John Edwards

Contributing writer

John Edwards is a veteran business technology journalist. His work has appeared in The New York Times, The Washington Post, and numerous business and technology publications.

What are network assurance tools and why are they important?

NVIDIA DGX Cloud targets generative AI

NVIDIA DGX Cloud targets generative AI

NVIDIA's supercomputer in the cloud delivers full-stack AI development platform

Startup UniFabriX uses CXL memory technology to boost rack density

Startup UniFabriX uses CXL memory technology to boost rack density

Smart memory node device from UniFabriX is designed to accelerate memory performance and optimize data-center capacity for AI workloads.

IBM advances its quantum roadmap as competition heats up

IBM advances its quantum roadmap as competition heats up

IBM is in a strong position as the first quantum computers reach customers, but there is a slew of competitors working to commercialize emerging quantum technologies.

Predictive networking promises faster fixes

Predictive networking promises faster fixes

As AI and ML are backed by more powerful neural networks, prescriptive analytics will recommend paths to better future outcomes.

How network pros can fight being squeezed out of cloud decisions

How network pros can fight being squeezed out of cloud decisions

Guaranteeing a role in planning multicloud networks requires networking teams to acquire cloud skills, embrace NetOps, and focus more on their organizations’ business goals.

8 hot networking technologies for 2023

8 hot networking technologies for 2023

Innovative technologies designed to make networks faster, smarter and more secure

How to choose a network service provider

How to choose a network service provider

Finding the best provider can be challenging, time-consuming, and even a little bit scary. Here's some help.

How to combat counterfeit network gear

How to combat counterfeit network gear

Spotting phony gear can be tricky. Here's how to avoid buying fake gear and what to do if you discover counterfeit devices on your network.

Software-defined perimeter: What it is and how it works

Software-defined perimeter: What it is and how it works

With strict authentication enforced by microsegmentation, software-defined perimeter can support Zero Trust Network Access.

Cloud networking certs: Which is right for you?

Cloud networking certs: Which is right for you?

AWS, Microsoft Azure, and Google Cloud offer career-boosting certifications in cloud networking.

Multi-cloud networking software: Better speed, performance, efficiency

Multi-cloud networking software: Better speed, performance, efficiency

MCNS promises to bridge the gap in network visibility and management across multiple cloud environments

Load More