• February 03, 2016 03 Feb'16

    What to make of switchdev and SAI

    This week, bloggers discuss switchdev and SAI, how vendors can improve their bug-catching efforts and the evolution of the Internet of Things.

  • February 03, 2016 03 Feb'16

    Apps milk benefits of strong network infrastructure design

    You wouldn't build a house without a floor plan or foundation. Likewise, says one IT pro, a robust network infrastructure design and deployment is vital to deliver advanced apps.

  • February 03, 2016 03 Feb'16

    You never know where you'll find a network deployment

    A network deployment can be a good reminder that IT isn’t always a desk job. Network engineers often go into cramped, dirty or unsafe places to install equipment.

  • February 03, 2016 03 Feb'16

    Encrypted network tunnel boosts bandwidth securely

    Faced with little time and strict security needs, U.S. Army network engineers came up with an inventive way to use a network tunnel to improve communications amid the Ebola crisis.

  • January 29, 2016 29 Jan'16

    Juniper targets DCI technology market for growth

    Juniper Networks sees sales growth in metro networks and the DCI technology market.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Why HC Lets You Rest Easy with Better Resiliency and Data Protection

      The true value of data protection is in making systems available after a failure. Data protection starts with surviving failure of server hardware components, then extends to recovering damage to a VM and further to recovering from the loss of a whole data center. A data protection strategy should address multiple levels of failure. It should offer the business certainty of the time to recover from each level and certainty of the potential data loss for each failure. SimpliVity has built data protection into their product from the lowest level. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • Simplify Your VDI With Hyperconvergence

      Deploying VDI is a major change in the way desktops are delivered. A “big bang” rollout is usually a recipe for disaster; a cautious approach has a much greater chance of success. A great way to start a VDI project is with a minimum viable VDI platform, which is the smallest VDI deployment you can build in order to see how VDI will work in the wild with your actual end-users. One of the reasons is that users are seldom doing what IT thinks they are doing. Users do what they need in order to get their job done, and it may not be what IT or management expects. Starting slowly means that any miscalculation can be adjusted before it impacts too many staff. See More

    View All Sponsored News
  • January 29, 2016 29 Jan'16

    2016 CIO top priorities revealed in survey

    This week, CIO top priorities revealed, Juniper Networks acquires BTI Systems -- an optical networking firm -- and Netronome introduces Agilio.

  • January 28, 2016 28 Jan'16

    New framework needed for open source switching

    This week, bloggers look into open source switching, enterprise network security changes in 2016 and how to assemble reliable technical teams.

  • January 28, 2016 28 Jan'16

    VMware's NSX virtual networking software ready for the cloud

    VMware plans to release this year a new version of its NSX virtual networking software. The product will connect enterprise data centers to public clouds.

  • January 21, 2016 21 Jan'16

    Dell's new switch OS could become much more after EMC merger

    Dell has introduced a Linux-based switch OS that is likely to become a major component of the company's data center infrastructure products.

  • January 21, 2016 21 Jan'16

    EMC-Dell merger means less competition

    This week, bloggers assess the impact of the EMC-Dell merger on IT purchasing and weigh Wi-Fi HaLow and sandboxes for network security.

  • January 15, 2016 15 Jan'16

    Cisco leads, HPE gains in key tech infrastructure markets

    Cisco led in six of seven key tech infrastructure markets last year, while Hewlett Packard Enterprise gained strength in several of the sectors, a research firm reported.

  • January 14, 2016 14 Jan'16

    Patch offered for breach in Juniper firewalls

    This week, a patch becomes available for Juniper firewalls, analysts parse IT employment statistics for 2015 and Aruba deploys 802.11ac for the U.S. Army.

  • January 14, 2016 14 Jan'16

    Cisco targets shadow IT with online cloud security broker

    Cisco has launched a cloud security broker that finds, monitors and analyzes employee use of online services.

  • January 14, 2016 14 Jan'16

    The 'sad state' of enterprise network architecture

    This week, bloggers explore enterprise network architecture challenges, the increasing danger of exploit kits and how best to oversee private cloud management.

  • January 11, 2016 11 Jan'16

    First 802.11ad products shipping soon for wireless office

    A Qualcomm Wi-Fi chipset scheduled for release this year will power 802.11ad products designed for the wireless office.