Welcome!


From the Blogosphere

There is probably never going to be a perfect balance in the industry between Do-it-yourself (DIY) and Do-it-for-you (DIFY) networking. It seems exceedingly unlikely that there is a one-size-fits-all type of solution out there. And so we will invariably end up with a bifurcated market ...
No doubt, the world of cloud storage has evolved over the past several months in terms of broader interoperability, increased features and functionality as well as lower overall costs. Whereas the questions posed about cloud storage used to center on integration with (or in place of) e...
One of the challenges in scaling modern data centers rises directly from an increase in network complexity over the past few years. We can argue why complexity has increased, but it's reasonable to say that scaling data centers means more boxes - more servers, more network gear, more m...
BriefingsDirect had an opportunity to uncover more about about such new, agile business services at the recent 2014 Ariba LIVE Conference in Las Vegas when we spoke to Erik Gershwind, President and CEO of MSC Industrial Supply in Melville, New York. MSC has been using the Ariba Networ...
It's a given, this year more CIOs will shift their focus from selective IT efficiency to overall IT effectiveness. In 2014 and beyond, enterprise IT leadership will be judged on their ability to meet the demands of tech-savvy Line of Business users.

This is the type of meani...
When people write about software-defined architectures being "disruptive" to the network they're doing a bit of a disservice to just how much change is occurring under the hood in the engine that drives today's businesses. The notion of separating control and data planes is superficial...
Through our more than 200 security algorithms, StealthWatch is able to digest metadata known as NetFlow coming off of switches, routers, and various perimeter security devices to present an actionable, continuous macro level view of what has seeped through the perimeter. Using many of...
If you're a real estate investor, you know how important it is to have the latest figures and data at your fingertips. You probably have favorite websites and newsfeeds to keep up as much as possible, but what you really need is real data in real time. Enter S'moretgage, which was debu...
I recently came across a blog post on OpenOpsIQ asking the question: "With the introduction of real-time logging, why cant we have a single solution for monitoring the entire stack?" In my opinion, you can! As we have seen lately from a survey we carried out across a sample of the Loge...
You can run from Visual Studio 2013 Express for Windows Update 2 if you have the source code. In case you have only the XAP file you can run using the XAPDeploye.exe (61KB)tool which you can find in: /Program files(x86)/Microsoft SDKs/Windows Phone/v8.0/Tools/XAP Deployment folder. ...
If you're an executive that's concerned about the high-cost of proprietary software, you're not alone. If your IT team pushes back whenever Line of Business leaders ask them for feature enhancements that goes beyond the limits of the commercial software packages they've licensed, then ...
The days of completely separate storage network technologies are quickly fading. It feels like it’s only a few years ago that Fiber Channel was the way to create large scale storage networks. Big honking storage devices on a separate network, connected to Fiber Channel switches, connec...
Senior executives at progressive companies have been on a mission -- they're raising the bar of expectations for leaders of their significant investment in business technologies. Providing reliable access to IT resources and reporting on system up-time objectives are unlikely to gain r...
When we think about what’s next, our frame of reference is almost universally anchored to what we are doing now. We look at how things are, and then we aim our sights forward. In some cases, we might make incremental moves ahead; in other cases, maybe we look for improvement by orders ...
Conventional wisdom refers to DevOps as a strategy, an approach, or a movement as some call it. DevOps addresses the idea that Development and Operations need to be aligned well in an application lifecycle, work closely and collaboratively to eliminate inefficiency, reduce bottlenecks,...
A great article of future of cloud IDEs: The Cloud IDE and its impact on DevOps by Chris Riley (@HoardingInfo). The article makes a number of excellent points. Many developers will oppose the Cloud IDE without much consideration. These are all very good points. From my personal exper...
Programmability is in F5's DNA. Since 2001 when we introduced iControl SOAP to the more recent additions such as iRules and iCall. Even looking at our most recent acquisitions you can see the common theme: an architectural vision based on extensibility and programmability. BIG-IQ is ...
The Internet has been buzzing over the recent news of a federal proposal that creates the equivalent of “slow” and “fast” lanes online. The Federal Communications Commission (FCC) voted on Thursday, May 15, 3-2 in favor of a new proposal that enables the creation of Internet fast lanes...
IP Multicast is one of those technologies that most everyone loves to hate. It’s almost the perfect example of how complicated we have made networking. Getting IP Multicast to run depends on several protocols that are all somewhat intertwined or dependent on each, their relationship so...
Pop quiz: Your development team is developing a new mobile application. Should they optimize it for use over a mobile network or over WiFi? Another way to ask that same question is, "Should they provide a great quality of experience for users over a mobile network or over WiFi? And y...
