Welcome!


Feature

Companies that until recently had never heard of the Internet of things (IoT) are now excited to find that they’ve been IoT players all along. Businesses involved in home automation, security services, vehicle tracking and health monitoring to name a few have been around for a while. T...
Data efficiency – the combination of technologies including data deduplication, compression, zero elimination and thin provisioning – transformed the backup storage appliance market in well under a decade. Why has it taken so long for the same changes to occur in the primary storage ap...
With the capability to reduce both CapEx and OpEx, it’s easy to see why the SDN-NFV trend has taken hold in the hosting and mobile industry. Early use cases include network virtualization from cloud service providers and enterprise data centers, bandwidth calendaring and network tappin...
In my last blog, I looked at the evolution of technology as we move to virtualization. What will this new development mean for business models, industry developments and industry players? Virtualization means that everything will run on commodity hardware – the same as the rest of the...
With the growing number of applications in use in today’s enterprises, you as a network administrator are surely noticing some new challenges. Many IT professionals responsible for supporting applications in data center and cloud environments continue to see growth in the number of app...
As technology evolves, business models evolve. The corner grocery store gave way to the emporium, which became the supermarket. Now we order groceries online with a credit card, and a truck turns up with the goods. Hansom cabriolets became taxis and limos, and now we have Uber. At one ...
5G Networks are being discussed and better defined by key industry manufacturers and network carriers so they can be deployed in the 2020 time period. They will represent a giant leap in capacity, baseline speeds and overall capabilities. They have to. Consumers are turning to Smart...
I was asked by Mr. Peter Hastings (NH DoIT Commissioner) about my understanding and knowledge of "End to End Solutions". I have witnessed these solutions before but I wanted to find a good definition. So, I began my research and found this definition: One supplier or one company that c...
American comedian Louis C.K. once observed on Late Night with Conan O’Brien that ”everything is amazing and nobody is happy.” And you know what? He’s right. He riffs about people complaining about the uncomfortable seats on a plane – despite the fact that they are partaking in the mi...
“Software-defined,” like any new trend that technology companies rush to attach to has suffered from marketing hype. Starting in mid-2012 with the acquisition of Nicera by VMware, most traditional infrastructure technology vendors across compute, networking, and storage have some messa...
Despite the fact that the net neutrality debate is a discussion that has been ongoing for years, a January 14th ruling from the United States Federal Court of Appeals has stirred the pot once again. The court’s decision has created a renewed upsurge in comments, opinions and future-gaz...
Within the ThreatConnect Intelligence Research Team (TCIRT), we feel that sharing what we know, whether publicly or privately, helps to grow our organization. We see information sharing as a key investment area, allowing our team to more efficiently save time and money while helping u...
German telco EWE TEL has solved performance complexity across an extended enterprise billing process by using service virtualization, which improved applications performance and gained predictive insights into composite application services behavior. To learn more about how EWE is lev...
Today’s software-defined networking (SDN) and virtualized networking solutions focus on virtualizing network functionality within the data center and the metropolitan area network (MAN). But for typical enterprises, and those managed and cloud service providers that cater to them, thes...
In my last blog, I looked at the ways in which Software-Defined Network (SDN) and Network Functions Virtualization (NFV) enhance flexibility and allow for greater services mashups, and I ended with the question of how billing and compensation will support these new capabilities. With ...
In my previous blog, I suggested that both Software-Defined Networks (SDN) and Network Function Virtualization (NFV), although arguably different in intent and in detail, are nevertheless both driving the evolution of network architecture in the same direction. Network functions are ab...
In a previous blog I took the opportunity to comment on the role of billing in a future of Software Driven Networks (SDN). However, before we get too caught up in the billing component, it might be worthwhile to discuss where SDN itself is going and to tease out some of the distinction...
In just a few short recent years the idea of software-defined networks (SDN) has moved from a theoretical academic concept to a real-life practical proposition for making the world’s telecommunications networks more efficient, cost-effective, easier to manage and resilient. The SDN con...
Imagine you work at a company preparing to issue its quarterly earnings report. The phone rings. It’s bad news. A coworker has discovered that a former employee has been logging into the company’s network for months. It’s unclear whether the former employee has used this illicit access...
