Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors.
The technology industry operates on micro and mega cycles of innovation. Micro cycles happen every hour, day, week and year. Mega cycles are far more rare, occurring every 20 years or so, like the leap from mainframes to client-server computing.
We are now entering the next mega innovation cycle. As with the previous seismic shifts, the benefits will be massive for those who adapt and potentially catastrophic for those who do not. We all know the compute layer is moving to the cloud – we’ve been watching this shift for years. Big Data, mobility, and the Internet of Things (IoT) are well on their way. Security, which seems to grab all the headlines lately, is still clearly a work in progress.
To read this article in full or to leave a comment, please click here

If you look across a wide array of networking problems, you will see what is an apparently wide array of dissimilar and unrelated problems engineers deal with on a daily basis. For instance—
Over my years as a network engineer, I’ve always treated these as separate sorts of problems, each with their own tradeoffs, concepts, and models. In fact, I’ve been a kindof “collector of models” over the years, trying to find different models to address each situation. In the Art of Network Architecture, there’s an entire chapter on the models Denise and I have run in to over the years, where they seem to be useful, and where they seem to be limited. 
But keeping all of these models in my head didn’t help me generalize the problems I faced in building and troubleshooting networks. For instance, in the flooding domain instance Continue reading
VMware's newest exec has been running a dominant white-box franchise.
Several key industry changes are driving the creation of a new class of converged data center infrastructure. Read this article to explore the essence of those changes & the resulting impact on resource management & cost saving.
Although vendor-written, this contributed piece does not advocate a position that is particular to the author’s employer and has been edited and approved by Network World editors.
It’s a cliché, but “change is the only constant.” Every company periodically reviews and makes changes to their applications, processes and solutions they use to conduct business. And nowhere is this rationalization more important than in the ever-shifting and increasingly perilous arena of cyber security.
Companies often begin the security rationalization process after accumulating a portfolio of tools over the years (i.e. penetration testers, web-application, and code scanners) or through mergers and acquisitions or shifting business strategies.
To read this article in full or to leave a comment, please click here
Traditional perimeter-based approaches to security are not enough to protect against increasingly sophisticated attacks that engineer their way into internal networks. Juniper introduces software-defined secure networks, a new model that integrates adaptive policy detection and enforcement into the entire network.
In today's WAN, network administrators need to complement traditional SNMP-based tools with active monitoring. NetBeez lets administrators constantly monitor end-to-end connectivity and performance for every site.
The post Simplifying WAN Complexity With Active Monitoring appeared first on Packet Pushers.
In today's WAN, network administrators need to complement traditional SNMP-based tools with active monitoring. NetBeez lets administrators constantly monitor end-to-end connectivity and performance for every site.
The post Simplifying WAN Complexity With Active Monitoring appeared first on Packet Pushers.
Here he comes to save the day! Serving, protecting, and troubleshooting -- 24-7-365.