Welcome!


Latest Blogs from SDN Journal
Let's face it, there's quite a bit of confusion around what constitutes an SDDC, not to mention how you go about building one. NIMBOXX recently created an awesome all-in-one SDDC Cheat Sheet to help you navigate this fast growing infrastructure. Whether you're looking to boost your ...
Virtualization technology has matured and is a critical infrastructure component in most modern data centers, especially as a trusted part of production environments. As our use of, and reliance on, virtualization technology continues to grow it is important that we are managing the te...
Log data provides the most granular view into what is happening across your systems, applications, and end users. Logs can show you where the issues are in real-time, and provide a historical trending view over time. Logs give you the whole picture. As we continue to expand Logentrie...
Some of the network gear vendors cast a wary look at network management vendors, particularly those who do continual, automatic discovery of the network inventory and connectivity. Why? We know what’s actually out there, and what’s actually being used. We had one customer in the i...
After reading Sean Michael Kerner’s article in Enterprise Networking Planet earlier this month, I thought I’d add a few thoughts of my own to what he wrote. He discusses SDN and IPv6. Here’s my take on Software Defined Networking (SDN) in 2015: Given the ongoing hype and the rang...
Does your DevOps tool chain look like the picture below with lots of disconnected tools and different team members having to bridge the gaps between them? If you are like most DevOps early adopters, this is probably the case. And that’s been accepted as okay because each of these tool...
When meeting with potential new customers, I’m frequently asked “do you have customized polling?” As we all learned in life, the question is often less telling than WHY the question was asked. I answer: “Of course, we have customized polling – what enterprise class solution (or even ...
SDNs, or more specifically provisioning automation platforms service provider interconnections, and have crept into nearly all marketing materials and elevator pitches in discussions with submarine cable operators, networks, Internet Exchange Points, and carrier hotels. While some of ...
Cyber threats are becoming more advanced, persistent, and focused. The threat landscape is rapidly changing, and evolving faster than ever. Today it is difficult to determine who is winning: either those behind the cyber threats, or those fighting to prevent and remediate the threats. ...
In Part 1, I shared my thoughts on SDN in 2015, after reading Sean Michael Kerner’s article in Enterprise Networking Planet. This post will cover a few of my thoughts on IPv6. Once the initial scares surrounding IPv4 address exhaustion passed, enterprises have taken a relaxed attitud...
When properly implemented and managed, secure enterprise file sync-and-share (EFSS) applications can improve project management and empower your workforce. Unfortunately, making the business case for secure EFSS isn’t always easy – especially when users and management aren’t aware of t...
Many years ago Gartner introduced their technology Hype Cycle, which maps visibility against maturity for new technology. The Hype Cycle in essence states that many new technologies get a large amount of visibility early in their maturity cycle. The visibility and enthusiasm drops sign...
Cloud security is a top concern for chief security officers. In almost any enterprise, cloud migration is a given fact and recent attacks have proven, yet again, that data security is a critical component in any cloud migration strategy. Below are four tips, specific to Infrastructur...
Modern Data Centers are very complex environments. Data center operators must have visibility into a wide range of integrated data bases, applications, and performance indicators to effectively understand and manage their operations and activities. Unfortunately, in many cases, the ab...
I had a very interesting discussion with a retail customer recently. I guess the retail business experiences employee turnover more than other areas, and the IT department is no exception. A key issue to them was expertise. They look for technologies that can be quickly learned by t...
The DevOps section in the library is not the largest around but it is well worth your time to check a couple out. Here are the Top 10 DevOps Books that are worth finding at the book store and sharing with your friends. Feel free to browse, click on the books, you can’t go wrong....
Technology was dominated by several prevalent trends in 2014 – from the Internet of Things (IoT) and big data to the cloud and cyber security, it seems like there was barely a day without one of these trends creeping up in the news. Now we have entered 2015, these trends are still at t...
In an informal survey of words used during seminars and discussions, two main themes are emerging at the Pacific Telecommunications Council’s 2015 annual conference. The first, as expected, is development of more submarine cable capacity both within the Pacific, as well as to end poin...
Ninety-percent of your users want your site to perform well during peak periods, like the last month or so. That's according to a study by Compuware, in which they also found that most dissatisfied users will throw you under a bus if your app or site performs poorly while they're despe...
Through http://blog.ipspace.net I landed on this article on acm.org discussing the complexity of distributed systems. Through some good examples, George Neville-Neil makes it clear that creating and scaling distributed systems is very complex and “any one that tells you it is easy is e...
