Aaron Russo - Senior Manager for Tech Sales Data Center
Aaron Russo
Senior Manager for Tech Sales Data Center
Jeff Stork - Software Delivery Practice Manager
Jeff Stork
Senior Service Manager
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Tony Dancona - Vice President of VMware EUC
Tony Dancona
VP VMware EUC, Solutions and Services
»See All Authors

SDN

We have searched the depths of our blog to provide you with the latest IT articles on SDN. Get Connected Today!
Tim Allen in Application Centric Infrastructure (ACI) video

Is Application Centric Infrastructure for You?

Modernize Your Data Center with ACI

by Sarah Senftle | 04.24.17

Who doesn’t want a little extra flexibility and cost savings in their data center? It’s pretty safe to say that the answer is close to 100% of those reading. After all, when was the last time you heard someone say, “Our data center isn’t costing us enough,” or “We’re way too efficient—let’s downgrade”?

Tags:CiscoCisco NexusConnectionITNetworkNexus 9000SDNSecurityServersServiceSoftware-Defined Data CenterSoftware-defined networkingStorageVideo

430190-TheWayForward_Medium

The Way Forward

A Team Approach to Network Digitization

by Tim Allen | 08.10.16

The move to become a digital organization is a trend that’s now being felt across almost all organizations in every vertical. The building blocks of digital are technologies such as cloud, mobile, big data, and analytics.

Tags:Big DataCiscoCloudConnectionDelldigital networkHewlett Packard EnterpriseLANMobilityNetworkNFVSDNVMwareWAN

Cybersecurity Best Practices

Best Practices to Improve Cybersecurity

They May Be Simpler than You Think

by Stephen Nardone | 07.06.16

The threat environment—i.e. malware and zero-day attacks, drive-by downloads, watering hole attacks, and denial and distributed denial of service (DoS/DDoS) attacks—is worsening, and the news and analyses paint a dismal picture for cybersecurity: it’s not a case of if you’ll be attacked, but when. However, making your environment more secure—and if not eliminating, at least drastically reducing your risk—is achievable by implementing the appropriate policies, practices and technologies.

Tags:BYODCybersecurityDoSHIPAAHITECHIDCMalwareNetwork VirtualizationPCISDNSecurity breachesSecurity SolutionsSecurity-Policies