Author Archives: ssalamone1
Author Archives: ssalamone1
Just like SIP trunking cut voice transport costs by 50%, SD-WAN can do the same, which is why there's so much hype.
Enriched flow data technology has greatly matured with granularity for solving network incidents, configuration issues, capacity planning, and more.
Organizations embarking on a digital transformation utilizing Agile concepts should give close consideration to these principles and the accompanying Do's and Don'ts.
A move back to private cloud, serverless computing, microservices, and more will play a significant role in organizations next year. Is your infrastructure ready to handle the changes?
New applications, an explosion in mobile device use, and IoT are driving Wi-Fi connectivity needs through the roof. 802.11ax tries to address the issues while creating new opportunities and services.
Today’s reality is multi-vendor, hybrid environments that are hard to manage and secure. Those who can overcome these challenges can deliver greater performance and enhanced functionality for end users.
Digital replicas interact with real systems and mimic changes that occur - as they occur. Digital twin adoption is growing due to the low cost, high storage and compute capacity of IoT and cloud.
Over 72% of all network traffic is encrypted, and that figure is expected to grow. Unfortunately, very few security devices can inspect encrypted data without severely impacting network performance.
A wide variety of use cases drives demand for Ethernet speeds exceeding 100 Gigabit. In response, the industry is racing to deploy new signaling types to achieve these higher data rates.
By taking a more proactive approach to mobile worker connectivity, enterprises can not only significantly improve productivity but also decrease company support costs.
‘Tis the season… for the best shopping deals! What’s on tech pros’ must-have technology list for 2019?
The expansion of the portfolio brings IBN to the end-to-end network and can be deployed at customers of all sizes.
In honor of the Thanksgiving holiday, we’ve put together a few handy tips on how to avoid becoming the network turkey. While many may enjoy it at the family dinner table, nobody wants to be the turkey at work, causing disruptions for their coworkers and organization.
Securing today’s increasingly complex multi-cloud environments requires much more than simply having a security platform available on a particular infrastructure.
Look for new technologies to emerge - and for emerging technologies to become the norm - in the new year.
Organizations need to build the necessary intelligence into their SD-WAN to anticipate problems and take corrective action. Only then will SD-WANs continue to work when outages come.
For all of the excitement about the coming 5G mobile networks, there are a few words of caution from security experts.
Automation has many positives, but also decreases NetOps’ understanding of the network. To overcome this, NetOps need tools designed to better understand, manage, and troubleshoot their infrastructure and applications.
As security efforts evolve from the fixed edge to the elastic edge, organizations need to combine traditional and new best practices to keep their networks safe from today’s evolving cyber threats.
Retailers face serious challenges and opportunities as consumer shopping behavior and expectations evolve. The lessons learned in addressing the challenges have applications in many enterprise settings.