John Burke

John Burke, CTO of Nemertes, advises clients based on primary research in cloud, networks, automation, and security, and on his 30-plus years’ experience as an IT researcher, practitioner, and leader.

AI is coming to the network

More work for admins: When labor-saving management tools don't ease workloads

More work for admins: When labor-saving management tools don't ease workloads

There are lots of good reasons for network automation, but network teams need to be mindful of what they want to do with any time and resources saved.

Should security systems be the network?

Should security systems be the network?

Small enterprises can get away with using security gear as their network infrastructure, but can larger ones, and is it a good idea?

3 ways to reach the cloud and keep loss and latency low

3 ways to reach the cloud and keep loss and latency low

Performance of cloud-based apps that create lots of network traffic can be hurt by network loss and latency, but there are options to address them.

Software vulnerabilities pose a risk to network infrastructure

Software vulnerabilities pose a risk to network infrastructure

IT pros need to require software bills of materials for the open-source networking software used in their enterprises to guard against potential threats.

4 ways to better secure your network infrastructure

4 ways to better secure your network infrastructure

Must-do initiatives include eliminating generic credentials, regularly auditing IT admin accounts, and deploying MFA for infrastructure access.

Don’t let automation break change management

Don’t let automation break change management

Reliable change-management practices are critical to expanding network automation.

How to manage scripts that manage network automation

How to manage scripts that manage network automation

By following these four best coding practices, writers of scripts that automate networking chores can reduce errors, track changes, and ensure the code can be readily maintained as it evolves.

The case for declarative network automation

The case for declarative network automation

Some network teams are finding power and simplicity in the shift from telling devices what to do—imperative programming—to describing what they should be—declarative programming.

Zero trust requires network visibility

Zero trust requires network visibility

AI and machine-learning techniques are imperative in a zero-trust environment that depends on analysis of the behavior of every device, person, or system using the network.

Use zero trust to fight network technical debt

Use zero trust to fight network technical debt

Adopting a zero-trust approach can be the impetus IT teams need to expose technical debt and make sure all network components are capable of enforcing security controls.

Zero trust requires clear architecture plans before changing core systems

Zero trust requires clear architecture plans before changing core systems

Successful enterprises approach zero trust carefully, with the big picture in mind, before making changes to network access, data management or application engineering.

Load More