Tom Hollingsworth explores the innovative integration of AI with HPE Aruba’s networking operations, illustrating how this advancement leads to more efficient network management and enhanced user satisfaction. He details the specific AI-driven tools and solutions provided by HPE Aruba that assist in predicting and resolving network issues before they impact users. For additional insights on Networking Field Day 38, visit Techstrong IT.
Dell’s Comprehensive Approach to AI and the Dell AI Factory
Tom Hollingsworth recently explored Dell’s sophisticated approach toward harnessing the power of AI through the introduction of the Dell AI Factory, aimed at integrating advanced AI solutions into enterprise environments. This initiative combines Dell’s technological infrastructure with smart tools to enhance operational efficiency and innovation within organizations. You can read more about Tom’s insights from Security Field Day 13 on Security Boulevard, covering this topic in greater detail.
Network Engineers are Facing an Identity Crisis
Network engineers are the firefighters and knowledge bases of enterprise IT, however the role of a network engineer is rapidly evolving. With the rise of automation, orchestration, and AI, the familiar image of an engineer hunched over a command-line interface (CLI) is giving way, leading many to question the future of their profession. In this episode, Tom Hollingsworth is joined by Ryan Harris, Chris Grundemann, and Nathan Nielsen as they discuss how the perception of their role has shifted, the continuous need for learning and adaptation, and whether the CLI is truly dead.
The conversation explores the challenges and opportunities presented by these technological advancements, highlighting how network engineers are embracing new tools like chatbots and GUIs for enhanced visualization. While some aspects of the job, like manual CLI work, may be diminishing, the core principles of understanding network functionality remain core to the role of the network engineer. The panel talks about identity crisis in a field where continuous learning is essential, contrasting it with professions like doctors and lawyers who deal with slower-changing fundamentals. They discuss the value of specialization versus being a generalist, the concept of the “pitchfork engineer,” and ultimately, how redefining their identity as lifelong learners can help network engineers thrive in this ever-changing landscape.
Why Supply Chain Security Is The First Line of Defense
Tom Hollingsworth highlights the critical role of supply chain security as the foundational defense mechanism in protecting organizational systems and data. By analyzing how vulnerabilities within the supply chain can lead to widespread security breaches, he emphasizes the need for robust security strategies that address both direct and indirect threats. For additional insights from Security Field Day 13, refer to Tom Hollingsworth’s coverage on Security Boulevard.
From Packets to Protection: How Network Observability Powers Security and Forensics
In this detailed exploration, Tom Hollingsworth discusses the critical role of network observability in enhancing security protocols and facilitating effective forensic analysis. He emphasizes how insights gleaned from observing network traffic can significantly bolster an organization’s cybersecurity measures against increasingly sophisticated threats. For further insights into Security Field Day 13, see additional coverage by Tom Hollingsworth on Security Boulevard.
Beyond Backup: How Coveware is Revolutionizing Veeam’s Ransomware Defense
Tom Hollingsworth provides an insightful exploration of how Coveware is enhancing Veeam’s ransomware defense mechanisms, pushing beyond traditional backup solutions to offer a more robust security posture. He explains the strategic integration of Coveware’s tools with Veeam’s technology, which not only secures data but also ensures faster recovery post-attack. For additional insights from Security Field Day 13, see Tom Hollingsworth’s coverage on Security Boulevard.
The Era of Agentic Security with Microsoft Security Copilot
In his recent discussion on The Era of Agentic Security with Microsoft Security Copilot, Tom Hollingsworth explores the evolution of cybersecurity tools, emphasizing the innovative strides Microsoft has made in integrating AI technologies to enhance security operations. He highlights how Microsoft Security Copilot serves as a paradigm shift towards more autonomous, AI-driven security systems that proactively manage and protect IT environments. For additional insights on Security Field Day 13, you can read more articles by Tom Hollingsworth on Security Boulevard.
The DoJ Just Devalued Juniper Mist
The proposed remedies for the HPE acquisition of Juniper Networks did a real disservice to Juniper Mist. The confusion around what’s going on with the proposed Juniper AIOps for Mist auction have professionals asking a lot of questions. In this episode, recorded on the eve of the close of the acquisition, Tom Hollingsworth sits down with Sam Clements, Jake Snyder, and Ed Weadon to make sense of it all. There are discussions about what exactly is included in the auction and what benefit will come from the license to use Juniper AIOps for Mist. Also discussed is who might be a good bidder for the solution and how long it will take for them to get any real value from it.
Enterprises Shouldn’t Be Outsourcing Their IT Anymore
Enterprise networks are complicated but outsourcing all of the operations team doesn’t lead to better outcomes. It’s important to remember that enterprise covers a wide range of network definitions. In this episode, Ed Weadon, Chris Grundemann, and Jody Lemoine join Tom Hollingsworth as they discuss how businesses see the network and IT in general as a cost center instead of value generation. They also talk about the various sizes of networks and why each of them has issues with the most popular outsourcing methods. They also discuss the human factor and why not all managed providers can give you the same level of service.
