Networks Need Agentic AI with HPE Juniper Networking

Agentic AI is reshaping the IT landscape and networking is no exception. Building upon the previous research into machine learning means we have a head start on harnessing that power. In this episode of the Tech Field Day podcast, brought to you by HPE Juniper Networking, Tom Hollingsworth is joined by Keith Parsons and Sunalini Sankhavaram. They talk about how agentic AI is driving new methods for operating networks and helping humans concentrate on real problems instead of menial tasks. They also discuss how agentic AI can power self-driving networks where configuration and provisioning are done automatically or with a minimum of effort to ensure resiliency and enhance user expectations.


A Deep Dive into Root Cause Analysis with Aviz Network Copilot

Tom Hollingsworth’s recent article provides a thorough exploration of how Aviz Networks’ Copilot enhances root cause analysis efforts. By employing advanced analytics and machine learning, this tool helps pinpoint and understand the underlying causes of network disruptions more efficiently. Additional coverage of Networking Field Day 38, including this topic, is available on Techstrong IT.


Hedgehog Simplifies On-Premises AI Network Configuration

Tom Hollingsworth recently highlighted Hedgehog’s innovative approach to simplifying on-premises AI network configuration. This solution significantly reduces the complexity involved in setting up and managing AI-driven network tasks, making it more accessible for enterprises. For further insights on this topic, check out the coverage of Networking Field Day 38 provided by our team at CloudNativeNow.


The Silent Guardian: How Service Assurance Transforms the End-User Experience

Tom Hollingsworth explores the pivotal role of service assurance in enhancing the end-user experience by ensuring network services function at optimal levels seamlessly and transparently with cPacket. Through in-depth analysis, he highlights how this technology acts as a silent guardian, maintaining the integrity and performance of network systems. For additional insights on Networking Field Day 38, visit Techstrong IT.


SASE Makes Convergence Simple with HPE Aruba Networking

Converged networking is creating complexity with network operations and engineering teams. Ensuring that users are able to access resources and complete workflows means being up-to-date with the latest technology behind the scenes. You need a trusted partner to make it all happen with minimal issues.

In this episode of the Tech Field Day Podcast, brought to you by HPE Aruba Networking, Tom Hollingsworth is joined by Chris Grundemann, Jeff Olson, and Adam Fuoss as they discuss the growing challenges with networking and how HPE Aruba Networking is addressing them. They talk about SASE and SSE and how tools such as Cloud-Native NAC and SASE AI Copilot work together to address the needs of the modern network. These features, debuted at Black Hat 2025, help teams by making sense of the network and keeping it secure from intruders.

They discuss how AI is going to accelerate operations teams while providing context and understanding for challenges. They also talk about how cloud native principles an apply to both online and on-prem configurations. The panel wraps up with a discussion of the importance of a sole-source provider for these solutions and how HPE Aruba Networking is addressing the integration of recent acquisitions.


VCF 9.0 Live Patching Ends Maintenance Window Dread

Broadcom’s introduction of live patching in VCF 9.0 marks a significant advancement for system administrators by eliminating the need for maintenance windows, thus ensuring zero downtime. This feature allows for seamless updates and patch installations without disrupting ongoing operations, enhancing system reliability and operational efficiency. For more comprehensive coverage on this topic, continue following on the Techstrong sites, including Security Boulevard.


Nile Gives Your Campus Network More Than Just a Password

Nile is redefining access to campus networks, not just through secure password protection but by enhancing network capabilities and user experience. Their innovative approach ensures both security and convenience, addressing key needs in educational environments. Discover additional insights from Mobility Field Day 13 by Tom Hollingsworth at Security Boulevard.


Beyond the Blue Dot: How UWB, BLE and AI Are Revolutionizing Indoor Location

In his latest article on Techstrong IT, Tom Hollingsworth explores the technological advancements in indoor location tracking, highlighting the roles of Ultra-Wideband (UWB), Bluetooth Low Energy (BLE), and Artificial Intelligence (AI). He discusses how these technologies are not just enhancing the accuracy of indoor location services but are also transforming various industries by enabling new applications and improved user experiences. For more coverage of Juniper Networks at Mobility Field Day 13, visit Techstrong IT.


Smarter Networks, Happier Users: How HPE Aruba Networking and AI are Revolutionizing Network Operations

Tom Hollingsworth explores the innovative integration of AI with HPE Aruba’s networking operations, illustrating how this advancement leads to more efficient network management and enhanced user satisfaction. He details the specific AI-driven tools and solutions provided by HPE Aruba that assist in predicting and resolving network issues before they impact users. For additional insights on Networking Field Day 38, visit Techstrong IT.


Dell’s Comprehensive Approach to AI and the Dell AI Factory

Tom Hollingsworth recently explored Dell’s sophisticated approach toward harnessing the power of AI through the introduction of the Dell AI Factory, aimed at integrating advanced AI solutions into enterprise environments. This initiative combines Dell’s technological infrastructure with smart tools to enhance operational efficiency and innovation within organizations. You can read more about Tom’s insights from Security Field Day 13 on Security Boulevard, covering this topic in greater detail.


Network Engineers are Facing an Identity Crisis

Network engineers are the firefighters and knowledge bases of enterprise IT, however the role of a network engineer is rapidly evolving. With the rise of automation, orchestration, and AI, the familiar image of an engineer hunched over a command-line interface (CLI) is giving way, leading many to question the future of their profession. In this episode, Tom Hollingsworth is joined by Ryan Harris, Chris Grundemann, and Nathan Nielsen as they discuss how the perception of their role has shifted, the continuous need for learning and adaptation, and whether the CLI is truly dead.

