Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
News recap: Data center model could be new telecom central office
In telecom news, AT&T and ONOS Project held the first CORD proof-of-concept demo at Open Networking Summit, while Los Angeles may deploy municipal Wi-Fi. Continue Reading
Array SSL VPN pays dividends to bank
A Boston-area bank exploits its technology infrastructure to yield a competitive edge. Continue Reading
Carriers bet big on open SDN
AT&T and other carriers tell attendees at the Open Networking Summit they're committed to moving to open SDN. Google unveils Jupiter SDN platform at ONS. Continue Reading
-
BYOD, MDM streamlined with Xirrus Wi-Fi
Wi-Fi vendor Xirrus introduces EasyPass, a set of cloud-based Wi-Fi security services for enterprise customers. Continue Reading
ICYMI: Group issues open source NFV app to spur expansion
In this week's SDN news, the OPNFV Project releases its open source NFV platform to help companies add virtual functions while NEC releases two new switches to help build large software-defined data centers. Continue Reading
When it comes to system outages, don't prepare for the worst
Tracking and monitoring for common potential problems is more valuable and cost-effective than planning for massive systems outages -- which may never occur.Continue Reading
Cisco broadens SDN on Nexus switches
Cisco is using open SDN technology to make its Nexus switches more appealing to services providers, enterprises.Continue Reading
Arista EOS+ brings the programmable switch down to earth
A programmable switch sounds appealing to many enterprises, but few have the in-house expertise to take advantage of one. Arista's EOS+ software aims to make it far more accessible.Continue Reading
Data warehousing projects benefit from cloud and Hadoop
SN blogs: This week, analysts discuss a new way to network a campus LAN and if ACI and NSX can work well together.Continue Reading
Riverbed APM gets easier to deploy and use for enterprises
Riverbed introduced SteelCentral AppInternals 10. The latest APM product features a new, single interface and can be deployed in minutes.Continue Reading
-
Understanding the basics of a hybrid VPN
In part two of a three-part series, an expert looks at how hybrid VPNs are impacted by the shift from private services to the public Internet.Continue Reading
When the benefits of network virtualization aren't enough
Consultant Glen Kemp shares the story of a client who re-evaluated the benefits of network virtualization after encountering a platform bug.Continue Reading
Network analytics 2.0: Say hello to advanced operations analytics
Network analytics tools may improve visibility and performance, but advanced operations analytics can turn the network into something that brings value to the business.Continue Reading
When planning IT, orgs need analytics and big data
Networking expert Mike Jude says big data analytics isn't complete without cognitive computing. But a cognitive computing framework should not be taken lightly.Continue Reading
How to manage apps and make them behave
In today's competitive world, application performance is more important than ever. Enterprises are relying on a new generation of tools designed to let them diagnose application performance management issues -- identifying whether performance ...Continue Reading
Cloud and mobility call for new network defense tactics
As network attacks become more sophisticated, IT must equip itself with new network defense tactics.Continue Reading
Manage apps with APM tools, fix critical performance issues
IT pros need to consider new developments in technology like software-defined networking and the Internet of Things when choosing the best Ethernet switch for their current and future network.Continue Reading
What to consider when choosing the best Ethernet switch
IT pros need to consider new developments in technology like software-defined networking and the Internet of Things when choosing the best Ethernet switch for their current and future network.Continue Reading
When, not what, defines today's networking career
Learning new technologies is a constant challenge, but it is one that IT pros need to overcome to ensure a networking career remains relevant.Continue Reading
Service providers take cautious approach to NFV implementation
Service providers' strategies for NFV implementation are designed to minimize disruption while transitioning legacy architectures to a virtualized world.Continue Reading
Layer 4-7 network orchestration: Are we there yet?
Software-defined data centers and cloud are driving a need for Layer 4-7 network orchestration tools that can automate provisioning and lifecycle management.Continue Reading
MPLS fabric is natural fit for ISP backbone overlays
While data centers typically use an IP fabric under their network overlays, ISPs may find that MPLS fabric makes more sense as backbone underlays.Continue Reading
How network overlays could benefit provider backbones
ISPs are weighing potential benefits of network overlays in the backbone, including increased agility, faster service provisioning and lower Opex.Continue Reading
SN blogs: OpenStack deployments still lacking
SN blogs: This week, a research director explains that even though OpenStack is a popular open source framework, it's not seeing as many deployments as one might expect.Continue Reading
Networkers face tough slate of cloud and security decisions
Deploying a cloud service means it's time to craft new policies that govern security procedures.Continue Reading
How do you create a secure VPN tunnel?
