Issue OverviewNetwork Evolution - August 2011 Vol. 2, No. 4
Engineers need better automation and monitoring tools for private cloud computing before it hits the big time. In this e-zine, get the inside scoop OpenFlow networking, including what vendors don't want you to know. Next, in a case study on Zappos, learn about how the online retailer created a cloud security strategy. Finally, learn about why network administrators are using private cloud orchestration software, and how it can be used to help your business. Access >>>
Premium Content for Free.
Developing a private cloud computing strategy for your network
by Shamus McGillicuddy
Engineers need better automation and monitoring tools for private cloud.
- Developing a private cloud computing strategy for your network by Shamus McGillicuddy
Is OpenFlow networking bunk? What vendors don't want to discuss
by Ivan Pepelnjak, CCIE No. 1354, Fast Packet Blogger
OpenFlow networking may offer programmable switching in distributed networks, but there are drawbacks, including the fact that someone has to develop using the specification.
Zappos cloud security strategy: Distributed management
by Rivka Gewirtz Little, Senior Site Editor
Zappos might be owned by cloud king Amazon, but the organization is still grappling with creating a measured cloud security strategy. The answer? Distributed management.
Networker's guide to private cloud orchestration
by Michael Brandenburg
Network admins are turning to private cloud orchestration software that uses integrated service catalogues in order to enable automation and on-demand provisioning.
- Is OpenFlow networking bunk? What vendors don't want to discuss by Ivan Pepelnjak, CCIE No. 1354, Fast Packet Blogger
More Premium Content Accessible For Free
More -- and more complex -- mobile devices are jumping on your enterprise network, gobbling up bandwidth from the WLAN infrastructure. This technical...
Whenever users complain about an application being slow, the network is always first to be blamed. And yet network engineers often have limited ...
Just five years ago, no one would have described Wi-Fi as a primary access technology but now, as Wi-Fi and cellular architectures deliver security, ...