The Hackers Are Coming, The Hackers Are Coming! Is Your Network Ready?

If Paul Revere were a security professional, his midnight ride would be spent warning about the impending wave of cyber-attacks. IT and security leaders may not need to mount steeds, but my research shows they must sound their own clarion call and get the enterprise to make a fundamental change in its security posture. Forget… Read More

Paul Revere's Ride

Top Ten Enterprise IT Predictions for 2015

Number 10: Expensive branch office routers, servers, switches and storage will continue consolidation into the datacenter, reducing the need for expensive branch office infrastructure and thus reducing wiring messes. image credit: https://www.flickr.com/photos/clonedmilkmen/3604999084/ Number 9: Even more applications and services will be deployed in the cloud further obscuring where our data lives and what is the… Read More

messy wires

Distinguishing the IoT from the IoE

Is the Internet of Things (IoT) the same as the Internet of Everything (IoE)? Lots of vendors seem to want you to think so – however, I would like to make a differentiation between them – for reasons that I hope will become apparent. As an organization, you want control. The mass addition of new… Read More

Internet of Things cloud

Look Into the Crystal Ball for 2015 Networking Predictions

If you could peer into a crystal ball and see the end of 2015, what do you think you’d see? In the networking industry, 2015 is poised for more disruption than ever before. Whether it’s the growing interest in SDN, or the rapid emergence of SD-WAN, or even the growing frustration around the high cost… Read More

crystal-ball-networking_sm

Addressing Business Outcomes Through The Intercloud

At this year’s Cisco C-scape EMEAR analyst event, the vendor downplayed its hardware product launches, focusing instead on its rapidly evolving business credentials. Cisco, with its oft-repeated message of massive Internet traffic growth, talked this time about business outcomes, and delivering all the elements – hardware, software, and professional services — to make that happen.… Read More

cloud computing

What’s New

Paul Revere's Ride

The Hackers Are Coming, The Hackers Are Coming! Is Your Network Ready?

If Paul Revere were a security professional, his midnight ride would be spent warning about the impending wave of cyber-attacks. IT and security leaders may not need to mount steeds, but my research shows they must sound their own clarion call and get the enterprise to make a fundamental change in its security posture. Forget one if by land, two if by sea. Today’s threat landscape is literally everything and anything.   One if by Web, two if by internal breach, three if from malware, four if by phishing, five if by trusted vendor and the list goes on. Cyber attackers are relentless and more sophisticated with access to even more tools … Read More

Featured Expert: Duncan Epping

Who's Who - Duncan Epping

Duncan was a founding member of the VMware EVO:RAIL team and today works for VMware’s Office of CTO. MORE

Latest Posts

messy wires

Top Ten Enterprise IT Predictions for 2015

Number 10: Expensive branch office routers, servers, switches and storage will continue …

Internet of Things cloud

Distinguishing the IoT from the IoE

Is the Internet of Things (IoT) the same as the Internet of Everything (IoE)? Lots of vendors seem …

Look Into the Crystal Ball for 2015 Networking Predictions

If you could peer into a crystal ball and see …

Addressing Business Outcomes Through The Intercloud

At this year’s Cisco C-scape EMEAR analyst …

Should Enterprise Take a Big Bang Approach To NFV?

As the interest in SDN continues to increase, …

The Software-Defined WAN and WAN Optimization: Networking’s Dynamic Duo

Today's WANs have become remarkably complex. …

Speeding up Network Provisioning

You probably know the problem already. The …

Operational Challenges Continue To Plague Legacy WANs

This site, like many others, has focused on …

Security-Focused Shift to SD-WAN Threatens DC Supremacy

Enterprise adoption of the Software-Defined …