With the introduction of cloud, BYOD, IoT and virtual offices scattered around the globe, the traditional architectures not only hold us back in terms of productivity but also create security flaws that leave gaps for compromise. The network and security architectures that are commonly deployed toda..
Industry trends such as the Internet of Things (IoT) and content distribution networks (CDNs) are driving the need for edge computing. That’s because these solutions often require low latency, high bandwidth, greater reliability, and strong security. It’s a tall order meant for Micro Data Centers (M..
The U.S. Department of Energy says it is working on a supercomputer that will break the target of exaFLOP computation – a quintillion (1018) floating-point computations per second – in order to handle high-performance computing and artificial intelligence. Being built in conjunction with Intel and C..
Earlier this month, I wrote that “even as smartwatch shipments continue to grow, significant industrial and business use cases for these internet-connected devices have yet to appear.” And then a few days later, as if on cue, International Data Corporation (IDC) put out a press release about the lat..
SD-WAN vs. WAN OptimizationOptimization of applications and data traffic has been an integral part of the WAN since its inception. WAN optimization accelerates application traffic by overcoming latency and reducing the amount of data traversing the WAN by applying techniques like protocol accelerati..
It has been just 10 months since Tom Gillis became VMware's senior vice president and general manager of its networking and security business, and in that time he has overseen some major changes in the company’s core products. Most recent is a milestone release of the company’s NSX-T Data Cente..
The Mercury retrograde kicked in big time on Wednesday as Facebook suffered an eight hour-outage that also affected Instagram and Facebook Messenger. No one was believed to be harmed; a few might have even had offline interactions with other human beings. Learn about backup and recovery: Backup vs..
Recent breakthroughs in technology have expanded the possibilities for where data is gathered, processed, stored and analyzed. IT staffs and their business counterparts now have the flexibility of deciding whether their applications are more efficient residing in the cloud, within a traditional data..
The IEEE's latest standard, 802.11ax, has been designed inside and out for high efficiency. Also known as Wi-Fi 6, 11ax promises real-world performance improvements that will keep today’s mobile users and IoT devices connected and happy. To achieve that, over 50 features have been proposed as p..
The incredible power and automation offered by today’s more advanced SD-WAN platforms is transforming how enterprises are building and managing their networks. Operations that were once massive resource-intensive projects for network teams, have now been reduced to mere minutes of work. Need to chan..