Empirix’s service assurance platform and analytics monitoring software underwent interoperability testing with Huawei's evolved packet core, and passed.
Cisco recently said its partnership with Ericsson was languishing. But its relationship with Samsung is moving full-steam ahead.
Recent surveys show surging use of serverless platforms and the potential for performance benefits. But deployment challenges could open the door for Kubernetes to act as an orchestrating element.
A complete buyout of VMware by Dell Technologies would have likely sparked an employee and shareholder revolt. But that option may still be on the table.
If only it was wireless
When you need to change the network configuration, the old cut-and-paste method can be quicker than automation via an API, but there are reasons networking pros need to adopt automation.
If IT and operations teams thought it was hard to contend with BYOD and Shadow IT, they must prepare for the latest siege on IT — the Internet of Things.
Very early in our careers, we learn about physical and logical network segmentation. Generally speaking, that understanding comes in the form represented by the diagrams below.

Depending on the work environment of an individual, it may take some time before they are exposed to the methods that provide segmentation to routed parts of the network. Looking at the diagram above, let’s think about what is being accomplished in each example. The physical segmentation provides full isolation between the two hosts. This article examines the construct used to extend segmentation into a routed network. We will not get into the configuration details but will share some links to additional content that can provide practical guidance on the configuration.
VLANs only provide segmentation at layer 2. This would provide isolation for things like ARP and other broadcasts. VLANs would also provide full segmentation if a router didn’t exist for a given VLAN. However, it is often necessary to extend this into the routed portions of our networks. In the above example, I would expect properly configured routers and switches to allow the two hosts on the right to communicate with one another. What if that is not the goal? We might consider Continue reading
In this series of videos, David Bombal shows you how to configure both authentication protocols for network access control.
Learn how to select a WiFi access point with the best antenna for your design.
This feels like progress.