To be successful in the cloud world, there needs to be an organizational shift within companies to encompass both change management and skills management.
Contributed Articles from the SDx, SDN, & NFV Community
Want to learn more about SDx, SDN, and NFV from those who work in the industry? See SDxCentral’s Contributed Articles page for more.
Once you have containers in production certain security measures must be put in place to cover network filtering, container inspection, and host security.
As technology domains shift to support agile-based methodologies, DevOps processes, and programmability, the network must undergo this same transformative shift.
The widespread deployment of cloud infrastructure has led IT teams to demand freedom of choice, but that might not always be what’s best for the organization as a whole.
Cloud-native architectures are already impacting data science, IoT, and other areas and will provide both the threat of being disrupted and the opportunity for innovation.
Before deploying a multi-cloud strategy, there are four myths about multi-cloud security that need debunking.
Lack of expertise and integrated tools, not indifference, is leaving NetOps behind DevOps in the race to automate the deployment pipeline.
In the rush to capitalize on NFV many operators have focused purely on the NFV orchestration, but as they move from trials to production, one key piece is missing — management.
Both cloud-native and traditional organizations must implement a security practice that offers automation, abstraction, flexibility, visibility, and is application-aware.
For a server to be truly dispensable, it should be able to be shut down at will or fail without any noticeable end-user impact.
Moving the security perimeter into the cloud helps companies that are struggling with the budget and talent needed to keep security in-house.
Traditional routing fails to differentiate between application and user requirements. SD-WAN is changing that with identity awareness.
DevOps teams face a steep learning curve with best practices related to deploying, running, and managing the lifecycle of a containerized application.
Edge devices will create a tsunami of data, and while using databases would seemingly help tame the volumes of data at the edge, databases don’t work at the edge.
Success in multi-cloud environments will be characterized by the adoption of an operational framework that can exploit all the advantages of a multi-cloud world.