The conversation explores the challenges and opportunities presented by these technological advancements, highlighting how network engineers are embracing new tools like chatbots and GUIs for enhanced visualization. While some aspects of the job, like manual CLI work, may be diminishing, the core principles of understanding network functionality remain core to the role of the network engineer. The panel talks about identity crisis in a field where continuous learning is essential, contrasting it with professions like doctors and lawyers who deal with slower-changing fundamentals. They discuss the value of specialization versus being a generalist, the concept of the “pitchfork engineer,” and ultimately, how redefining their identity as lifelong learners can help network engineers thrive in this ever-changing landscape.


Why Supply Chain Security Is The First Line of Defense

Tom Hollingsworth highlights the critical role of supply chain security as the foundational defense mechanism in protecting organizational systems and data. By analyzing how vulnerabilities within the supply chain can lead to widespread security breaches, he emphasizes the need for robust security strategies that address both direct and indirect threats. For additional insights from Security Field Day 13, refer to Tom Hollingsworth’s coverage on Security Boulevard.


From Packets to Protection: How Network Observability Powers Security and Forensics

In this detailed exploration, Tom Hollingsworth discusses the critical role of network observability in enhancing security protocols and facilitating effective forensic analysis. He emphasizes how insights gleaned from observing network traffic can significantly bolster an organization’s cybersecurity measures against increasingly sophisticated threats. For further insights into Security Field Day 13, see additional coverage by Tom Hollingsworth on Security Boulevard.


Beyond Backup: How Coveware is Revolutionizing Veeam’s Ransomware Defense

Tom Hollingsworth provides an insightful exploration of how Coveware is enhancing Veeam’s ransomware defense mechanisms, pushing beyond traditional backup solutions to offer a more robust security posture. He explains the strategic integration of Coveware’s tools with Veeam’s technology, which not only secures data but also ensures faster recovery post-attack. For additional insights from Security Field Day 13, see Tom Hollingsworth’s coverage on Security Boulevard.


The Era of Agentic Security with Microsoft Security Copilot

In his recent discussion on The Era of Agentic Security with Microsoft Security Copilot, Tom Hollingsworth explores the evolution of cybersecurity tools, emphasizing the innovative strides Microsoft has made in integrating AI technologies to enhance security operations. He highlights how Microsoft Security Copilot serves as a paradigm shift towards more autonomous, AI-driven security systems that proactively manage and protect IT environments. For additional insights on Security Field Day 13, you can read more articles by Tom Hollingsworth on Security Boulevard.


The DoJ Just Devalued Juniper Mist

The proposed remedies for the HPE acquisition of Juniper Networks did a real disservice to Juniper Mist. The confusion around what’s going on with the proposed Juniper AIOps for Mist auction have professionals asking a lot of questions. In this episode, recorded on the eve of the close of the acquisition, Tom Hollingsworth sits down with Sam Clements, Jake Snyder, and Ed Weadon to make sense of it all. There are discussions about what exactly is included in the auction and what benefit will come from the license to use Juniper AIOps for Mist. Also discussed is who might be a good bidder for the solution and how long it will take for them to get any real value from it.


Enterprises Shouldn’t Be Outsourcing Their IT Anymore

Enterprise networks are complicated but outsourcing all of the operations team doesn’t lead to better outcomes. It’s important to remember that enterprise covers a wide range of network definitions. In this episode, Ed Weadon, Chris Grundemann, and Jody Lemoine join Tom Hollingsworth as they discuss how businesses see the network and IT in general as a cost center instead of value generation. They also talk about the various sizes of networks and why each of them has issues with the most popular outsourcing methods. They also discuss the human factor and why not all managed providers can give you the same level of service.


We Are Long Past Passwords

Passwords have served their use in the enterprise. We need to start moving away from simple passwords as an authentication mechanism. In this episode of the Tech Field Day podcast, Tom Hollingsworth is joined by Tony Efantis, Karen Lopez, and Fernando Montenegro as they discuss the premise that we are long past passwords, exploring the complexities and frustrations of relying on them for myriad online accounts. The conversation highlights the concept of economic externalities, where developers easily implement simple passwords, but the burden of managing hundreds of unique credentials falls on the individual user. While passwords were initially designed for basic authentication, there has been a shift towards alternative mechanisms like one-time codes sent to email or passkeys because of user laziness and the security risks associated with password reuse and compromised credentials. Ultimately, what is needed a balanced, risk-based authentication approach is necessary, tailoring security levels to the sensitivity of the data being protected, and leveraging technologies like biometrics and background risk assessments to create a more convenient and secure user experience, even as attackers continue to evolve their methods.


Is Cisco Live Still The Place To Be

Tom Hollingsworth recently explored whether Cisco Live continues to be a vital hub for networking professionals seeking to stay current in the ever-evolving tech landscape. He examines the event’s enduring value, focusing on its educational sessions, networking opportunities, and powerful keynote presentations. Extensive coverage of Cisco Live for over a decade by Tom Hollingsworth can be found on his blog.


MLO is a Lie

One of the most anticipated features of Wi-Fi 7 isn’t ready for the public. Worse yet, it may never deliver on the promise of fast, reliable wireless connectivity. In this episode, Tom Hollingsworth is joined by Allyn Crowe, Peter Mackenzie, and Chris Reed as they discuss the way that multi-link operation (MLO) has been included in the specification for Wi-Fi 7 yet not quite implemented. They highlight the technical difficulties of deploying such a complicated protocol and how vendors are trying to squeeze every drop of performance out of their hardware. They wrap up with advice on whether or not to plan your next deployment around a technology that isn’t quite ready yet.