Agile Infrastructures bring hyper scale challenges Once narrowly defined as applications specifically built to run and scale on the cloud, the term “cloud native” has evolved to encompass any app built using cloud services. This broadening of the definition has led to the emergence of new terminology such as “hyper-scale” and “agile infrastructure” to describe cloud workloads designed to handle infinite scale – workloads built with containers, Kubernetes and serverless technologies. By design, hyper-scale applications are highly modular, with each component running in its own…
Public cloud providers have really begun to step up their game when it comes to security. Each provider offers a tool kit of cloud-native services to ensure that you’re able to adequately safeguard your applications and data that reside in their infrastructure. But as the industry begins to leverage services and storage from multiple cloud providers, building secure network connectivity that can transcend proprietary cloud networking constructs and work across multiple clouds can become increasingly challenging. In this article, we investigate the crucial factors and…
In today’s interconnected digital landscape, network and security operations have become increasingly complex and critical for organizations across industries. The proliferation of cloud technologies, the Internet of Things (IoT) and remote work environments has necessitated robust network infrastructure and heightened security measures. To effectively manage and safeguard these intricate systems, observability has emerged as a vital practice. And now, with the advent of hyperautomation, observability is undergoing a revolutionary transformation, enabling enhanced efficiency, agility and proactive decision-making. Observability refers to the ability to gain insights…
Two of the most relevant, if trendy, topics in cybersecurity today relate to the starting point — the “ground zero” of attacks — from both the attacker’s and the defender’s perspective. The most useful weapons in the attacker’s arsenal are Zero Day attacks; that is, previously unknown or unseen attacks. Such attacks are especially pernicious because there is no bespoke, pre-existing defender countermeasure. There is no snort signature, no specifically predefined pattern of behavior to look for, no TCP port to lock down. In that…
The recently concluded ONUG Spring 2023 in Dallas was a resounding success, marked by insightful discussions, vibrant networking, and a deep dive into emerging trends and practices. The keynotes by Merck and Cigna were standout moments of the conference. Merck’s talk provided unique insights into leveraging technology to optimize operations within the pharmaceutical sector, while Cigna gave a compelling presentation on the power of data analytics and personalized customer experiences in the health services industry. Nick Lippis and Dr. Alex Shulman kicked off the conference…
Deploying a private 5G network is a complex undertaking that presents a steep learning curve for even the most capable IT teams. Enterprise decision-makers need to work with partners who can help them climb this learning curve and realize private 5G’s full potential. Here I present an overview of the private 5G network ecosystem and outline the roles of the types of companies that enterprises can partner with to achieve successful outcomes. I’ll start by grouping players in the private 5G network ecosystem into three…
With the launch of IBM Hybrid Cloud Mesh, application-centric connectivity helps you take back control of enterprise networking. Private clouds, public clouds, SaaS, on-premises and edge—as organizations leverage a more distributed, robust cloud-based strategy, they can also face more significant management and compliance challenges. This shift to the cloud may have, in many ways, left the traditional enterprise network stranded—no longer transporting the bulk of the enterprise network traffic, which now floats between the clouds and over the public internet. The probable result of this…
In my last post, I explained why private 5G networks are not one-size-fits-all and outlined the salient technical issues that enterprise decision-makers must consider when developing a private 5G strategy. While there are common use cases within industry verticals, the unique needs and business priorities of individual organizations will ultimately determine the specific path each enterprise takes on its private 5G journey. The journey starts by rationalizing how private 5G will underpin an enterprise’s C-level business objectives, which will differ from company to company across many…
As organizations continue to embrace cloud computing, the traditional wide area network (WAN) architecture is struggling to keep up with the increasing demand for fast, reliable, and secure access to cloud applications and services. Gartner analysts Simon Richard and Sumit Rajput recently addressed these challenges in a Gartner for Technical Professionals research note, Optimize WAN Architectures for Workloads That Span the Hybrid Cloud and the Multicloud 1. Richard and Rajput note that “When they first started deploying workloads in the cloud, most IT organizations realized…
We are thrilled to invite you, the ONUG Community, to the upcoming ONUG Conference in Dallas on May 17th and 18th! This year’s conference promises to be an unparalleled opportunity for networking, learning, and innovation. As always, we have assembled a fantastic lineup of speakers, with experts from across the industry sharing their insights and perspectives. You’ll have the chance to hear from leaders in networking, cloud computing, cybersecurity, and more, all sharing their expertise and best practices. This year, we’re excited to feature several…