Network Virtualization

Subscribe to Network Virtualization: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Network Virtualization: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from Network Virtualization
RevChain Solutions, LLC (RCS), part of Windstream and a provider of enterprise carrier grade billing, account management and customer care solutions, announced on Tuesday that it has executed a three-year, $5 million extension for professional services and support with Empresa de Telec...
ObserveIT has announced that it has raised $20 million from Bain Capital Ventures. Growing over 3,500% in the past five years, ObserveIT’s solution is used at more than 800 corporations in 70+ countries. ObserveIT will use the funding to expand U.S. headquarters and overall product dev...
In this step-by-step guide you will learn how to create Development Virtual Machines for Vagrant with Packer. Sharing a common development environment with everyone on your team is important. It is really hard though to keep the same dependencies, database versions and other systems i...
In my previous two posts Act 1 – The What and Why and Act2 – The How and How Not I covered the main benefits of CDNs and what type of tools are needed to monitor them. Now, I want to go into some detail of why you need to consider monitoring them in the first place. Let’s face it: if t...
The pace of cloud growth and adoption remains inextricably linked to the pace of cloud education. Whether it’s due to security concerns being allayed or cloud definition confusion being reduced, the small- and medium-business space seems ripe for education-based growth. Add in the cont...
In my first blog Act 1 – The What and Why I talked about the benefits and some risks around using a Content Delivery Network (CDN). Today I will cover some details around some common misunderstandings regarding how to monitor CDNs and explain the right monitoring strategy. Which monit...
Virtual servers are rapidly becoming more popular than physical dedicated servers for a variety of reasons. A virtual private server (VPS) acts like a dedicated server in all respects on a software level while allowing multiple servers to be run on a single physical machine. Since most...
“Step right in. You will witness a show of magic and wonders, passion and trust, speed and misunderstandings.” a (slightly altered) catch phrase that keeps popping in my head when talking to companies in regards to managing Content Delivery Networks (CDN). Apart from the misconception ...
Today’s software-defined networking (SDN) and virtualized networking solutions focus on virtualizing network functionality within the data center and the metropolitan area network (MAN). But for typical enterprises, and those managed and cloud service providers that cater to them, thes...
This whitepaper explores the five critical decisions organizations must adhere to when building a backup and recovery plan to prevent the complexity of virtualization that complicates IT services and the day-to-day of IT professionals across industries. It covers complete backup and re...
An executive summary that provides insight into the challenges organizations face when moving to a virtualized environment and covers best practices and solutions to help. Learn more about Symantec’s unique solution to IT environments looking to take full advantage of virtualization. ...
Read this whitepaper to learn how virtualization offers dramatic benefits for midsize companies, including efficiency, cost savings, and increased reliability and performance. Find out the best way to implement a virtualization solution to allow you to do more with less and free up IT ...
In this whitepaper see how 14 virtual backup products scored in this free evaluation report from Info-Tech Research Group. Learn more and read on.
Faced with competitive pressures demanding increased IT agility, Line-of-Business (LOB) managers have been increasingly relying on virtualized infrastructures to accelerate deployment of critical application workloads. Server virtualization has rapidly become the default platform for m...
In my last blog, I speculated about some of the opportunities that could arise from the implementation and subsequent evolution of SDN and NFV across virtual carrier networks. With companies like Google well-advanced in the implementation of an SDN control plane to manage its flow of b...
With the rise of BYOD and the sharp growth of mobile devices, organizations worldwide, including those in need of government-level security, are turning to Virtual Bridges, Inc. to reduce risk and increase control over their sensitive data. With Virtual Bridges VDI private cloud soluti...
With the launch of Cisco’s software-defined networking startup Insieme expected tomorrow, our industry is about to hear a lot about “application-centric” everything. So what does “application-centric infrastructure” mean? First, some basics: Networking is about connecting computing de...
A cloud security take on an old riddle: analyze risks, identify needs, develop priorities, deploy scalable model, and leave room for dessert. Security is big. It encompasses a great many definitions, confronts a great many issues and is addressed through a great many solutions using a...
In my last blog, I looked at the ways in which Software-Defined Network (SDN) and Network Functions Virtualization (NFV) enhance flexibility and allow for greater services mashups, and I ended with the question of how billing and compensation will support these new capabilities. With ...
In my previous blog, I suggested that both Software-Defined Networks (SDN) and Network Function Virtualization (NFV), although arguably different in intent and in detail, are nevertheless both driving the evolution of network architecture in the same direction. Network functions are ab...
