Demo of Arista CloudVision automation workflow
Steve Puluka recently shared a video of Arista CloudVision, highlighting its potent automation workflow capabilities. The demonstration showcases how CloudVision can streamline network operations by automating tasks across physical and virtual network devices. This tool is pivotal for IT professionals looking to enhance network efficiency and reliability through advanced automation and simplified management processes. Read more in this LinkedIn Pulse article inspired by the Arista presentation at Networking Field Day 36!
Read More:
Demo of Arista CloudVision automation workflow
New Capabilities With Plenty of Citrix Heritage
Alastair Cooke recently discussed the evolving landscape of Citrix solutions, emphasizing the introduction of new capabilities while retaining the core heritage that many IT professionals trust. He explores how these advancements align with current enterprise needs, enhancing both functionality and user experience. Cooke’s insights highlight the importance of innovation balanced with reliable performance in Citrix’s offerings. Read more in this LinkedIn Pulse article inspired by the Citrix presentation at Security Field Day 12!
Read More:
New Capabilities With Plenty of Citrix Heritage
Dell Security Evolution: Security Field Day Insights
Marian Newsome recently shared insights from the Dell Security Evolution event at Security Field Day. In her update, she highlights Dell’s strategic enhancements in cybersecurity solutions aimed at addressing the evolving landscape of enterprise security needs. Newsome effectively outlines Dell’s commitment to integrating advanced security technologies to protect data across various IT environments. Read more in this LinkedIn Pulse article inspired by the Dell Security presentation at Security Field Day 12!
Read More:
Dell Security Evolution: Security Field Day Insights
Aviz Delivers Observability
In a recent overview from Peter J. Welcher, Aviz is highlighted for its innovative approach to network observability. The platform stands out due to its comprehensive coverage and deep insights that aid in predicting potential network issues before they become critical problems. With its user-friendly interface and robust data analysis tools, Aviz is proving to be a pivotal solution for businesses seeking proactive network management solutions. Read more in this LinkedIn Pulse article inspired by the Aviz presentation at Networking Field Day 36!
Read More:
DigiCert’s Digital Trust Warning: When 50% of Certificates Vanish
Marian Newsome recently highlighted a critical cybersecurity alert from DigiCert regarding the potential disappearance of 50% of digital certificates due to lapses in digital trust management. This situation underscores the urgent need for organizations to bolster their certificate lifecycle practices to prevent significant disruptions in business operations and data security. Newsome emphasizes the importance of automated solutions and robust policy enforcement in maintaining the integrity and reliability of digital certificates. Read more in this LinkedIn Pulse article inspired by the DigiCert presentation at Security Field Day 12!
Read More:
DigiCert's Digital Trust Warning: When 50% of Certificates Vanish
Itential Ups Network Automation Intentions Service
Ron Westfall’s latest article explores Itential’s strategic move to enhance network automation by integrating advanced intent-based capabilities into their services. This upgrade aims to simplify complex network configurations and accelerate digital transformation initiatives for their customers. Westfall highlights the potential benefits this upgrade brings to IT teams by improving efficiency and reducing potential errors in network management tasks. Read more in this Futurum Group research note inspired by the Itential presentation at Networking Field Day 36!
Read More:
Itential Ups Network Automation Intentions Service
Arista Does Micro-Segmentation
Peter Welcher, in his discussion on Arista’s foray into micro-segmentation, elaborates on how the company is enhancing network security by implementing refined policies that intelligently control and restrict network traffic within a data center. He highlights Arista’s application of its EOS (Extensible Operating System) and CloudVision as pivotal technologies in achieving efficient micro-segmentation which allows for more granular control of traffic, improved visibility, and heightened security. Welcher notes that Arista’s strategic focus on simplicity and scalability in its security approach positions it as a significant player in managing network traffic and safeguarding sensitive data in complex enterprise environments. Read more in this LinkedIn Pulse article inspired by the Arista presentation at Networking Field Day 26!
Read More:
Arista Does Micro-Segmentation
Itential Automation Service at #NFD36
Following Networking Field Day 36, Scott Robohn provided an in-depth overview of Itential’s Automation Services, a key tool in simplifying complex network operations. He emphasized how these services integrate seamlessly with existing network systems to enhance efficiency and reduce error rates in network management tasks. Highlighting the scalable nature of Itential’s offerings, Robohn showcased several use cases demonstrating significant improvements in both performance and operational agility. Read more in this LinkedIn Pulse post!
Read More:
Itential Automation Service at #NFD36
Sealing Entry Points and Weak Links in the Environment – How Dell is Building an Iron Wall of Defense
Sulagna Saha provides an in-depth analysis of Dell’s comprehensive approach to cybersecurity, emphasizing the company’s initiatives to fortify its systems against external threats. By focusing on sealing potential entry points and strengthening weak links within their infrastructure, Dell aims to construct a robust defense mechanism akin to an iron wall. Saha elaborates on the technologies and strategies Dell employs to ensure data integrity and safeguard against increasingly sophisticated cyber threats. Read more in this Security Boulevard article following the Dell presentation at Security Field Day 12.
Read More:
Can You Remove the Ops from DevOps?
Jack Poller delves into the complexities of DevOps, examining whether it is feasible to remove operations from the DevOps model without compromising the methodology’s integrity and effectiveness. He explores the integration and critical interdependencies between development and operations teams, highlighting how both are essential for streamlined workflows and optimized performance. Poller concludes that a successful DevOps strategy necessitates a balanced collaboration between the two, as the synergy between development and operations is fundamental to achieving rapid and stable service delivery. Read more in this LinkedIn Pulse article inspired by the Heroku presentation at AppDev Field Day 2!
