Interoperability in computing environments is a repeating problem affecting multiple parts of an organization. When systems cannot communicate with one another, the result is slowdowns in every way, from technology performance (as data has to be converted from one system to another) to human processes (such as teams spending time in yet another meeting trying to devise workarounds for data translation challenges). Interoperability must emerge, because common formats to send and store data are a necessity.
As the emphasis in networking shifts from device management to over-the-top integrations with the move towards automation and DevOps, our network engineers will spend an increasing percentage of their time working above the devices that form the foundation of the systems over which they have dominion.
A few years ago, I found myself in a unique situation. My business had grown to a place of being all virtual. Our client base was spanning three continents. A project that required a lot of time in London was looming, and I had sold my house, so the idea of an extended period living in Europe was appealing.
Email continues to be both the number one way business people across the globe communicate, as well as the number one threat vector that can endanger the very thing it is trying to enable, getting business done. However, our global economy means now, more than ever, senders and receivers of email can be anywhere in the world.
Somewhat lost in the middle of a pretty newsworthy couple of weeks is some technology news that people really ought to be paying attention to. Last week, the FCC issued a Notice of Inquiry as part of a regular assessment of broadband penetration in the US. In the notice, the FCC led by Ajit Pai asked for public comments on, among other things, whether mobile broadband is a suitable replacement for fixed Internet connectivity.
The convergence of the Internet of Things (IoT), edge, and cloud has changed how enterprises balance core applications and processing capabilities between public clouds and the edge. Remote branch offices, manufacturing sites, and retail stores are no longer just connecting through a centralized WAN – a good majority of these connections are happening in the cloud.
When we think of our sources for news and entertainment, we often look towards the traditional media outlets, the online news sites and the long established radio and television broadcasters that have dominated the airwaves for years. However, with the rise of streaming and the lack of diversity in news coverage, as well as limited playlists on radio by the traditional outlets, podcasts and streamed programming seems to be where the fresh perspectives are now coming from.
What is Encrypted Traffic Analytics?
In a connected world, businesses are trying to find the balance between user privacy and security. More and more network traffic is encrypted as people and businesses try to keep their data private and secure as it travels through the network.
The lingua franca for IT is acronyms. On the networking side, we speak primarily in protocols, abbreviations, and certifications. Our vocabulary is already full, but we seem to add more to it every year. And the rate of change only feels like it is accelerating.
Henry Ford wasn’t the first person to build a car. He was, however, a pioneer in creating the Model T, a car that was affordable for the average consumer. It took years to develop and prototype this model—and, at the same time, to revolutionize the manufacturing process that led to the moving assembly line.