Issue OverviewNetwork Evolution - August 2011 Vol. 2, No. 4
Engineers need better automation and monitoring tools for private cloud computing before it hits the big time. In this e-zine, get the inside scoop OpenFlow networking, including what vendors don't want you to know. Next, in a case study on Zappos, learn about how the online retailer created a cloud security strategy. Finally, learn about why network administrators are using private cloud orchestration software, and how it can be used to help your business. Access >>>
Premium Content for Free.
Developing a private cloud computing strategy for your network
by Shamus McGillicuddy
Engineers need better automation and monitoring tools for private cloud.
- Developing a private cloud computing strategy for your network by Shamus McGillicuddy
Is OpenFlow networking bunk? What vendors don't want to discuss
by Ivan Pepelnjak
OpenFlow networking may offer programmable switching in distributed networks, but there are drawbacks, including the fact that someone has to develop using the specification.
Zappos cloud security strategy: Distributed management
by Rivka Gewirtz Little
Zappos might be owned by cloud king Amazon, but the organization is still grappling with creating a measured cloud security strategy. The answer? Distributed management.
Networker's guide to private cloud orchestration
by Michael Brandenburg
Network admins are turning to private cloud orchestration software that uses integrated service catalogues in order to enable automation and on-demand provisioning.
- Is OpenFlow networking bunk? What vendors don't want to discuss by Ivan Pepelnjak
More Premium Content Accessible For Free
The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...
WebRTC, an emerging standard for embedding voice and video-conferencing applications into Web browsers, is aimed at making real-time communications ...
Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...