Some of the most technologically advanced organizations in the world today are utilizing strategies based on the concept of the Network Centric Organization. These strategies, methodologies and concepts are important for just about any organization that is geographically dispersed and...
In a previous blog I took the opportunity to comment on the role of billing in a future of Software Driven Networks (SDN). However, before we get too caught up in the billing component, it might be worthwhile to discuss where SDN itself is going and to tease out some of the distinction...
Net Optics on Wednesday announced a spectrum of advanced new features and capabilities in its popular Flex TapTM product line. The Flex Tap resolves system-wide signal loss issues for Service Providers and other organizations as network volumes increase and optical networks migrate to...
I have been writing about the Network Centric Operations approach to mobile field services for the past couple of years and plan to continue with even more enthusiasm. The mobile devices, mobile platforms, communication networks and integration frameworks exists today to revolutionize ...
Net Optics on Monday announced that its Director Pro™, advanced Network Packet Broker (NPB) and Monitoring Access Switch was chosen by Brightlink Communications, to help manage soaring bandwidth demands and maintain consistently high Quality of Service (QoS) – a key determinant of cust...
Over the past few years, the demand for applications that run on mobile devices has exploded and there is no sign of this demand decreasing anytime soon. This, coupled with the rapid growth of cloud computing, has resulted in a large number of business applications that live outside th...
Enterprise IT organizations are under increasing pressure to do more with less. As such, they are highly motivated to leverage existing investments for maximum efficiencies rather than spend time and resources on acquiring, integrating and managing pricey new equipment. Enterprises are...
We all know that our computer systems are underutilized. Most new desktops come with far more storage than is going to be used (or, to be more exact – should be used given file servers). Processors desktops and servers are busy only 20% of the time, and we always buy more memory than w...
In this hypercompetitive era faced with multiple technology transitions, businesses must change the game and transform how they engage customers to promote future growth. See Cisco unveil the Cisco Open Network Environment (ONE) Enterprise Networks Architecture, a game-changing technol...
Incident management (IM) is a necessary part of a security program. When effective, it mitigates business impact, identifies weaknesses in controls, and helps fine-tune response processes. Traditional IM approaches, however, are not always effective in a partially or completely virtual...
MedAssets, in partnership with Ariba, an SAP company, has found ways to improve health provider and supplier compliance, reduce costs, and develop better accuracy. To help transition to new levels of productivity, we explore how the game is being changed by MedAssets, a healthcare ind...
“There is new and growing demand in today’s market for quad-core processing and multimedia graphics on thin clients,” said Jeff Groudan, marketing director, Thin Clients, HP, as HP announced the HP t820 Flexible Series Thin Client. “With the HP t820, we’ve delivered a more advanced thi...
In our increasingly connected world, the number of mobile phones will exceed the world’s population by 2014. Users expect to be able to run diverse applications on these devices at work, home, and practically anywhere else. We assume secure access to any information we need, with an ex...
Legendary Intel co-founder Gordon Moore’s eponymous law holds that the number of transistors per square inch of chip will double every two years, a prediction that has held remarkably firm as incredibly tiny devices have been made increasingly powerful. In recent years, that assertion ...
Hackers and other attacks have become a major concern for businesses of all sizes. There are many reasons why your network could be taken out and rendered offline. Having your website down for even a few minutes can cause serious damage not only to your bottom line but also to your com...
The enterprise is increasingly resorting to cloud services for many applications ranging from efficient application hosting or low-cost backup and archiving to cloud data centers. Typically, enterprise networks are interconnected to the cloud over low speed IP networks that are limited...
Cloud computing, developed more than eight years ago, has become a multi-billion dollar segment of the IT services market. However, the original server-centric model, used to provide low cost computing, is giving way to a new network-centric model that will deliver better performance a...
Every business acknowledges that network security is critical. But how do you quantify the business value that a secure network provides? And how does an enterprise evaluate and justify investing in network security products like next-generation firewalls, intrusion prevention systems ...
"The government's desire to think 'cloud first' is critical in reducing federal IT costs and AWS GovCloud should ease the transition, while maintaining the necessary security and compliance requirements demanded by the public sector," said Anthony Robbins, vice president of Federal at ...
Corporate BYOD growth is prompting enterprises to take a closer look at their networks and their approach to security. As this initiative grows, along with the increased need for keeping the network and its data secure, more IT professionals are reconsidering NAC. In fact, a recent Ogr...