Read More:
Can You Remove the Ops from DevOps?
Something Old, Something New- A Geezer Looks at Mobility Field Day 12
In this article, Lee Badman reflects on the evolution and staying power of wireless technology as witnessed during Mobility Field Day events. Lee has participated in many Mobility Field Day events in the past and will join us this week for the latest edition, where he will hear from Cisco and Nile.
Read More:
Something Old, Something New- A Geezer Looks at Mobility Field Day 12
Elisity Removes Barriers to Adoption of Microsegmentation in Hospitals and Healthcare Organizations
Sulagna Saha explores how Elisity is addressing the challenges hospitals and healthcare organizations face when adopting microsegmentation technologies. By streamlining implementation processes and enhancing security protocols, Elisity is making it simpler and more cost-effective for these institutions to safeguard sensitive data. Saha’s analysis highlights the significant role that effective microsegmentation can play in protecting healthcare networks from increasingly sophisticated cyber threats. Read more in this Gestalt IT article inspired by the Elisity presentation at Networking Field Day 36.
Read More:
Elisity Removes Barriers to Adoption of Microsegmentation in Hospitals and Healthcare Organizations
Scaling to Meet Exabyte-Level Demands in the AI Era with object storage
As AI technologies continue to evolve, the demand for scalable storage solutions is reaching exabyte levels. Object storage offers a viable pathway to efficiently manage these unprecedented data volumes, facilitating seamless scalability and robust data management. Embracing object storage can empower organizations to meet the burgeoning requirements of the AI era, enhancing operational capabilities and driving technological advancements. Read more in this TECHunplugged article by Arjan Timmerman inspired by the MinIO presentation at AI Data Infrastructure Field Day 1.
Read More:
Scaling to Meet Exabyte-Level Demands in the AI Era with object storage
Qumulo Distributed Global Namespace and Filesystem
The Qumulo Distributed Global Namespace and Filesystem is designed to streamline data management across diverse storage environments, supporting a range of applications from data analytics to archival storage. With its scalable architecture, Qumulo allows enterprises to manage billions of files with ease, ensuring high performance and accessibility regardless of geographical distribution. This solution is particularly beneficial in environments requiring rapid access to large datasets, facilitating efficiency and collaboration across global teams. Read more in this LinkedIn Pulse article by Alastair Cooke following Qumulo’s presentation at Cloud Field Day 21.
Read More:
Qumulo Distributed Global Namespace and Filesystem
Security Audits and Gap Analyses
Teren Bryson discusses security audits and gap analyses, critical tools for organizations to identify and address vulnerabilities within their IT infrastructures. These processes are not only instrumental in protecting against internal and external threats but are also evolving into more formalized and comprehensive evaluations akin to major regulatory frameworks like Sarbanes-Oxley. This article was inspired by his participation in Security Field Day 11.
Read More:
Security Audits and Gap Analyses
Making the Most of Mobility Field Day 12
Tom Hollingsworth emphasizes the value of participating in Mobility Field Day 12, highlighting the unique opportunity it presents for professionals in the wireless networking field to gather insights from leading technology companies. He discusses how this event fosters deep dives into new products, technologies, and strategies that are shaping the future of mobility. Watch live as Tom and the Tech Field Day delegates hear from Cisco, Nile, and more at Mobility Field Day 12 next week!
Read More:
Making the Most of Mobility Field Day 12
Making Network Automation Accessible: Insights from Itential
Dakota Snow explains how Itential is advancing network automation, making it more accessible to a broader range of users, from novices to seasoned engineers. By delivering a platform that standardizes workflows and offers tools for creating flexible, reusable automation processes, Itential simplifies complex network automation tasks. This approach not only democratizes the technology but also enhances the overall efficacy and user-friendliness of network operations across different expertise levels. Read more in this LinkedIn Pulse article following Networking Field Day 36.
Read More:
Making Network Automation Accessible: Insights from Itential
NFD36: Path Solutions as Network Detective
Peter Welcher discusses the Path Solutions presentation at Network Field Day 36, explaining that the product effectively serves as a detective within network systems. He explored the capabilities and tools provided by Path Solutions for monitoring and diagnosing network paths, which are crucial for maintaining optimal network performance and troubleshooting. Welcher highlighted the benefits of precise and real-time data analytics in identifying and resolving network issues, enhancing both reliability and efficiency in network operations. Read more in this LinkedIn Pulse article from Networking Field Day 36!
Read More:
NFD36: Path Solutions as Network Detective
A Flexible Approach to Campus-Wide Zero-Trust Networking
Bob McCouch explores the imperative adoption of Zero-Trust networking principles across campus environments, arguing for a flexible approach that accommodates varying organizational needs and technologies. He emphasizes the importance of robust identity verification, segmentation, and ongoing monitoring to ensure secure access and mitigate potential threats. McCouch’s insights highlight practical strategies and frameworks that can be customized to enhance security postures effectively in diverse campus settings. Read more coverage of Arista Networks presentation at Networking Field Day 36 on LinkedIn Pulse!
Read More:
A Flexible Approach to Campus-Wide Zero-Trust Networking
How Aviz is Shaping Telecom Observability
Dakota Snow’s article examines how Aviz is revolutionizing telecom observability by integrating advanced data analytics and machine learning. Aviz’s platform enhances network reliability and performance by providing real-time insights and predictive maintenance capabilities. This approach not only optimizes operational efficiency but also significantly improves service delivery for telecom companies. Read more coverage of Networking Field Day 36 on LinkedIn!
Read More: