Welcome!


Latest Blogs from SDN Journal
One of the neat things about microservices is the ability to segment functional actions into scalability domains. Login, browsing, and checkout are separate functional domains that can each be scaled according to demand. While one hopes that checkout is similarly in demand, it is unlik...
We explore how retailer Columbia Sportswear has made great strides in improving their business results through modernized IT, and where they expect to go next with their software-defined strategy. To learn more about the new wave of IT, we sat down with Suzan Pickett, Manager of Globa...
So exactly how do you kick start a DevOps strategy? For example, say your organization is tied down to a very sequential, but cumbersome Waterfall approach to software development that is wasting precious dollars and hindering productivity? In the following we’ve outlined some strategy...
There’s a lot more happening on your network than you think, and it could be costing you real money. Like high blood pressure or cholesterol, operating your network beyond threshold, at capacity or with other unaddressed issues could be the silent killer for your enterprise. Advanced ...
In this short video I summarized what I have learned about technologies and the latest trends over the past few weeks. I just circumnavigated the globe over a two week period. I have never done that before. I learned about mobile solutions, digital transformation, IoT, big data, In...
One question that springs to mind is why invest in embedded physical SDN vSwitches which sit in-line between each and every appliance and their corresponding access ports? Why not simply apply the appropriate SDN configuration to the access switch on a per-port basis (assuming the acc...
Once at a trade show I was challenged by someone who used a low-priced SMB tool to monitor his network of about 50 devices. He insisted it could do everything Entuity could do, for example, it offered event management just like ours. Well…not quite. Lots of vendors offer event managem...
You may have noticed that we’ve been spending some time out west demonstrating our big data fabrics and sharing our vision for the third era of networking. You’ll be seeing more meet-ups and live demonstrations in the near future, so keep an eye on the blog and on Twitter to see where ...
Immutable infrastructure, which I think is more appropriately called disposable infrastructure, has been enjoying a reinvigorated life with the success of Dockers and containerization over the past year. Too, DevOps has played a role in resurrecting the notion of disposable infrastruct...
If you’ve been following us on the blog or on social media, you know that we announced our partnership with Big Data platform provider Cloudera last month. And, that a few months ago, our own Ed Henry demonstrated how to construct Big Data fabrics that easily integrate with systems lik...
The Law of Software Entropy as described by Ivar Jacobson et al. in "Object-Oriented Software Engineering: A Use Case Driven Approach": The second law of thermodynamics, in principle, states that a closed system's disorder cannot be reduced, it can only remain unchanged or increased...
I read an interesting article the other day that resonated so much I felt it was worth sharing and expanding upon its premise here. The article, originally written by Andrew Dailey of MGI Research, delved into the role of growth and accelerated time-to-revenue in a successful enterpris...
“Free” reigns supreme when it comes to online marketing. But “pay” is more profitable to your bottom line. In the popular Freemium world of digital offerings, where free and premium content or services are offered, it’s prudent to consider how you will transition free offerings into pa...
Not all network management solutions are alike, even though they may sound that way sometimes. A sure sign of a network management tool trying to pass itself off as an enterprise solution is when it implements distributed polling as a way to scale. These systems scale server capacity ...
While many hardware vendors publicly appear to be embracing the move to virtual Layer 4-7 network services, the reality is quite different. To sell virtual appliances – such as load balancers, firewalls, VPNs and intrusion prevention systems (IPS) – they have to overcome the fear of ca...
This BriefingsDirect discussion explores the role and impact of business networks, the often virtual assemblages of interrelated business services, processes, and data that are transforming how companies and consumers conduct commerce. New business networks are unlocking the ability f...
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microserv...
On the surface, many network management products seem the same. But any network management system claiming to be a solution will, at a minimum, maintain an inventory of the network devices, understand their interconnectivity, monitor (and alert on) each device’s response (availability)...
California Natural Resources Agency gains agility from a software-defined data center strategyusing the best of centralized and de-centralized IT resources. The next BriefingsDirect innovator case study interview explores how the California Natural Resources Agency (CNRA) in Sacrament...
In an effort to address an array of file-related challenges, many organizations automate file management tasks. Automation can enhance security, free up IT resources, and help you achieve order and control in an otherwise inadequately regulated file transfer environment. Let's take a ...
