Welcome!


Latest Blogs from SDN Journal
For those deciding to embrace Software Defined Networking there are several obstacles to be overcome before deployment. Probably the hardest decision is which vendor to select. Given that the various SDN options are predominantly not interoperable, the decision as to which vendor to ...
SDN is a still simmering trend. It's not boiling over like cloud did in its early years but rather it's slowly, steadily continuing to move forward as more organizations evaluate, pilot and implement pockets of SDN within their organization. stage of sdn deployment 2015 But it's not ...
When the melting pot boils down to it, our network is its own culture, with recurring traffic patterns, similar end users, and equipment named after inside jokes only your company will understand. Just like living within your own culture, it's important to not only understand HOW patt...
It is possible to implement SDN solely using existing network infrastructure and to provide SDN overlay connectivity using tunneling technologies. That said, most people concede that some physical hardware will be needed to perform certain key network functions or at key locations wit...
SDN technologies are broadly split into two fundamentally different paradigms - "overlay" SDN and "underlay" SDN. With overlay SDN the SDN is implemented on top of an existing physical network. With underlay SDN, the fabric of the underlying network is reconfigured to provide the pat...
For me the mantra of achieving speed via automation tools is nothing new. In fact I was ‘automating’ Citrix Metaframe builds using windows scripting techniques back in 2004. The market though, has become awash with different automation products and it’s fair to say that many enterprise...
Imagine you are dropped off in the middle of a jungle, without any familiarity of what to eat, where to drink, or how to build a fire and shelter. Were you ready? Do you survive? In an environment that can, quite literally, eat you alive, it helps to be equipped with the right tools an...
In part 4 of our series on SDN, I discussed some of SDN's most commonly asserted benefits. Here I'll look at the drawbacks, the majority of which are organizational or financial and not technical. The most commonly cited reasons for actively not deploying SDN are: Staffing SDN r...
One of the best ways to get a raise is to demonstrate your value and commitment to your company and management. And one of the best ways to do that is by putting in the time and effort to obtain bona fide certifications in your chosen specialty. The difference in salary between a certi...
Surprise, surprise! The world just got a little faster. In other news, water is wet, grass is green, and you still didn’t win the lottery. According to the latest State of the Internet report, Akamai has discovered this “quickening” trend in their fourth quarter analysis of internet...
Early, hyper-scale pioneers of SDN such as Google astounded the networking community with the increased network utilization they achieved using SDN. The industry norm for WAN link utilization is between 30% and 50%, whereas, by deploying SDN, Google drove utilization up to 95% (withou...
Infonetics analyst Clifford Grossner recently released a SDN enterprise study which found that nearly 80 percent of medium and large size businesses plan to implement SDN technology in the data center by 2017. The survey of 153 businesses also revealed that 65 percent of respondents ar...
TAPs and NPBs are certainly on a collision course and their functionality and use cases are overlapping more and more. Traditionally TAPs were relatively unintelligent - providing pass-through monitoring points (possibly with very limited filtering), passing a copy of the data seen on...
Polymorphism is a concept central to object-oriented programming. The notion of polymorphism is used to extend the capabilities of a basic object, like a mammal, to specific implementations, like cats or dogs or honey badgers, even though they don't care about such technical distinctio...
Vicom Computer Services, Inc. was awarded an 11 year contract with the MTA. The MTA launched a request for proposal in September 2013 for a project encompassing and creating a fully redundant core data network across the three core data centers and upgrade user access to applications...
In cloud-based architectures, the situation is different and the network has become even more important. Let’s imagine a typical cloud-based architecture situation. You run a datacenter with a flexible number of allocated computing instances (for example, due to the pricing model and v...
One of the neat things about microservices is the ability to segment functional actions into scalability domains. Login, browsing, and checkout are separate functional domains that can each be scaled according to demand. While one hopes that checkout is similarly in demand, it is unlik...
We explore how retailer Columbia Sportswear has made great strides in improving their business results through modernized IT, and where they expect to go next with their software-defined strategy. To learn more about the new wave of IT, we sat down with Suzan Pickett, Manager of Globa...
So exactly how do you kick start a DevOps strategy? For example, say your organization is tied down to a very sequential, but cumbersome Waterfall approach to software development that is wasting precious dollars and hindering productivity? In the following we’ve outlined some strategy...