It turns out that a real-time business-process approach to billing, ordering and settlement terms between buyers and sellers benefits both American Electric Power, one of the largest investor-owned electric utilities in the U.S., and its many vendors. BriefingsDirect had an opportunit...
For many SDN and DevOps enthusiasts, the natural outcome of this wave of technological change is a highly-automated network that is well-orchestrated with surrounding systems and applications. One of the prevailing thoughts is that this level of automation is a well-formed abstraction ...
The UK’s Digital Government program is such a great leadership example, because not only are they pioneering the G-Cloud store, a service catalogue for IaaS, PaaS and SaaS suppliers, but also they are defining ‘Agile Procurement’ practices too. Since the G-Cloud project was aligned un...
Node-RED created in an IBM laboratory (UK) is a GUI for wiring up the Internet of Things (IoT)built-on Node.JS. It is possible that some of you have known, or used LabView. LabView is a GUI for wiring up complex laboratory equipment like Voltage sources, measuring instruments, automa...
Technology shifts are creating a lot of chaos, including the way we use words. Cloud. SDN. Multi-tenant. Instances. They're all inter-related and seem to have different meanings depending on who's trying to sell you what today. That's more than a tad bit disconcerting, because you kno...
On this side is a variant of SDN: network service virtualization (NSV). On the other side is an emerging application architecture: microservices. Where they meet lies devops. One of the most fascinating things to watch in the technological shifts occurring today is to see them all con...
It comes as no surprise that the CEO of Target has resigned in the wake of their massive data breach. The 2nd executive, if I remember correctly, to resign due to the mishap. Data breaches are costly according to the most recent Ponemon 2014 Cost of Data Breach Study: United States and...
As a SaaS business matures, the importance and value of SaaS metrics increase. Most SaaS businesses begin their journey down the SaaS metrics path by tracking recurring revenue in relation to customer acquisition costs. After building a solid customer base, churn becomes a priority. Th...
As public and private cloud adoption continues to skyrocket, it’s becoming more and more clear that Database-as-a-Service (DBaaS) is hugely important to users. This isn’t really news, as much as it’s a confirmation of what many were seeing much earlier in the cloud industry’s maturatio...
It means you can't use "network" protocols to make intelligent decisions about applications any more. Back in 2000 (or 2001, I forget exactly), I got to test a variety of bandwidth management appliances. Oh, they were the bomb back then - able to identify (and classify) applications b...
How many of you actually fill out the registration cards that come with your kid's toys? Anyone? Anyone? Bueller? Bueller? That's what I thought. Me neither. Not as a parent and certainly not as an adult. After all, they were just going to use it for marketing, right? Fast forwa...
In reviewing some opportunities for Plexxi this week, I was reminded that we have made things very hard on ourselves. Through no one’s fault but our own we have created monsters of networks that are impossible to maintain, debug, diagnose and understand. I have been lucky in my career...
This week's "bad news" with respect to information security centers on Facebook and the exploitation of HTTP caches to affect a DDoS attack. Reported as a 'vulnerability', this exploit takes advantage of the way the application protocol is designed to work. In fact, the same author who...
AppDynamics is excited to unveil details behind our new Application Intelligence Platform which is the technology foundation for the AppDynamics portfolio of performance monitoring, automation and analytics solutions (transaction analytics was also announced today). Today’s software d...
Forgotten in the outcry over the NSA snooping on people’s online activities is that our favorite websites and online marketers do the same thing every day. However, profiling, tracking and third-party leaks will soon be tools of the past. Re2You is re-imagining how we use the Internet....
How many different network protocols can you name? There are, of course, a set of staples just about everyone knows: IP, ARP, VLAN, TCP, UDP, DNS, HTTP, SSL, TLS, SMTP, FTP, SMB, CIFS, 802.1q, 802.1ad. Then there are recent additions like VXLAN, NVGRE, SPDY. But we could fill post ...
Cisco would like to use the phrase IoE – Internet of Everything. But the common term is IoT (Internet of Things) these days. It refers to any device that has an IP address, and can communicate. I will be speaking at an IoT Expo in San Francisco on May 5th. and my session is called – Bi...
Being from the Hawaiian Islands, the annual gathering of the Kohola (humpback whales) is always a spectacular view. They can get over half their body out of the water and administer a cannonball body slam splash like you’ve never seen before. Most of the internet thinks they breach to ...
Way back in the early days of the Internet scalability was an issue (the more things change...). One of the answers to this problem was to scale out web servers using a fairly well-proven concept called load balancing. Simply put, distribute the load across web servers to make sure eve...
From a cost perspective, the networking dialogue is dominated by CapEx. Acquisition costs for new networking gear have historically been tied to hardware, and despite the relatively recent rise of bare metal switching, networking hardware remains a high-stakes business. But SDN is chan...