Welcome!


From the Blogosphere

Not all network management solutions are alike, even though they may sound that way sometimes. A sure sign of a network management tool trying to pass itself off as an enterprise solution is when it implements distributed polling as a way to scale. These systems scale server capacity ...
While many hardware vendors publicly appear to be embracing the move to virtual Layer 4-7 network services, the reality is quite different. To sell virtual appliances – such as load balancers, firewalls, VPNs and intrusion prevention systems (IPS) – they have to overcome the fear of ca...
On the surface, many network management products seem the same. But any network management system claiming to be a solution will, at a minimum, maintain an inventory of the network devices, understand their interconnectivity, monitor (and alert on) each device’s response (availability)...
California Natural Resources Agency gains agility from a software-defined data center strategyusing the best of centralized and de-centralized IT resources. The next BriefingsDirect innovator case study interview explores how the California Natural Resources Agency (CNRA) in Sacrament...
Log data provides the most granular view into what is happening across your systems, applications, and end users. Logs can show you where the issues are in real-time, and provide a historical trending view over time. Logs give you the whole picture. Modern infrastructure constantly g...
"Programmability in the network" is a wordy yet simpler way to describe the extension of network capabilities through the use of software-defined techniques. See what I mean? In any case, whatever you want to call it, there are two distinct methods of leveraging programmability in ...
While layer 1 (physical) interconnection of network resources will always be required – the bits need to flow on fiber or wireless at some point, the future of carrier and service resource intercommunications must evolve to accept and acknowledge the need for user-driven, near real tim...
It's an exciting time in technology! The role of IT Ops is undergoing a seismic shift in meeting the ever increasing and pressurized demands from the business they serve. It seems only yesterday that client-server computing was being adopted by business users as a new-world alternative...
Selling is a professional that you can never take lightly. To be successful at marketing and selling something you have got to be the best, on top of your game, ahead of the competition and ready to do what nobody else dares to do. The world of SaaS sales is no different. Competition c...
When it comes to cloud computing, there is no “one size fits all” platform for getting work done. High Performance Computing (HPC) workloads are not web applications. Thankfully, there are clouds specifically designed for running HPC workloads rather than web applications. No matter...
IT’s role is changing dramatically from working in isolation to operating hand in hand with the business team. Successful IT leaders understand that they need to keep a pulse on the newest technologies and work in unison with their business counterparts in order to remain at the forefr...
Licensing creates some major headaches for network managers, so I wasn’t surprised to read in a recent SearchNetworking article that “simplified licensing and billing” made the IT wish list for 2015. In the network management space, frustrations revolve around which licensing model to ...
Keeping tabs on the devices being used on an organization’s network in a centralized fashion can dramatically increase the efficiency of an IT team and help them rapidly respond to problems, sometimes even before the users are aware that one exists. At Entuity we regularly hear from...
This is the first of a series of posts and links to resources on server storage I/O performance and benchmarking (view more and follow-up posts here). The best I/O is the I/O that you do not have to do, the second best is the one with the least impact as well as low overhead. Drew Ro...
Virtualization technology has matured and is a critical infrastructure component in most modern data centers, especially as a trusted part of production environments. As our use of, and reliance on, virtualization technology continues to grow it is important that we are managing the te...
Log data provides the most granular view into what is happening across your systems, applications, and end users. Logs can show you where the issues are in real-time, and provide a historical trending view over time. Logs give you the whole picture. As we continue to expand Logentrie...
Some of the network gear vendors cast a wary look at network management vendors, particularly those who do continual, automatic discovery of the network inventory and connectivity. Why? We know what’s actually out there, and what’s actually being used. We had one customer in the i...
After reading Sean Michael Kerner’s article in Enterprise Networking Planet earlier this month, I thought I’d add a few thoughts of my own to what he wrote. He discusses SDN and IPv6. Here’s my take on Software Defined Networking (SDN) in 2015: Given the ongoing hype and the rang...
Does your DevOps tool chain look like the picture below with lots of disconnected tools and different team members having to bridge the gaps between them? If you are like most DevOps early adopters, this is probably the case. And that’s been accepted as okay because each of these tool...
When meeting with potential new customers, I’m frequently asked “do you have customized polling?” As we all learned in life, the question is often less telling than WHY the question was asked. I answer: “Of course, we have customized polling – what enterprise class solution (or even ...