Expert Julian Weinberger says that locking your VPN parameters can help secure your VPN tunnel by blocking users from changing configurations.Continue Reading
Time to replace RJ-45 connectors in the data center?
Ubiquitous RJ-45 connectors reign supreme even in the wake of newer data center technologies. USB 3.1 cables are out there; can they be the next big thing?Continue Reading
Hybrid cloud stresses application monitoring tools
Keeping tabs on application performance gets tougher in hybrid cloud situations. APM tools can help.Continue Reading
Gigamon gets NIA award for network traffic visibility platform
Gigamon wins this month's SearchNetworking Network Innovation Award for its HC2 modular fabric node for network traffic visibility.Continue Reading
Is big data implementation always a custom project?
An expert says it's important to figure out your big data objectives before purchasing hardware or software from a vendor.Continue Reading
Why one IT pro’s network upgrade led him from Cisco to Dell
In this Q&A, one network admin explains how rapid growth at his company prompted a massive network upgrade that included migrating from Cisco to Dell.Continue Reading
Gaps remain in wireless networking education, but need for skills grows
The WLAN is the new LAN, but many networking education programs don’t reflect that. There’s a wireless skills gap, and it needs to be addressed.Continue Reading
WAN 2.0: Say goodbye to network provisioning delays
Network engineers have long suffered the consequences of slow provisioning times for many traditional wide area network (WAN) connections like point-to-point T1 lines or MPLS networks. They're at the mercy of carriers that can take as long as three ...Continue Reading
Grappling with private WAN provisioning delays in the on-demand era
Long lead times are not a new problem in private WAN provisioning, but enterprises are feeling the pain of those delays more acutely.Continue Reading
The race toward multigigabit speeds, and more
Ethernet -- that most fundamental of network technologies -- is occupying center stage again as the IEEE and vendors release new standards and products governing its deployment. But this time, faster speed isn't the whole story. The advent of ...Continue Reading
'Network Know-How' offers network troubleshooting techniques
Download this free chapter excerpt from "Network Know-How" to gain insight into basic network troubleshooting techniques. Identify and solve most networking errors in your environment.Continue Reading
Why monitoring will require a networking engineer
Despite the evolution of networking, monitoring has remained the same. And that's one reason why the role of the network engineer will remain critical.Continue Reading
Getting clarity on delivering video conferencing services
The technology that the inventors of the 1960s Picturephone visualized is at last within reach. Here's how to implement and manage video conferencing today, and factor in cloud services too.Continue Reading
Network management projects top list of 2015 IT initiatives
According to TechTarget’s 2015 IT Priorities Survey, 44% of enterprises are planning network management projects this year.Continue Reading
A unified view: How to manage and monitor networks today
Enterprise networks are increasingly complex, with a variety of wired and wireless connections linking locations that can include multiple clouds, branch offices and headquarters. The enterprise network must provide access to an ever-wider variety ...Continue Reading
Intuit solves taxing problem with system availability tools
Intuit uses application monitoring to ensure glitch-free performance during tax time.Continue Reading
Named Data Networking project wants to retire TCP/IP
TCP/IP is buckling under the demands of today's Internet, according to researchers who want to replace it with a new Internet protocol stack. Their solution: Named Data Networking.Continue Reading
How to make legacy and emerging network technologies work together
Emerging network technologies like SDN and NFV have to interwork with legacy equipment and be managed as one. Find out what it will take to get there.Continue Reading
How to protect your IPv6 address management
Expert Fernando Gont explains how to probe whether your IPv6 address components are vulnerable to attack.Continue Reading
Avoiding the pitfalls of virtual network functions takes planning
Building a network functions virtualization framework means understanding which features, or functions, are most important. Tread carefully.Continue Reading
How to avoid IPv6 neighbor discovery threats
If you're ready to deploy IPv6, get ready to understand neighbor discovery and its vulnerabilities.Continue Reading
What is the security impact of enterprise IoT?