Identity and access management solutions provide governance and visibility capabilities that enable organizations to provision and control access to their applications, cloud infrastructure, servers and both structured and unstructured data. Enterprise IAM deployments are generally eff...
Introducing TraceView's latest support for Solr Server, which provides breakdown of each operation, enabling more precise performance monitoring and troubleshooting. Solr Server provides JMX statistics that show performance details such as query speed and cache hit/miss rates in a mac...
The DevOps methodology is a straightforward and obvious initiative to cater for the changing face of application development and deployment. Despite this it’s greatest challenge lies within people and their willingness to change. For most organisations application releases are analog...
In our increasingly connected world, the number of mobile phones will exceed the world’s population by 2014. Users expect to be able to run diverse applications on these devices at work, home, and practically anywhere else. We assume secure access to any information we need, with an ex...
The enterprise is increasingly resorting to cloud services for many applications ranging from efficient application hosting or low-cost backup and archiving to cloud data centers. Typically, enterprise networks are interconnected to the cloud over low speed IP networks that are limited...
Every business acknowledges that network security is critical. But how do you quantify the business value that a secure network provides? And how does an enterprise evaluate and justify investing in network security products like next-generation firewalls, intrusion prevention systems ...
When it comes to the future impact of virtualization upon data centers and networks, we may already have experienced “the shot heard ‘round the world.” In fact, the stage is set for the next wave of the “virtualization revolution.” Most IT organizations already recognize the importan...
SDN is a new, dynamic network architecture that transforms traditional network backbones into more intelligent service-delivery platforms. IT leaders can use SDN as a tool to change the way they do business. For example, enterprises can foster closer relationships with their customers ...
On May 22, Ethernet – Robert Metcalfe’s ingenious invention –celebrated its 40th anniversary. As the global tech community celebrates this milestone for one of the world’s most transformative technologies, we take a look at its evolution from a printer-to-printer communication system a...
Cloud service providers store data all over the globe, and are constantly moving that data from one datacenter to the next for reasons as wide-ranging as cost considerations and redundancy requirements. Does this mean that the requirements outlined in varying data residency laws and pr...
Software-defined networks are all the rage these days – and why not? They offer the promised benefit of making networks far more agile and responsive to dynamically changing application requirements. Consequently, in theory, the entire networking-computing-storage-applications ecosyste...
Software Defined Networking (SDN) has become a famous paradigm and also the bandwagon in the networking industry today. SDN is primarily considered to be a methodology or approach to solving some of the wider-known problems in the enterprise and service provider networking space. It’s ...
As the proliferation of data continues, traditional networking infrastructure is struggling to keep up with the world’s influx of information and data. Legacy networking technologies are in need of an overhaul and software-defined networking (SDN) has been touted as the response and th...
It may be terrifying for those caught in the vortex between the old and the new way of work. Most professionals earned the right degrees, responded to the demands of their professions, learned the intricacies of their industries and were rewarded under the old system. It feels like a m...
When people think of "compliance" from a Microsoft SharePoint perspective, it can mean a lot of things to a lot of different people. Every organization will have different considerations for compliance: Essentially, which regulations they need to comply with according to their specific...
Thereʼs a popular childrenʼs book called Whereʼs Waldo, in which the lead character – with his signature red-and-white striped shirt and somewhat goofy expression – is obscured by various collections of people and things. Heʼs hidden, but in plain sight (if youʼll excuse the oxymoron) ...
After you have secured your private electronic information using encryption and learned how to encrypt and digitally sign files for others, how do you extract the information and determine who encrypted the file? Asymmetric public/private key encryption allows you to decipher the infor...
Using OpenFlow to extend software-defined networking (SDN) to the optical layer is a compelling prospect for enterprises seeking to achieve joint orchestration of information technology (IT) and network resources for cloud services, to virtualize the network and to more simply manage i...
Server virtualization has already proven beneficial for many enterprises. Through data center consolidation, server virtualization is able to enhance efficiency and reduce operational expenses. As this technology continues to evolve, however, IT professionals are moving beyond the basi...
A tester friend of mine recently came to me with a complaint that I think is fairly common in the testing community. He said, “Every time there is a new release of the software for us to test, we have to rework our testing scripts.” I’ve heard this complaint throughout my career, not o...