

Scott Hogg
Scott Hogg is a co-founder of HexaBuild.io, an IPv6 consulting and training firm, and has over 25 years of cloud, networking and security experience.

6 network and security trends you can expect in 2017
Security and network trends for 2017 include the evolution of malware, IoT will contribute to security concerns, and AI and machine learning will be applied to security.

A dozen extensions to TCP/IP that optimize internet connections
This article will break down new Internet Protocol optimizations and show which ones are most impactful for your organization and can improve your internet application experience.

5 reasons to move to an SD-WAN
Software-defined WANs can save money and improve network performance.

Resources abound to make cloud services more secure
Cloud security training and certification are easily available from many trusted sources.

ARIN Finally Runs Out of IPv4 Addresses
IPv4 Address Cupboards are Bare in North America

Is an SDN Switch A New Form of a Firewall?
Many people anticipated that enterprise organizations would adopt Software Defined Network (SDN) technologies later than service providers or multi-tenant data centers and cloud service providers. We are now seeing more use of...

Annual Security Reports Predict What We Can Expect in 2015
Recent security reports give insight into security best practices often missed.

SDN Security Attack Vectors and SDN Hardening
As enterprises look to adopt Software Defined Networking (SDN), the top of mind issue is the concern for security. With the introduction of SDN, new strategies for securing the control plane traffic are needed. This article will...

OpenFlow Supports IPv6 Flows
Software Defined Networking systems are gaining IPv6 capabilities

Promise Theory
The way we have created IT systems over the years has been very linear with each individual component being statically configured. If a human makes an error in any one of the many configurations, then the whole system breaks down. ...
Software Containers: Used More Frequently than Most Realize
Whether you have considered trying to secure an application by putting it into a “sandbox” or wondered how a Software as a Service (SaaS) provider keeps your application and data isolated from other customers, you have been...
ARIN Enters Phase 4 of IPv4 Exhaustion
After IANA allocated the final IPv4 addresses to the five Regional Internet Registries (RIRs) on February 3, 2011, the RIRs have been running out of IPv4 addresses over the past three years. APNIC ran out on April 15, 2011; RIPE NCC...
Windows XP: Goodbye and Good Riddance
There has been much written recently about the end of support for Windows XP on April 8, 2014. There are concerns about security vulnerabilities that will be used after Microsoft stops patching the operating system. However, if...
Not your Father’s Flow Export Protocol (Part 2)
In the previous article we covered how NetFlow, IPFIX and the variety of other flow export protocols can be used to give us some application traffic visibility. However, nothing gives as much detail as raw packet decode. A new...
Your Father’s Flow Export Protocol (Part 1)
You may be familiar with NetFlow, IPFIX and other similar protocols like J-Flow and sFlow. These protocols provide useful insight into traffic mix and communities of interest. However, these protocols do not contain the...
The erosion of IT's middle class
As new technologies continue to emerge in the network, the need for highly skilled IT administration resources will grow just as well.However, the advent of Software Defined Networking (SDN), cloud systems, and orchestration software...
Clos Networks: What's Old Is New Again
Clos networks were first created in the mid-1950s as a method to switch telephone calls. Clos networks evolved into crossbar topologies and eventually into chassis-based Ethernet switches using a crossbar switching fabric. Now...
Using SDN to Create a Packet Monitoring System
Because of the limitations of SPAN/monitor ports on switches, organizations have turned to using taps and packet monitoring switches. These solutions can be expensive which has lead companies to look for alternatives. Establishing...
-
White Paper
-
eBook
Sponsored -
eBook
Sponsored -
White Paper
-
Video/Webcast
Sponsored