Software management at the device level is key to mitigating security risks in the enterprise when IoT arrives.Continue Reading
Managing mobility means understanding EMM
As enterprises become more mobile, enterprises need to understand the tools available to help them manage that growth.Continue Reading
What buyers need from Wi-Fi access point upgrades
A recap of SearchNetworking's How to Buy series, which teaches IT professionals what to keep an eye on when buying new products for their networks.Continue Reading
Hotel Wi-Fi security crumbles in wake of bored IT admin
What happens when a bored IT admin meets a hotel Wi-Fi network that does not want to cooperate?Continue Reading
Three VoIP quality killers
Managing VoIP quality is a constant headache for engineers. Here are some ways to avoid some common problems.Continue Reading
Faster wireless means wireless security policies need an update
Faster wireless technology is now widely available, but are your network's security policies up to the task?Continue Reading
Cloud-managed wireless: Why network engineers love it
Cloud-managed wireless is growing three times faster than the wireless LAN market as a whole. Network engineers rave about its benefits, but it's not for everyone.Continue Reading
How to build a network for Open vSwitch testing
Setting up an Open vSwitch test network can be as simple as downloading code, deploying it on x86 servers and attaching storage disks. Here's how to get started.Continue Reading
Common DNS record types: What they mean
The domain name resolution process has many steps. Our expert walks you through some of the most common.Continue Reading
NFV basics: A guide to NFV implementation, challenges and benefits
A network functions virtualization implementation brings challenges and benefits for users. Learn how NFV works, its relation to SDN, and real-life use cases in this Essential Guide.Continue Reading
With MPLS-TP and SDN, a simpler dynamic control plane
MPLS-TP transforms carrier networks for packet switching, but SDN could take it a step further. Combining the technologies, engineers could reduce complexity in the dynamic control plane and gain flexible service creation.Continue Reading
SDN and network virtualization: How do they work together?
There are different ways to implement network virtualization in a software-defined network. Jim Meztler explains network virtualization and SDN, and how the two can work together.Continue Reading
Why you need software-defined security for your SDN
The network architecture shift to software-defined networking requires software-defined security, not a hard-wired security approach.Continue Reading
Picking the best firewall software, hardware or application
Transforming the image of securityContinue Reading
Six considerations for big data networks
Big data networks must be built to handle distributed resources that are simultaneously working on a single task. That'll require network resiliency, consistency and application awareness.Continue Reading
Aggregation in IPv6 routing curbs effects of Internet growth
IPv6 addresses are four times larger than those based on IPv4, but experts say that doesn't mean IPv6 will slow down routers. In fact, IPv6 routing makes route aggregation simpler, which leads to smaller routing tables.Continue Reading
Open Network Install Environment gives end users network OS choices
The Open Network Install Environment's community of vendors offers an open install environment for bare-metal switches using its Linux-based OS installer.Continue Reading
Umpqua Bank employs NSX, micro-segmentation for enterprise security
Umpqua Bank's Sam Guidice tells how the organization deployed VMware's NSX as part of its effort to utilize micro-segmentation for enterprise security.Continue Reading
Three new takes on WAN optimization
Once considered new technology, WAN optimization is now widespread, and enterprises are including it in their networks from the start. Now that WAN optimization is mature, what's the next step for WAN management? Application delivery optimization ...Continue Reading
Using the Link Layer Discovery Protocol to reveal disparate devices
The Link Layer Discovery Protocol is a helpful tool when you need to know what's connected in your network -- regardless of vendor.Continue Reading
Upgrading the core when network downtime isn't an option
Network downtime is often a necessary evil for network upgrades, but in the world of 24/7 broadcast media, maintenance windows are hard to come by.Continue Reading
Network programming skills from scripting to DevOps: What to learn
Networking pros don't need to become code monkeys, but a little network programming can go a long way toward advancing their careers.Continue Reading
Pervasive protection is the new security paradigm
Pervasive protection encompasses risk management, forensics, identity authentication and risk management to provide a centralized approach to security management that protects your enterprise network in a modern IT landscape.Continue Reading
Implementing a new security management plan
To respond to increased cyberthreats, enterprises need to form their network's security plan around the idea of pervasive protection, which is based on the notion of a centrally managed security system.Continue Reading
Cisco iWAN marries MPLS and Internet for WAN aggregation
With Cisco iWAN, engineers optimize WAN performance by dynamically aggregating MPLS and Internet resources.Continue Reading
Content distribution networks: Separating fact from hype
Content distribution networks can accelerate cloud applications and services, but only if companies know what they're looking for.Continue Reading
Why not replace routers with smart switches?
