Matt Conran

Opinions expressed by ICN authors are their own.

Matt Conran has more than 17 years of networking industry with entrepreneurial start-ups, government organizations and others. He is a lead Architect and successfully delivered major global greenfield service provider and data center networks. Core skill set includes advanced data center, service provider, security and virtualization technologies. He loves to travel and has a passion for landscape photography.

The opinions expressed in this blog are those of Matt Conran and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Software Defined Perimeter (SDP): Creating a new network perimeter

Managed WAN and the cloud-native SD-WAN

Managed WAN and the cloud-native SD-WAN

The motivation for WAN transformation is clear, today organizations require: improved internet access and last mile connectivity, additional bandwidth and a reduction in the WAN costs.

The modern data center and the rise in open-source IP routing suites

The modern data center and the rise in open-source IP routing suites

Open source enables passionate people to come together and fabricate work of phenomenal quality. This is in contrast to a single vendor doing everything.

Open architecture and open source – The new wave for SD-WAN?

Open architecture and open source – The new wave for SD-WAN?

As networking continues to evolve, you certainly don't want to break out a forklift every time new technologies are introduced. Open architecture would allow you to replace the components of a system, and give you more flexibility to...

Performance-Based Routing (PBR) – The gold rush for SD-WAN

Performance-Based Routing (PBR) – The gold rush for SD-WAN

The inefficiency factor in the case of traditional routing is one of the main reasons why SD-WAN is really taking off.

Zero-trust: microsegmentation networking

Zero-trust: microsegmentation networking

Microsegmentation gives administrators the control to set granular policies in order to protect the application environment.

Software-defined perimeter: Identity-centric enforced network perimeter

Software-defined perimeter: Identity-centric enforced network perimeter

Traditional VPNs no longer cut it.

Named data networking: Stateful forwarding plane for datagram delivery

Named data networking: Stateful forwarding plane for datagram delivery

Reinventing smart routing and dumb forwarding.

Named data networking: names the data instead of data locations

Named data networking: names the data instead of data locations

Will NDN kill the cloud, just like content delivery networks (CDN) kill latency?

The role of open source in networking

The role of open source in networking

SD-WAN vendors use open source as the foundation of their solutions and then add additional functionality over the baseline.

The cloud-based provider: Not your grandfather’s MNS

The cloud-based provider: Not your grandfather’s MNS

Ideally, meeting the business objectives of speed, agility and cost containment boil down to two architectural approaches: the legacy telco versus the cloud-based provider.

Zero trust: The transition from legacy to cloud-native

Zero trust: The transition from legacy to cloud-native

To undergo the transition from legacy to cloud-native application environments you need to employ zero trust.

Load More