Most Recent Blogs

IoT networking: Bluetooth and mobile networks: future has multiple nets

Posted: August 31, 2016   /   By: Dan Conde   /   Tags: networking, IoT, mobility

IoT networkingMy experience using a consumer IoT tracker device for tracking keyrings shows how IoT networks are constructed
using a combination of Bluetooth, mobile networks and cloud computing networks.  

Bluetooth, a protocol best known for sending audio or keystrokes, is becoming a full-fledged data protocol that offers simplicity while participating in a complex end-to-end IoT system. There are many standards and technologies used for IoT networking.  

In addition to Bluetooth and mobile networks, there are many low-power wide area technologies, such as Narrow-Band IoT (NB-IoT) and Long-Range Wide Area Network (LoRaWAN), and nearby connection alternatives such as NFC or RFID. IoT networking requires a combination of different technologies working in conjunction, depending upon the use case requirements.

Read More

Cybersecurity and VMworld

Posted: August 29, 2016   /   By: Jon Oltsik   /   Tags: Cloud Computing, cybersecurity, VMware, VMworld, cloud security

Las_Vegas_Sign.jpgWith memories of Black Hat still in my head, I’m back in Las Vegas for VMworld. I’m sure there will be plenty of generic VMware and partner announcements but I’m here to assess how VMware is addressing enterprise security requirements with its technologies and partner relationships. 

Read More

Hyperconverged infrastructure vendor Nutanix goes on a buying spree

Posted: August 29, 2016   /   By: Terri McClure   /   Tags: cloud, Private Cloud Infrastructure, nutanix, hybrid cloud, hyperconverged, HCI

nutanix acquisitionsToday Nutanix announced it is acquiring Pernix Data and Calm.IO. Not a lot of details were announced, but these acquisitions provide a clear view into Nutanix’s broader strategy and future aspirations. Why? Because, as my colleague Mark Peters likes to say, over recent decades we have slowly moved from IT standing (as it was intended to) for “information technology” to it really being all about “infrastructure technology”.

Read More

Looking forward to VMworld 2016

Posted: August 26, 2016   /   By: Dan Conde   /   Tags: cloud, networking

vmworld 2016 previewI will be visiting VMworld in Las Vegas next week, along with many other ESG staff. Here are my thoughts on what we may see and what matters:

VMworld 2016 in Las Vegas promises to be an event where we see VMware make proclamations of how it continues to evolve in a changing world. When we get to see previews of technologies that may be productized, we await the following year to see whether those ideas have turned into products or remain in the research stage.

This year, we look forward to seeing how far the concept of NSX Everywhere has progressed, and what new technologies are coming out of the Cloud Native team, such as follow-ons to vSphere Integrated Containers and the Photon Platform.

Read More

The most important ingredient in tech marketing

Posted: August 26, 2016   /   By: Adam Sell   /   Tags: marketing wars, inbound marketing

tech marketing tipsMarketers in 2016 are absolutely required to have several arrows in their quiver. It's not enough to just blog actively, to just send emails to your customers and prospects, to just blanket search engines with PPC ads. No one tool in isolation is going to get the job done, you've got to pull on each of the levers available to you in various amounts until you find that magical recipe. And even then, you've got to keep tweaking, cause what works on Tuesday may be obsolete by Wednesday.

Read More

Pay-as-you-go enterprise networking

Posted: August 25, 2016   /   By: Dan Conde   /   Tags: networking

networking cloudCompanies now have alternatives to big capital outlays for networking equipment.

Most enterprises treat networking equipment as a capital expense. They purchase it, along with some maintenance and support, and depreciate it over several years until it’s time for an upgrade. The majority of the expenses in the first year are capital expenses and the rest are OpEx for support. There are some methods for leasing equipment that enables payments spread out time, but traditionally, enterprise networking equipment has been purchased like cars, through up-front payments.

Today, networking (along with the rest of IT) is transitioning to a consumption-based model like cloud computing or SaaS. Thus, there are some changes under way to alter the traditional methods of purchasing networking equipment. One is a standardization of leasing arrangements, and the other one is turning network solutions into a service via the cloud.

Read More

F5 Agility conference: somebody familiar, some things are new

Posted: August 24, 2016   /   By: Dan Conde   /   Tags: networking, F5

Chicago.jpgVisiting the F5 Agility conference in Chicago recently showed me that the company is adapting to major changes in the industry and evolving its product line to keep up with the changes.

There was an interesting combination of the familiar and new.

Read More

The pressing need for network security operations automation

Posted: August 23, 2016   /   By: Jon Oltsik   /   Tags: Network Security, cybersecurity, network security operations

network security automationAccording to ESG research, 63% of networking and cybersecurity professionals working at enterprise organizations (i.e. more than 1,000 employees) believe that network security operations is more difficult today than it was two years ago.

Why?

Because enterprises have to deal with more connected devices, network traffic, and applications than two years ago. What’s more 47% of respondents claim that it is difficult to monitor network behavior from end-to-end while 41% claim that network security operations difficulties result from increasing use of cloud computing.

Read More

Contemplating the internet's impact on society

Posted: August 18, 2016   /   By: Dan Conde   /   Tags: networking

internet movie

A new film examines society's reliance on the internet and the good and bad effects of global connectivity. You don't expect to find movie reviews on Network Computing, but a film produced by a networking company that examines the effect of the internet on society is an unusual event.

Lo and Behold: Reveries of a Connected World by German filmmaker Werner Herzog, released in selected theaters and available for streaming Friday, provides a unique, thought-provoking view of technology.

 

Read More

More on operationalizing threat intelligence

Posted: August 17, 2016   /   By: Jon Oltsik   /   Tags: cybersecurity, threat intelligence, security analytics

threat intelligenceComing out of Black Hat a few weeks ago, it’s pretty frightening what’s going on with cyber-threats.  Overall malware volume is down but the number of variants has gone up precipitously. In fact, according to the Webroot threat report, about 97% of all malware variants are seen only one time. In other words, they are designed to target and attack specific organizations.

Read More

Posts by Topic

see all