In this Q&A, one network manager discusses how he's ripping out routers and replacing them with smart switches at sites with Ethernet WAN transport.Continue Reading
MPLS networks not obsolete, but Internet as WAN catches up
MPLS networks have been the undisputed king of WAN services for years, but more enterprises are looking at supplementing them with Internet services.Continue Reading
How to buy: What to look for in 802.11ac access points
If you're in the market for 802.11ac access points for your wireless LAN, find out what features are essential when it's time to buy.Continue Reading
Wireless expense management shouldn't spook employees
Tom Nolle discusses the dos and don'ts of wireless accounting and the steps enterprises must take to address BYOD expense management.Continue Reading
Overlay networks: Understanding the basics, making it a reality
Network overlays place a virtual network over the physical infrastructure for dynamic provisioning and orchestration of network resources.Continue Reading
Good BYOD expense management hinges on clear telecom expense policies
A cohesive telecom expense management program must be based on clear policies governing how employees are reimbursed for using their own devices.Continue Reading
Identify this network convergence nomenclature: You could be a winner
As the admin and platform owner of a project, Patrick Hubbard has to monitor everything, and he coined a new term that describes that responsibility.Continue Reading
How to manage bandwidth hogs of the mobile device age
Personal mobile devices will hog your network resources unless you are prepared. Here is what network admins must do now.Continue Reading
Five software-defined data center tips to consider before investing
The software-defined data center combines programmable networks, servers and storage. But these SDDC tips show you what to look for beyond basic flexibility.Continue Reading
802.11ac Wi-Fi takes the lead, but wired network has to play backup
As adoption of the new 802.11ac Wi-Fi standard picks up, wired networks must be ready to support faster speeds and greater capacities it brings.Continue Reading
Complex apps need network-based application performance management tools
As more networking pros get pulled into application performance management, they need tools that speak their language. Meet network-based APM.Continue Reading
Software-based routers on x86 servers are becoming reality
With stronger processing power and advanced software features, software-based routers are becoming a reality -- but only in some cases.Continue Reading
Boost your network productivity for free with 'lost things'
Like Tinker Bell, network engineers can work magic by sprinkling fairy dust on formerly dormant equipment. And it doesn't cost a cent.Continue Reading
Using dynamic ARP inspection to stop sniffing attacks
Expert Michael Gregg discusses how dynamic Address Resolution Protocol inspection helps prevent hackers from penetrating enterprise switches.Continue Reading
OpenStack networking and orchestration: What's possible?
OpenStack's networking service, Neutron, integrates provisioning and management of network resources into the orchestration of IT infrastructure.Continue Reading
Network engineer job description will evolve, not evaporate, with SDN
Most networking pros won't need to become programmers to survive. SDN will expand the network engineer's job description, not invalidate it.Continue Reading
Expert discusses must-haves for secure VPN implementations
Expert lists strong encryption settings and security policies, among others, as ways to use security and design to strengthen VPNs.Continue Reading
In SDN optical networks, centralized control and scalability
Technology for SDN optical networks is emerging and with it comes centralized control and dynamic bandwidth provisioning in the WAN.Continue Reading
SDN security issues: How secure is the SDN stack?
The security and integrity of software-defined networking remains unproven, particularly the controller, which is a single point of failure.Continue Reading
Enhance service delivery model with WAN, application optimization
This Essential Guide looks at today's WAN and the steps needed to ensure your WAN remains reliable, secure and scalable enough for tomorrow's needs.Continue Reading
Hyper-V logical networks: The answer to scalability
When it comes time to scale Microsoft virtual environments, engineers must use Hyper-V logical networks, which enable wider connectivity.Continue Reading
Hyper-V networking: The three virtual switches that fuel connectivity
In this Hyper-V networking primer, learn about the three virtual switches behind Microsoft virtualization connectivity.Continue Reading
F5 wins networking award for BIG-IP's platform intelligence
F5 wins this month's SearchNetworking Network Innovation Award for the programmability and intelligence added to version 11.4 of its BIG-IP software.Continue Reading
New network architectures and traditional components: Why both are key
The next stage in network architecture's evolution is upon us. An SDN future is certain. What's less clear is how quickly it will become the norm, and what network architects should do in the meantime to keep their systems healthy and operational.Continue Reading
SDN and NFV: Show me the business benefits
SDN and NFV offer exciting new features, such as network automation, but are we able to prove the business benefits of this new technology?Continue Reading
Aerohive helps manage mobile devices and Wi-Fi infrastructure together
Aerohive adds the ability to manage mobile devices to its Wi-Fi management platform, combining mobile device management and network management.Continue Reading
The SDN transition: Understanding SDN vendors, concepts and challenges
SDN expert Ethan Banks breaks down what network engineers need to know about SDN vendors, architectures, products and operational requirements.Continue Reading
What features do providers need in cloud orchestration software?
What capabilities should providers look for in cloud orchestration software? Expert Paul Parker-Johnson discusses different features.Continue Reading