Postcards from the network edge

Postcards from the network edge

I was recently invited to participate on a panel at a major IT conference, where questions from the audience provided an interesting window into the top issues that networking professionals are dealing with as part of their...

05/25/17

SSL or IPsec: Which is best for IoT network security?

SSL or IPsec: Which is best for IoT network security?

Network-based encryption such as SSL and IPsec can help guard against security threats to IoT gateways and devices. For this writer, IPsec is the better option.

02/02/17

How to architect the network so IoT devices are secure

How to architect the network so IoT devices are secure

New and increased traffic patterns from the Internet of Things create security challenges.

12/01/16

Implementing secure WANs in the cloud age

Implementing secure WANs in the cloud age

Over the past few years most organizations have significantly increased their reliance on the Internet, primarily due to the outsourcing of utility applications like email, unified communications, ERP, CRM, etc., to SaaS providers....

09/08/16

Bandwidth alone won’t solve application performance problems

Bandwidth alone won’t solve application performance problems

Conventional wisdom says if we increase bandwidth, application performance will improve. But unless we decrease latency, performance will continue to suffer.

07/26/16

The case for WAN acceleration as NFV

The case for WAN acceleration as NFV

WAN optimization might not be ideal as a service, but it is suited for network function virtualization.

06/15/16

The impact of globalization on networks

The impact of globalization on networks

As network traffic to and from Asia Pacific increases, enterprises need better better and faster connectivity models. One option to consider: performance hubs.

04/14/16

In the WAN, it’s better to be single than attached

In the WAN, it’s better to be single than attached

In a traditional WAN infrastructure, the control plane and data plane are tightly coupled, typically congruent and cannot be separated due to how they are integrated with each network device. However, the emergence of cloud computing...

02/24/16

The challenges of creating and enforcing policies across the WAN

The challenges of creating and enforcing policies across the WAN

Homer once wrote “If you serve too many masters, you'll soon suffer." This quote can also be used to sum up the challenges enterprises face when trying to enforce consistent policies across their WAN. This article explains why it is...

11/09/15

Why Amazon's recent outage was a networking issue, and how to prevent it

Why Amazon's recent outage was a networking issue, and how to prevent it

The recent AWS outage exposed the dependence of countless enterprise applications on a few cloud components. Nick Kephart published a very good analysis here that explains how a route leak from data center provider Axcelx was...

07/24/15

Managing global WANs in multinational enterprises

Managing global WANs in multinational enterprises

This article discusses the challenges that multinational organizations face when trying to manage globally distributed WAN architectures..

07/10/15

Winds of change blowing in the WAN

Winds of change blowing in the WAN

In the past few years, enterprise computing has experienced major upheavals brought about by cloud apps, Wi-Fi, mobility, and BYOD. The enterprise WAN, meanwhile, has not evolved much since it was transformed into an MPLS Layer 3 VPN...

04/23/15

Load More