13/2018
0 Comments
A move back to private cloud, serverless computing, microservices, and more will play a significant role in organizations next year. Is your infrastructure ready to handle the changes? ...

Navigating with Wireshark
News  |  12/12/2018
0 Comments
Tony Fortunato takes you on a quick Wireshark navigational exercise. In the video, he provides examples and discusses filters and other topics to get you started. ...

How SDN and Blockchain can help with IoT Privacy and Security?
News  |  12/11/2018
0 Comments
The main reason that blockchain can be considered for IoT security and privacy is that blockchain has built-in data protection and security mechanisms. ...

15 Top Companies for IT Job Postings
News  |  12/10/2018
0 Comments
You might be surprised by how few of the top tech employers are in the technology industry. ...

How to Keep Your Staff Current on Emerging Network Technologies
News  |  12/07/2018
0 Comments
Preparing your network team to get the most out of new tools and services requires patience and understanding. Here's how to make training and education pay off for your organization. ...

Managing a Chaotic Heterogeneous Network? You’re Not Alone
News  |  12/07/2018
0 Comments
Today’s reality is multi-vendor, hybrid environments that are hard to manage and secure. Those who can overcome these challenges can deliver greater performance and enhanced functionality for end users. ...

Immutable Infrastructure Use Cases
News  |  12/06/2018
0 Comments
Using immutable infrastructure prevents configuration drift and increases the speed to build or rebuild infrastructure, which translates into faster turn-around times for project delivery. ...

How Enterprises Can Use Digital Twins to Maximize Operational Efficiency
News  |  12/05/2018
0 Comments
Digital replicas interact with real systems and mimic changes that occur - as they occur. Digital twin adoption is growing due to the low cost, high storage and compute capacity of IoT and cloud. ...

Top 5 Challenges of Monitoring Multi-cloud Environments
News  |  12/04/2018
0 Comments
Today’s enterprises use many different clouds, which makes monitoring and management more difficult than ever. ...

6 Design Principles of the Modern LAN
News  |  12/03/2018
0 Comments
Modern LAN design can address a wide range of challenges that network architects and administrators are encountering today ...

Introducing Immutable Infrastructure
News  |  11/30/2018
0 Comments
An immutable infrastructure prevents common issues like configuration drift. It can bring more consistency and reliability in your infrastructure and a simpler, more predictable deployment process. ...

Continuous Chaos: Cloud, Containers, and Security in 2019
Commentary  |  11/29/2018
0 Comments
Cloud, containers, serverless, SDN, and security are just some of the technologies that will play a major role in IT in 2019. Hold on and expect next year to bring many changes.  ...

Preparing for 5G's Biggest Security Challenges
News  |  11/29/2018
0 Comments
The imminent arrival of a long-anticipated next-generation cellular technology presents some cutting-edge security challenges. Here's how to get ready. ...

Encrypted Traffic Reaches A New Threshold
News  |  11/28/2018
0 Comments
Over 72% of all network traffic is encrypted, and that figure is expected to grow. Unfortunately, very few security devices can inspect encrypted data without severely impacting network performance. ...

Higher Speed Ethernet Requirements Continue to Grow
News  |  11/27/2018
0 Comments
A wide variety of use cases drives demand for Ethernet speeds exceeding 100 Gigabit. In response, the industry is racing to deploy new signaling types to achieve these higher data rates. ...

10 Tips for Diagnosing Slow Applications
News  |  11/26/2018
0 Comments
Top network transport factors include high packet loss, high latency, high jitter, network path changes, Wi-Fi system performance, and insufficient network bandwidth.  ...

5 Ways to Improve Video and Real-time Enterprise Apps
Commentary  |  11/23/2018
0 Comments
By taking a more proactive approach to mobile worker connectivity, enterprises can not only significantly improve productivity but also decrease company support costs. ...

Cisco Expands Intent-Based Networking Portfolio
News  |  11/22/2018
0 Comments
The expansion of the portfolio brings IBN to the end-to-end network and can be deployed at customers of all sizes. ...

Edge Computing Security Dos and Don'ts
News  |  11/21/2018
0 Comments
Edge computing offers multiple benefits in an IoT environment, but one thing you don't want to be on the edge about is edge computing security. ...

Security Concerns Forcing Organizations to Rethink Cloud Strategies
News  |  11/20/2018
0 Comments
Securing today’s increasingly complex multi-cloud environments requires much more than simply having a security platform available on a particular infrastructure. ...

6 Tech Trends for the Enterprise in 2019
News  |  11/19/2018
0 Comments
Look for new technologies to emerge - and for emerging technologies to become the norm - in the new year. ...

Why We Need Self-Healing SD-WANs
Commentary  |  11/16/2018
0 Comments
Organizations need to build the necessary intelligence into their SD-WAN to anticipate problems and take corrective action. Only then will SD-WANs continue to work when outages come. ...