SDNs, or more specifically provisioning automation platforms service provider interconnections, and have crept into nearly all marketing materials and elevator pitches in discussions with submarine cable operators, networks, Internet Exchange Points, and carrier hotels. While some of ...
Cyber threats are becoming more advanced, persistent, and focused. The threat landscape is rapidly changing, and evolving faster than ever. Today it is difficult to determine who is winning: either those behind the cyber threats, or those fighting to prevent and remediate the threats. ...
In Part 1, I shared my thoughts on SDN in 2015, after reading Sean Michael Kerner’s article in Enterprise Networking Planet. This post will cover a few of my thoughts on IPv6. Once the initial scares surrounding IPv4 address exhaustion passed, enterprises have taken a relaxed attitud...
When properly implemented and managed, secure enterprise file sync-and-share (EFSS) applications can improve project management and empower your workforce. Unfortunately, making the business case for secure EFSS isn’t always easy – especially when users and management aren’t aware of t...
Many years ago Gartner introduced their technology Hype Cycle, which maps visibility against maturity for new technology. The Hype Cycle in essence states that many new technologies get a large amount of visibility early in their maturity cycle. The visibility and enthusiasm drops sign...
Cloud security is a top concern for chief security officers. In almost any enterprise, cloud migration is a given fact and recent attacks have proven, yet again, that data security is a critical component in any cloud migration strategy. Below are four tips, specific to Infrastructur...
Modern Data Centers are very complex environments. Data center operators must have visibility into a wide range of integrated data bases, applications, and performance indicators to effectively understand and manage their operations and activities. Unfortunately, in many cases, the ab...
I had a very interesting discussion with a retail customer recently. I guess the retail business experiences employee turnover more than other areas, and the IT department is no exception. A key issue to them was expertise. They look for technologies that can be quickly learned by t...
The DevOps section in the library is not the largest around but it is well worth your time to check a couple out. Here are the Top 10 DevOps Books that are worth finding at the book store and sharing with your friends. Feel free to browse, click on the books, you can’t go wrong....
Technology was dominated by several prevalent trends in 2014 – from the Internet of Things (IoT) and big data to the cloud and cyber security, it seems like there was barely a day without one of these trends creeping up in the news. Now we have entered 2015, these trends are still at t...
In an informal survey of words used during seminars and discussions, two main themes are emerging at the Pacific Telecommunications Council’s 2015 annual conference. The first, as expected, is development of more submarine cable capacity both within the Pacific, as well as to end poin...
Ninety-percent of your users want your site to perform well during peak periods, like the last month or so. That's according to a study by Compuware, in which they also found that most dissatisfied users will throw you under a bus if your app or site performs poorly while they're despe...
If you're one of the many organizations exploring Service Virtualization as a way to "shift left" quality efforts and accelerate the SDLC, don't miss this recap of the top Service Virtualization research, papers, videos, and case studies from 2014. The concept of leveraging a simulat...
Through http://blog.ipspace.net I landed on this article on acm.org discussing the complexity of distributed systems. Through some good examples, George Neville-Neil makes it clear that creating and scaling distributed systems is very complex and “any one that tells you it is easy is e...
One way or another, all data center networks exhibit at least 6 different functional areas that their operators need to engineer, implement, and operate with a differing set of needs and requirements. Similarly, in one way or another, most of the available SDN and virtualized network s...
Fraud is definitely top of mind for all banks. Steve Rosenbush at the Wall Street Journal recently wrote about Visa’s new Big Data analytic engine which has changed the way the company combats fraud. Visa estimates that its new Big Data fraud platform has identified $2 billion in poten...
Whenever we get to the end of a year we have this tendency to reflect on what has happened in the past year and how we can improve in the coming year. It’s natural to use the change of calendar year as a point in time to think back, even though practically speaking it is usually the mo...
Usually, it is the task of the system administrator in the organization to make its network stable and reliable. His effective operation requires him to know all the information on network: number of hosts, where they are situated, quality of connections between them, their operation, ...
What do you get when you combine Big Data technologies….like Pig and Hive? A flying pig? No, you get a “Logical Data Warehouse”. My general prediction is that Cloudera and Hortonworks are both aggressively moving to fulfilling a vision which looks a lot like Gartner’s “Logical Da...
Have you figured out the new buzzword trend for 2014 that starting ramping up in 2013? Yup, it’s Internet of Things (IoT) and Internet of Devicess (IoD) Assuming that IoT, IoD and other variations catch on which looks like they will, this could bring relief and rest for the over-work...