Redefining WAN in Light of Cloud

Redefining WAN in Light of Cloud

Thanks in large part to investor-driven demand for constant double-digit growth, the WAN optimization market has taken a substantial beating, and as a result the term “WAN optimization” has become something of a lament. Vendors looking to distance themselves from the term have latched onto the “software-defined” bandwagon, and the result is “SDN WAN” or “SD WAN.” However, the need for WAN optimization is not going away; in fact, it is only going to increase because the WAN is a critical component of cloud-based deployment models. Cloud is not a magic fix for all that ails IT. The laws of ...

Read More

Top 5 Trends in 2015 for Unifying PC and Mobile Management

Top 5 Trends in 2015 for Unifying PC and Mobile Management

Have you ever tried to create a major slide presentation on a tablet? Or edit a large spreadsheet? Or write a long document? Probably not. While it’s certainly possible to perform more substantial business tasks on a tablet, the small screen real estate and limited system resources (e.g., processing speed, memory, graphic support, etc.) are typically insufficient in current tablet form factors. However, carrying a laptop around with you everywhere you go just so you can access email is not very practical either. The reality is that we live in a multi-device world where the average worker employs 3 – ...

Read More

Leveraging Security Policy Orchestration to “Bake Security in” to SDDC Environments

Leveraging Security Policy Orchestration to “Bake Security in” to SDDC Environments

I have a new guest blog just posted at for Tufin around Security Policy Orchestration.  You can check it out here. It discusses the benefits to using Security Policy Orchestration when defining software-defined data centers (SDDCs).  By supporting a centralized security policy across physical and virtual networks via a single interface. Security  change management provides many benefits including: Application discovery and availability monitoring Service dependency mapping Change design and workflow automation Network topology and policy analysis Policy optimization and violation guidance Policy violation notification Take a look at it.  

Read More

posted by Julie Craig   | June 10, 2013 | 0 Comments

NSA-PRISM-Program-for-Spying

Who can watch the PRISM fiasco and NOT wonder about its impact on public Cloud computing? If the government can monitor your phone calls, it can certainly force SaaS, IaaS, and PaaS vendors to provide access to your financials, your sales records, your data, and anything else you do or store “in the Cloud”.  And...

Read More »



posted by Steve Brasen   | June 6, 2013 | 0 Comments

Businessman_tablet_300x190

IT marketing hype has generated quite a few ridiculous and sometimes outright bizarre phrases to describe trends in technology adoption, but few on the list of the absurd top the insistence that we live in a “post-PC” era.  The concept of “post-PC” derives from the (correct) fact that mobile device adoption has broadly accelerated, but...

Read More »



posted by Jim Frey   | May 15, 2013 | 0 Comments

EMC_World_2013-300x190

During the week of May 5th, EMC held its fast-growing user conference in Las Vegas, while just down the strip the Interop 2013 event was also underway.  Lacking an ability to clone myself, I did my best to attend both, in the process actively supporting the local contingent of taxi drivers and putting in more...

Read More »



posted by Torsten Volk   | May 8, 2013 | 0 Comments

Emerging monarch

Breaking News: Dell Acquires Enstratius to Further Complete Its Cloud Story Today, on May 6, 2013, Dell acquired Enstratius, a company aimed at deploying, automating and managing applications in complex hybrid cloud environments. Enstratius enforces governance and security in the cloud, offering automated scaling, disaster recovery and cloud bursting. The Enstratius solution supports all popular...

Read More »



posted by Jim Frey   | May 7, 2013 | 0 Comments

CAWorld_2013_300x190px

This year’s theme for CAWorld 2013 was “Go Big: IT with Impact.”  So I thought what the heck – let’s go big.  I stepped back and took a much broader look across the CA Technologies portfolio than I normally would.  Usually, I focus on the network management solutions, which live primarily within CA’s Service Assurance...

Read More »



posted by Tracy Corbo   | May 1, 2013 | 0 Comments

APIs_300x190

Long ago and far away I used to cover programming languages called 4GLs, which have long since been relegated to the technology graveyard. Nice idea, but took way too long to deploy. Since then I have moved over to cover networking, but I often miss the world of programming. I was lucky enough to be...

Read More »



posted by Torsten Volk   | April 22, 2013 | 0 Comments

Revolution_button_300x190

OpenStack’s huge momentum is undeniable. IBM, RedHat, NetApp, Rackspace, HP, Dell, Cisco, Intel and even VMware have committed significant funds and human resources to this project. But why would companies, that are otherwise competing rather fiercely, sit on one table to build an OpenSource cloud platform? The answer is certainly not “altruism”, as this is...

Read More »



posted by Tracy Corbo   | April 12, 2013 | 0 Comments

glass_maze_300x190

In recent months both Cisco and Juniper have been talking about Puppet. In February, Juniper announced an early adopter release of Puppet for Junos OS. At the Network Field Day event, Cisco demonstrated onePK + Puppet. When I hear Puppet, I think sys admin not network operator. Why then the growing buzz around Puppet and...

Read More »



arrows_opposite_directions_300x190px

In my last post, I talked about the frustration that enterprises have with the lack of integration among security tactics – an egregious gap attributable in no small way to the extremely fragmented nature of the IT security industry itself. I offered a few examples of approaches that seek to close these gaps and equip...

Read More »



puzzle_house-300x190

Almost one year into the discussion about the Software Defined Data Center (SDDC), it is time to take inventory of the state of the discipline. As a reminder, the ultimate goal of the SDDC is to abstract and centralize the management of compute, network, storage, operating systems, middleware and applications in order to dynamically place...

Read More »



Page 10 of 36« First...«89101112»2030...Last »