

John Burke
John Burke, CTO of Nemertes, advises clients based on primary research in cloud, networks, automation, and security, and on his 30-plus years’ experience as an IT researcher, practitioner, and leader.

More work for admins: When labor-saving management tools don't ease workloads
There are lots of good reasons for network automation, but network teams need to be mindful of what they want to do with any time and resources saved.

Should security systems be the network?
Small enterprises can get away with using security gear as their network infrastructure, but can larger ones, and is it a good idea?

3 ways to reach the cloud and keep loss and latency low
Performance of cloud-based apps that create lots of network traffic can be hurt by network loss and latency, but there are options to address them.

Software vulnerabilities pose a risk to network infrastructure
IT pros need to require software bills of materials for the open-source networking software used in their enterprises to guard against potential threats.

4 ways to better secure your network infrastructure
Must-do initiatives include eliminating generic credentials, regularly auditing IT admin accounts, and deploying MFA for infrastructure access.

Don’t let automation break change management
Reliable change-management practices are critical to expanding network automation.

How to manage scripts that manage network automation
By following these four best coding practices, writers of scripts that automate networking chores can reduce errors, track changes, and ensure the code can be readily maintained as it evolves.

The case for declarative network automation
Some network teams are finding power and simplicity in the shift from telling devices what to do—imperative programming—to describing what they should be—declarative programming.

Zero trust requires network visibility
AI and machine-learning techniques are imperative in a zero-trust environment that depends on analysis of the behavior of every device, person, or system using the network.

Use zero trust to fight network technical debt
Adopting a zero-trust approach can be the impetus IT teams need to expose technical debt and make sure all network components are capable of enforcing security controls.

Zero trust requires clear architecture plans before changing core systems
Successful enterprises approach zero trust carefully, with the big picture in mind, before making changes to network access, data management or application engineering.