Twice a month, we highlight five popular news stories from the world of networking, security and automation. Here are the top five stories from the last two weeks.
Data Center Migraine No More – Data Center Dynamics
Not only can it take months to complete a migration, but most organizations will face multiple network outages during that time frame. The complexities of today’s networks, which consist of hundreds of thousands of components that need to be discovered, verified, and documented during the migration process, can quickly go sideways, leading to unexpected application disruptions and downtime. This article from NetBrain’s Director of Product Jason Baudreau discusses how network teams can incorporate a three-part process into data center migration that eliminates most, if not all, of the disruptions, uncertainty and doubt typically associated with this activity.
DevOps has been getting a lot of attention in the IT world, and some have dubbed it as the “future of enterprise software development.” Known for driving faster development cycles and greater application stability, organizations large and small are adopting DevOps processes as part of their organization. This article discusses the multiple advantages organizations can reap from the methodology in addition to helping organizations assess their readiness for DevOps adoption.
What You Need to Know About Intent-Based Networks – SearchNetworking
The idea of intent-based networks (IBN) – where organizations tell their network what they want instead of specifically detailing what the network should do – has been around for quite some time, but in reality, most organizations are still far off from creating fully self-managing networks using machine learning and AI. There are lot of unanswered questions about what IBN is and how it will impact organizations in the future. Michaela Goss tackles five of these questions head-on in this recent article from TechTarget’s SearchNetworking.
Edge Security: There’s Lots of Attack Surfaces to Worry About – Network World
The issue of edge security is nothing new. Many of the issues are the same ones IT professionals have been dealing with for decades. However, the edge adds its own unique layers to those problems, complicating the issues even further. The most common IoT vulnerability occurs because many sensors and edge computing devices are running on a server that allows for remote access and management. But by implementing basic information security precautions, most edge deployments can be much safer. Network World explains how.
In recent years the way in which we work has evolved, and as a result, our IT architectures have evolved as well. Organizations have realized that the cloud is highly distributed, more scalable and more resilient. It’s no longer a “nice-to-have” technology, but rather a “have-to-have.” However, there’s a lot to consider for organizations making the move, from an application, network and security perspective. This Forbes article talks all things cloud transformation for a more efficient business process, higher productivity and security at a lower cost.
Want more of the Friday Five? Check out our last blog: The Friday Five: Network Vs. Application Teams, Capacity Planning and IoT