One way or another, all data center networks exhibit at least 6 different functional areas that their operators need to engineer, implement, and operate with a differing set of needs and requirements. Similarly, in one way or another, most of the available SDN and virtualized network s...
The race to hire is on. By 2029, the U.S. Census Bureau notes that the entire baby boomer generation will be over the age of 65. But even now, boomers are leaving the workforce in considerable numbers, and finding replacements will be stiff competition among organizations looking to at...
Fraud is definitely top of mind for all banks. Steve Rosenbush at the Wall Street Journal recently wrote about Visa’s new Big Data analytic engine which has changed the way the company combats fraud. Visa estimates that its new Big Data fraud platform has identified $2 billion in poten...
Whenever we get to the end of a year we have this tendency to reflect on what has happened in the past year and how we can improve in the coming year. It’s natural to use the change of calendar year as a point in time to think back, even though practically speaking it is usually the mo...
Usually, it is the task of the system administrator in the organization to make its network stable and reliable. His effective operation requires him to know all the information on network: number of hosts, where they are situated, quality of connections between them, their operation, ...
What do you get when you combine Big Data technologies….like Pig and Hive? A flying pig? No, you get a “Logical Data Warehouse”. My general prediction is that Cloudera and Hortonworks are both aggressively moving to fulfilling a vision which looks a lot like Gartner’s “Logical Da...
Have you figured out the new buzzword trend for 2014 that starting ramping up in 2013? Yup, it’s Internet of Things (IoT) and Internet of Devicess (IoD) Assuming that IoT, IoD and other variations catch on which looks like they will, this could bring relief and rest for the over-work...
Lori MacVittie is responsible for education and evangelism of application services available across F5's entire product suite. Her role includes authorship of technical materials and participation in a number of community-based forums and industry standards organizations, among other e...
All prognosticators, even us who simply roll out a single annual list, hope for two things: one, that your predictions get a lot of traction and shares across the industry, and two, that you end up actually being correct. Anil Batra’s list of 2014 predictions has turned a lot of hea...
The impact is that it's really difficult to apply access controls to something in the cloud using traditional models that force users and consumers to come to the enterprise data center where that service is hosted first. That has a very negative impact on performance, at a minimum. Si...
Database change management is a unique challenge when adopting an agile development practice or implementing DevOps patterns. It really straddles two groups: the developers and the DBAs. Developers design and author the application schema changes based on the needs of the business. ...
If RAID were really not relevant anymore (e.g. actually dead), why do some people spend so much time trying to convince others that it is dead or to use a different RAID level or enhanced RAID or beyond raid with related advanced approaches? When you hear RAID, what comes to mind? ...
While many SPM Performance Monitoring users quickly see the benefits of SPM and adopt it in their organizations for monitoring — not just for Elasticsearch, but for their complete application stack — some Elasticsearch users evaluate SPM and compare it to Marvel from Elasticsearch. We...
The premise of cloud is based, like other emergent technologies, at least partially on the notion of abstraction. Cloud providers are able to achieve what appears to be boundless compute, limitless storage and never-ending network capacity by being able to simply "plug and play" the ha...
Programmability is an integral component of just about every emergent technology and trend today. Cloud? It's based on the ability of providers (public or private) to abstract, automate and orchestrate the network using programmability. DevOps? A significant tenet of DevOps relies on a...
Recently Arista released a white paper surrounding the idea that having deeper buffers running within the network can help to alleviate the incast congestion patterns that can present when a large number of many-to-one connections are happening within a network. Also known as the TCP i...
For business leaders today, it’s not enough to drive company growth, seek competitive advantages and provide vision. In this era of advanced cyberattacks, executives also need to keep their companies’ data security strategies top of mind. The Ponemon Institute’s 2014 Cost of Data Breac...
(article written for the Scality blog) It has been six years since I wrote my first object storage blog, even though I didn’t mention object storage in that specific article. I had my head in the clouds as our early cloud startup was being acquired by Sun Microsystem when someone asked...
I once said on stage at Glue that the reason I loved node.js was, quite frankly, that it's a language and with a programming language you can do, well, anything. But like most things just because you can, doesn't always mean you should. When it comes to business, there absolutely must...
If so, you are not alone! We talk to a lot of people who want to reduce the frequent “noise” from monitoring alarms. To solve this common problem, Sematext added anomaly detection for alerts and PagerDuty integration to its SPM Performance Monitoring solution to dramatically reduce t...