Tech Primers

How-tos, tech analysis and explanation

Why dynamic mapping is changing network troubleshooting for the better

Engineers spend 80% of their troubleshooting time collecting data and only 20% analyzing it. Mapping tools can significantly reduce time spent collecting data

the word

openstack logo cloud

What has OpenStack done for me lately? The next 5 issues to address

By focusing on these critical areas, the OpenStack community can extend fully-open private and hybrid cloud infrastructure to everyone

wifi iot

WiFi’s evolving role in IoT

WiFi is often the obvious choice for IoT, but limitations have lead to the addition of two new specifications, 802.11ah and 802.11ax

dns world

Comparing the performance of popular public DNS providers

In this article, we’ll dive into our results from measuring the performance of 10 popular public DNS providers—for those who use third party providers, the conclusions can help inform your choice in public DNS resolvers.

threat spy unsecure hack

Threat detection automation won’t solve all your problems

To close the cybersecurity gap, look to incident response automation

security lock

9 reasons why the death of the security appliance is inevitable

The confluence of encryption, cloud and containers is making a poor situation intolerable

women puzzle piece

Interoperability isn’t guaranteed in the open network era

In fact, testing is more critical than ever

data lake

How to derive real, actionable insights from your data lake: Five best practices

By taking steps to ensure the quality of assets within the data lake, organizations can prevent their lakes becoming data swamps

code script

Building an app-centric Infrastructure Performance Monitoring system

How to continuously capture, correlate and analyze system-wide heterogeneous infrastructure data so you can compare it to established response time, utilization and other metrics

threat ransomware response

Respond to ransomware in three steps: secure, assess, recover

There’s no easy button for ransomware recovery. But if you have a response plan you’ll be ready to spring into action and restore your system’s operations following an attack

patch

7 patch management practices guaranteed to help protect your data

With these fairly simple practices in mind, you can stay on top of patch updates and safeguard your virtual data environments

authentication

Bring Your Own Authentication is upending online security practices

BYOA allows consumers and businesses to employ a variety of authentication methods that are simple to setup and convenient to use

5g

What 5G means for your business

The 5G-powered enterprise will be less constrained by its physical location thanks to vastly improved service delivery capabilities that improve employee and customer engagement

mystery universe night stars

Demystifying network analytics

Understanding how analytics should work is key to the future of network operations

virtualization

The emergence of software-defined application delivery technology - and what it can do for your network

Virtual appliances for load balancing inherit the challenges of legacy solutions. What’s needed is an architecture based on software-defined principles

future

The AI revolution: Is the future finally now?

This time around, the AI movement seems to have a tailwind in the form of critical enabling and supporting factors

hybrid clouds

How to decide between cloud, on-premise and As-a-Service

Use these tips to weigh the options

The growing importance of Time Sensitive Networks

Demanding new applications require precisely timed system control

How virtualizing BLE Beacons will change the indoor mobile experience

Unsupervised machine learning in the cloud eliminates site surveys and ensures consistent user experience across mobile devices and space

Load More