IT Operations and the Cloud Skills Gap

Lori MacVittie Commentary
  • Enterprises jeopardize their automation efforts if they don't invest in developing their network and security teams' cloud skills.
    By Lori MacVittie , 3/20/2018

Data Protection in the Public Cloud: 6 Steps

Jim O'Reilly Slideshow
  • Follow these tips for securing corporate data when using public cloud services.
    By Jim O'Reilly , 3/15/2018

'Slingshot' Cyber Espionage Campaign Hacks Routers

Kelly Jackson Higgins News
  • Security researchers uncover advanced hacking group targeting MikroTik routers in Africa and Middle East.
    By Kelly Jackson Higgins , 3/12/2018

Top Trends Impacting Enterprise Infrastructure

Interop Content Team Slideshow
  • Interop ITX Infrastructure Chair Keith Townsend provides guidance on hyperconvergence, cloud migration, network disaggregation, and containers.
    By Interop Content Team , 3/12/2018

Interop ITX 2018: Meet the Infrastructure Experts

Marcia Savage Slideshow
  • Here are some of the top-notch experts who will talk about networking, containers, cloud, open source, and more in Las Vegas.
    By Marcia Savage , 3/05/2018

Is NAT a Bad Thing?

Peter Welcher Commentary
  • Peter Welcher examines the pros and cons of Network Address Translation and describes design scenarios. 
    By Peter Welcher , 3/02/2018

IT Automation: Not Just for the Big Dogs

Michael Bushong Commentary
  • Hyperscale companies like AWS have led the way on automation, but enterprise IT can close the gap by following these steps.
    By Michael Bushong , 3/02/2018

Wireshark: Configuring Interface Displays

Tony Fortunato Commentary
  • Learn how to control what interfaces you see when using the network analyzer for troubleshooting.
    By Tony Fortunato , 2/28/2018

Data Center IPS Products Put to the Test

Marcia Savage News
  • NSS Labs releases its test results for intrusion prevention systems, including products from Juniper and Fortinet.
    By Marcia Savage , 2/26/2018

Amazon Route 53: Concepts and Configurations

Packt Publishing Commentary
  • In this excerpt from "Practical AWS Networking," learn about Amazon's DNS service.
    By Packt Publishing , 2/09/2018

Converged Infrastructure Gaining Ground in Federal Agencies

Caroline Boyd, Director of Government Programs, MeriTalk Commentary
  • MeriTalk research highlights federal interest in integrated technology, but also security concerns.
    By Caroline Boyd, Director of Government Programs, MeriTalk , 2/08/2018

Full-Stack Engineer: 3 Key Skills

Cynthia Harvey News
  • Interop ITX expert Scott Lowe explains the growing demand for infrastructure generalists.
    By Cynthia Harvey , 2/06/2018

5 Intent-Based Networking Vendors

Marcia Savage Slideshow
  • A look at some players in an emerging market that aims to radically transform how networks are built and managed.
    By Marcia Savage , 2/05/2018

3 Bad Habits NetOps Should Avoid

Lori MacVittie Commentary
  • Don't make these mistakes when adopting DevOps for production network automation and orchestration.
    By Lori MacVittie , 2/01/2018

How Spectre and Meltdown Impact Data Center Storage

Chris M Evans Commentary
  • Chris Evans assesses the storage-related fallout from the CPU vulnerabilities.
    By Chris M Evans , 1/29/2018

Cisco Acquires Secure Hyperconvergence Startup

Network Computing Editors News

Fallout from Rushed Patching for Meltdown, Spectre

Kelly Jackson Higgins News
  • Not all systems require full patching for the flaws right now, anyway, experts say.
    By Kelly Jackson Higgins , 1/24/2018

5 Hot Networking Skills for 2018 and Beyond

Andrew Froehlich Commentary
  • Network pros need a wide range of skills to manage cloud, network security, and more.
    By Andrew Froehlich , 1/22/2018

The Role of Security in Edge Computing

Jeremy Hess, Community Manager, Cloudify Commentary
  • A look at what's needed to mitigate IoT security threats.
    By Jeremy Hess, Community Manager, Cloudify , 1/19/2018

5 Ways Network Security Will Evolve in 2018

Andrew Froehlich Slideshow
  • A look at how network protection will change as cyberthreats continue to escalate.
    By Andrew Froehlich , 1/16/2018