There’s a lot more happening on your network than you think, and it could be costing you real money. Like high blood pressure or cholesterol, operating your network beyond threshold, at capacity or with other unaddressed issues could be the silent killer for your enterprise. Advanced ...
In this short video I summarized what I have learned about technologies and the latest trends over the past few weeks. I just circumnavigated the globe over a two week period. I have never done that before. I learned about mobile solutions, digital transformation, IoT, big data, In...
One question that springs to mind is why invest in embedded physical SDN vSwitches which sit in-line between each and every appliance and their corresponding access ports? Why not simply apply the appropriate SDN configuration to the access switch on a per-port basis (assuming the acc...
Once at a trade show I was challenged by someone who used a low-priced SMB tool to monitor his network of about 50 devices. He insisted it could do everything Entuity could do, for example, it offered event management just like ours. Well…not quite. Lots of vendors offer event managem...
You may have noticed that we’ve been spending some time out west demonstrating our big data fabrics and sharing our vision for the third era of networking. You’ll be seeing more meet-ups and live demonstrations in the near future, so keep an eye on the blog and on Twitter to see where ...
Immutable infrastructure, which I think is more appropriately called disposable infrastructure, has been enjoying a reinvigorated life with the success of Dockers and containerization over the past year. Too, DevOps has played a role in resurrecting the notion of disposable infrastruct...
If you’ve been following us on the blog or on social media, you know that we announced our partnership with Big Data platform provider Cloudera last month. And, that a few months ago, our own Ed Henry demonstrated how to construct Big Data fabrics that easily integrate with systems lik...
The Law of Software Entropy as described by Ivar Jacobson et al. in "Object-Oriented Software Engineering: A Use Case Driven Approach": The second law of thermodynamics, in principle, states that a closed system's disorder cannot be reduced, it can only remain unchanged or increased...
I read an interesting article the other day that resonated so much I felt it was worth sharing and expanding upon its premise here. The article, originally written by Andrew Dailey of MGI Research, delved into the role of growth and accelerated time-to-revenue in a successful enterpris...
“Free” reigns supreme when it comes to online marketing. But “pay” is more profitable to your bottom line. In the popular Freemium world of digital offerings, where free and premium content or services are offered, it’s prudent to consider how you will transition free offerings into pa...
Not all network management solutions are alike, even though they may sound that way sometimes. A sure sign of a network management tool trying to pass itself off as an enterprise solution is when it implements distributed polling as a way to scale. These systems scale server capacity ...
While many hardware vendors publicly appear to be embracing the move to virtual Layer 4-7 network services, the reality is quite different. To sell virtual appliances – such as load balancers, firewalls, VPNs and intrusion prevention systems (IPS) – they have to overcome the fear of ca...
This BriefingsDirect discussion explores the role and impact of business networks, the often virtual assemblages of interrelated business services, processes, and data that are transforming how companies and consumers conduct commerce. New business networks are unlocking the ability f...
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microserv...
On the surface, many network management products seem the same. But any network management system claiming to be a solution will, at a minimum, maintain an inventory of the network devices, understand their interconnectivity, monitor (and alert on) each device’s response (availability)...
California Natural Resources Agency gains agility from a software-defined data center strategyusing the best of centralized and de-centralized IT resources. The next BriefingsDirect innovator case study interview explores how the California Natural Resources Agency (CNRA) in Sacrament...
In an effort to address an array of file-related challenges, many organizations automate file management tasks. Automation can enhance security, free up IT resources, and help you achieve order and control in an otherwise inadequately regulated file transfer environment. Let's take a ...
Log data provides the most granular view into what is happening across your systems, applications, and end users. Logs can show you where the issues are in real-time, and provide a historical trending view over time. Logs give you the whole picture. Modern infrastructure constantly g...
"Programmability in the network" is a wordy yet simpler way to describe the extension of network capabilities through the use of software-defined techniques. See what I mean? In any case, whatever you want to call it, there are two distinct methods of leveraging programmability in ...
While layer 1 (physical) interconnection of network resources will always be required – the bits need to flow on fiber or wireless at some point, the future of carrier and service resource intercommunications must evolve to accept and acknowledge the need for user-driven, near real tim...
It's an exciting time in technology! The role of IT Ops is undergoing a seismic shift in meeting the ever increasing and pressurized demands from the business they serve. It seems only yesterday that client-server computing was being adopted by business users as a new-world alternative...