Log data provides the most granular view into what is happening across your systems, applications, and end users. Logs can show you where the issues are in real-time, and provide a historical trending view over time. Logs give you the whole picture. Modern infrastructure constantly g...
"Programmability in the network" is a wordy yet simpler way to describe the extension of network capabilities through the use of software-defined techniques. See what I mean? In any case, whatever you want to call it, there are two distinct methods of leveraging programmability in ...
While layer 1 (physical) interconnection of network resources will always be required – the bits need to flow on fiber or wireless at some point, the future of carrier and service resource intercommunications must evolve to accept and acknowledge the need for user-driven, near real tim...
It's an exciting time in technology! The role of IT Ops is undergoing a seismic shift in meeting the ever increasing and pressurized demands from the business they serve. It seems only yesterday that client-server computing was being adopted by business users as a new-world alternative...
IT’s role is changing dramatically from working in isolation to operating hand in hand with the business team. Successful IT leaders understand that they need to keep a pulse on the newest technologies and work in unison with their business counterparts in order to remain at the forefr...
Licensing creates some major headaches for network managers, so I wasn’t surprised to read in a recent SearchNetworking article that “simplified licensing and billing” made the IT wish list for 2015. In the network management space, frustrations revolve around which licensing model to ...
This is the first of a series of posts and links to resources on server storage I/O performance and benchmarking (view more and follow-up posts here). The best I/O is the I/O that you do not have to do, the second best is the one with the least impact as well as low overhead. Drew Ro...
Let's face it, there's quite a bit of confusion around what constitutes an SDDC, not to mention how you go about building one. NIMBOXX recently created an awesome all-in-one SDDC Cheat Sheet to help you navigate this fast growing infrastructure. Whether you're looking to boost your ...
Virtualization technology has matured and is a critical infrastructure component in most modern data centers, especially as a trusted part of production environments. As our use of, and reliance on, virtualization technology continues to grow it is important that we are managing the te...
Log data provides the most granular view into what is happening across your systems, applications, and end users. Logs can show you where the issues are in real-time, and provide a historical trending view over time. Logs give you the whole picture. As we continue to expand Logentrie...
Some of the network gear vendors cast a wary look at network management vendors, particularly those who do continual, automatic discovery of the network inventory and connectivity. Why? We know what’s actually out there, and what’s actually being used. We had one customer in the i...
After reading Sean Michael Kerner’s article in Enterprise Networking Planet earlier this month, I thought I’d add a few thoughts of my own to what he wrote. He discusses SDN and IPv6. Here’s my take on Software Defined Networking (SDN) in 2015: Given the ongoing hype and the rang...
Does your DevOps tool chain look like the picture below with lots of disconnected tools and different team members having to bridge the gaps between them? If you are like most DevOps early adopters, this is probably the case. And that’s been accepted as okay because each of these tool...
When meeting with potential new customers, I’m frequently asked “do you have customized polling?” As we all learned in life, the question is often less telling than WHY the question was asked. I answer: “Of course, we have customized polling – what enterprise class solution (or even ...
SDNs, or more specifically provisioning automation platforms service provider interconnections, and have crept into nearly all marketing materials and elevator pitches in discussions with submarine cable operators, networks, Internet Exchange Points, and carrier hotels. While some of ...
Cyber threats are becoming more advanced, persistent, and focused. The threat landscape is rapidly changing, and evolving faster than ever. Today it is difficult to determine who is winning: either those behind the cyber threats, or those fighting to prevent and remediate the threats. ...
In Part 1, I shared my thoughts on SDN in 2015, after reading Sean Michael Kerner’s article in Enterprise Networking Planet. This post will cover a few of my thoughts on IPv6. Once the initial scares surrounding IPv4 address exhaustion passed, enterprises have taken a relaxed attitud...
When properly implemented and managed, secure enterprise file sync-and-share (EFSS) applications can improve project management and empower your workforce. Unfortunately, making the business case for secure EFSS isn’t always easy – especially when users and management aren’t aware of t...
Many years ago Gartner introduced their technology Hype Cycle, which maps visibility against maturity for new technology. The Hype Cycle in essence states that many new technologies get a large amount of visibility early in their maturity cycle. The visibility and enthusiasm drops sign...
Cloud security is a top concern for chief security officers. In almost any enterprise, cloud migration is a given fact and recent attacks have proven, yet again, that data security is a critical component in any cloud migration strategy. Below are four tips, specific to Infrastructur...