3 min read
Network Automation Is Hard: Here’s How We Can Make It Easier
The promise of off-the-shelf network automation remains unrealized. But until the day this long-awaited automation solution arrives, IT pros can make...
3 min read
The promise of off-the-shelf network automation remains unrealized. But until the day this long-awaited automation solution arrives, IT pros can make...
3 min read
Ubiquitous, destructive, and difficult to defend, backdoor attacks of cloud services constitute unique threats to enterprise networks — and they...
2 min read
“Software-defined networking” has become something of an IT industry buzzword, but its underlying mechanics are more complicated than many people...
2 min read
As companies in the petrochemical space incorporate big data and cloud computing into their networking infrastructures while employing leaner remote...
3 min read
The technology is being developed for and deployed in practically every industry, but what does the term “machine learning” really mean? More...
2 min read
5G will enable faster mobile internet speeds and lower latency times, while making it far easier to support IoT devices. But new challenges to indoor...
2 min read
By leveraging a simple botnet, hackers were able to submit millions of fraudulent comments to the FCC in advance of its vote on net neutrality. We’ve...
2 min read
Internet-connected devices like smart security cameras offer enterprises numerous benefits, but with those benefits come serious cybersecurity risks....
3 min read
To realize the tremendous potential of the Internet of Underwater Things, the networking community first must find a solution to the problem of...
3 min read
Courthouses can be dangerous places for judicial officials, which is why stronger security systems are desperately needed. On March 11, 2005, Brian...
2 min read
Sophisticated analytics tools are all but a must in increasingly complex networking environments like colleges and universities. “Over the past five...
3 min read
Cyberinsurance is increasing in popularity, but it’s no substitute for a strong set of cybersecurity protocols. “Cyber is uncharted territory,”...