We Are Long Past Passwords
Passwords have served their use in the enterprise. We need to start moving away from simple passwords as an authentication mechanism. In this episode of the Tech Field Day podcast, Tom Hollingsworth is joined by Tony Efantis, Karen Lopez, and Fernando Montenegro as they discuss the premise that we are long past passwords, exploring the complexities and frustrations of relying on them for myriad online accounts. The conversation highlights the concept of economic externalities, where developers easily implement simple passwords, but the burden of managing hundreds of unique credentials falls on the individual user. While passwords were initially designed for basic authentication, there has been a shift towards alternative mechanisms like one-time codes sent to email or passkeys because of user laziness and the security risks associated with password reuse and compromised credentials. Ultimately, what is needed a balanced, risk-based authentication approach is necessary, tailoring security levels to the sensitivity of the data being protected, and leveraging technologies like biometrics and background risk assessments to create a more convenient and secure user experience, even as attackers continue to evolve their methods.
Is Cisco Live Still The Place To Be
Tom Hollingsworth recently explored whether Cisco Live continues to be a vital hub for networking professionals seeking to stay current in the ever-evolving tech landscape. He examines the event’s enduring value, focusing on its educational sessions, networking opportunities, and powerful keynote presentations. Extensive coverage of Cisco Live for over a decade by Tom Hollingsworth can be found on his blog.
MLO is a Lie
One of the most anticipated features of Wi-Fi 7 isn’t ready for the public. Worse yet, it may never deliver on the promise of fast, reliable wireless connectivity. In this episode, Tom Hollingsworth is joined by Allyn Crowe, Peter Mackenzie, and Chris Reed as they discuss the way that multi-link operation (MLO) has been included in the specification for Wi-Fi 7 yet not quite implemented. They highlight the technical difficulties of deploying such a complicated protocol and how vendors are trying to squeeze every drop of performance out of their hardware. They wrap up with advice on whether or not to plan your next deployment around a technology that isn’t quite ready yet.
User-Centric Connectivity Has to Innovate
Modern networking is being disrupted in the data center but user-facing networking has largely stagnated. Users are getting slightly faster connections but everything feels mostly the same. In this episode, Tom Hollingsworth is joined by Sam Clements and Ed Weadon as they discuss innovation in the edge of the network. They talk about how companies like Cisco have been trying to bring users into the modern era. They talk about the centralization of management in the cloud and how competition has driven those moves. They also look ahead to Cisco Live and discuss the releases they would most like to see at the event.
Have A Classy Time with Tech Field Day Extra at Cisco Live US 2025
Hello San Diego! We’re thrilled to be back once again with great content headed your way courtesy of Tech Field Day Extra!. We’re hoping the June Gloom stays away so we can shine a light on some wonderful presenters and get some great questions from our amazing delegates. You’re not going to want to miss […]
Compliance Does Not Equal Security
Compliance reinforces the state of security in your organization. However, compliance in and of itself is not security. In this episode of the Tech Field Day Podcast, Tom Hollingsworth is joined by Jack Poller and Milou Meier as they discuss the nuance between securing your organization and ensuring compliance. They discuss the challenges with audits and the “checkbox” mentality that has become common. They also discuss how organizations face different challenges globally and how you can help ensure that you aren’t being exposed to problems in the future.
Exploring the Future of Cybersecurity at Security Field Day 13
The first Security Field Day event of the year is finally here! We’re excited to bring you Security Field Day 13 live from Silicon Valley. This event combines a number of trends in the cybersecurity and data protection spaces to bring you information you need to keep your users safe and sound. Security Field Day […]
Wi-Fi is Fast Enough
Modern Wi-Fi connections rely on more than just raw throughput to measure performance. The complexity of wireless as a medium makes the user experience more varied and creates difficulties in troubleshooting. In this episode, Tom Hollingsworth is joined by Keith Parsons, Rocky Gregory, and Ron Westfall as they discuss the state of Wi-Fi and how performance works. They talk about the challenges with properly designed wireless networks and how data sheets make assumptions about the environment. They also discuss user expectations for performance and how workflows involve many moving parts that can impact overall user experiences.
Measuring Wi-Fi 7 Outcomes Through Users
In his latest analysis, Tom Hollingsworth focuses on the potential impacts of Wi-Fi 7 technology on user experiences. He examines how the enhanced capabilities of Wi-Fi 7, such as increased speed and bandwidth, could significantly improve connectivity and productivity for users. For further insights into Wi-Fi innovations presented at Mobility Field Day 13, explore additional content by Tom Hollingsworth.
Virtual Networks are Air Gapped
The definition of traditional security technologies must evolve to meet new use cases. Networks that use virtual constructs to segregate traffic are just as air gapped as physical separation. In this episode, Tom Hollingsworth is joined by Carole Warner Reece, John Osmon, and Jason Gintert discuss why the standard for hyper secure systems has always been physical separation. They look at how the terminology is being changed to support new use cases with virtual separation and whether or not those new networks can meet the high standards of the older versions. They also discuss the need for precision in terminology and how to avoid falling back on marketing terms that can create confusion with unsuspecting consumers.
Key Takeaways from Networking Field Day 37: AI, Cybersecurity, and the Future of Networks
Tom Hollingsworth provides key insights from Networking Field Day 37, focusing on the latest advancements in AI, cybersecurity, and network technologies. He highlights how these sectors are intersecting more than ever, driving new strategies for network architecture and security. Watch this video for Tom’s overall Networking Field Day takeaways!












