Industry Solutions and Trends
Technology is more than just networking and Juniper experts share their views on all the trends affecting IT

The build phase of any project is always the most exciting. After what can seem an eternity of theortical practice in the planning stages it's great top get your hands on some new technology and start to cut it into your network. But it's also the most risky. Get it wrong and your customer experience degrades and your business can suffer. I comment on a new paper and video designed to help you prepare for, and get the most out of, the build phase of your next network project.

Read more...

A problem faced by administrators is how to scale the network to support new applications, new devices, or initiatives such as bring your own device (BYOD) or bring your own application (BYOA). All of which can create pressures on the network and the administrator in ways which are difficult to predict and budget for. Best practice guides, consultancy, and proof of concept labs can only give an educated guess of day one production loads, let alone six months into the application life-cycle. No engineer worth their salt will knowingly low-ball the network specification just in case; especially on projects with executive sponsorship (read: CxO with a new toy/something he about read in an airline magazine). As a result, precious budget may be burnt on underutilised kit; perhaps indefinitely.

Read more...

Gilles

Delivering Operation-Critical WLANs

by Gilles ‎10-21-2013 01:51 AM - edited ‎10-21-2013 06:49 AM

4 (tough) questions CIOs need to ask their network vendor

 

Once a convenience for a few laptop-carrying employees, WLANs now deliver critical applications and services to employees and customers alike. I take a look at what that means for WLAN design and highlights 4 critical questions every CIO needs to ask.

Read more...

Gilles

WLAN : From Business Casual to Business Critical

by Gilles ‎07-02-2013 02:29 AM - edited ‎09-04-2013 01:31 AM

5 key areas where you need to re-think your WLAN strategy

 

Once upon a time Wireless LANs (WLANs) were ancillary, used predominantly by visiting employees and guests. Today, nothing could be further from the truth. WLANs are truly mainstream and the primary ramp on to the corporate network in many cases.

With the uptake in usage, organisations need to re-think their WLAN strategies carefully in five key areas to ensure they are fit for purpose now and in the future.

Read more...

Gilles

Rethink Holistic: Managing legacy networks in times of rapid change

by Gilles ‎12-28-2012 02:41 AM - edited ‎12-28-2012 02:49 AM

Pity the legacy network, still in use in so many organizations. It was designed mainly to support static employees using primarily corporate-owned devices—employees who used to sit in the office and access applications located in a data center somewhere on-site.

Read more...

Gilles

BYOD @ IP EXPO 2012, London

by Gilles ‎10-30-2012 12:52 AM - edited ‎11-15-2012 05:05 AM

Two weeks ago I spoke at IP EXPO 2012 – London – where I presented on Enterprise mobility and the security challenges ahead. The following is a summary of the key facts I discussed; at a glance, you have to be able, as an IT manager or executive, to offer more granular control to the users accessing the network, based on who they are, where they are, what application they want to use and from what device, and all this in a controlled and secured way. It’s all about bringing control back to IT.

Read more...

Skype in the classroom is free to users - and there are more than 22,500 of them. It's what we expect of the internet isn't it? Access to content that provides value to us but for which we are reluctant to pay. But, throughout history, content has been meaningless without effective distribution. So nowadays why do we value one but not the other? Neil Pound asks if this approach is sustainable.

Read more...

Gilles

Is “good-enough” security really good-enough ?

by Gilles ‎04-30-2012 05:20 AM - edited ‎05-16-2012 12:51 AM

From a conceptual point of view, it's all about our attitude to the risk. To keep it simple, we can distinguish three different main security philosophies.

Read more...

Gilles

Data Breaches - The Evil from Within

by Gilles ‎02-24-2012 01:28 AM - edited ‎03-23-2012 12:55 AM

In its 2011 Data Breach Investigations Report, Verizon Business reported that 17% of all data breaches in 2010 were due to internal agents. It is true that represents a relative decrease of 31% compared to 2009, but this is mainly due to the exploding number of breaches having external agents as an origin (+22%), which is not a surprise. The bottom line is that the absolute number of such internal breaches didn’t change much over the last couple of years, meaning that you still have to pay high attention to this phenomenon.

Read more...

I’m not considering myself as a “geek”, but nevertheless, I’m using new technologies everyday to help make my job easier.

Read more...

Gilles

STOP Adding Complexity to Outdated Networks and Rethink Your Network Strategy!

by Gilles ‎12-01-2011 03:51 AM - edited ‎12-14-2011 05:39 AM

In my previous blog I set out how smartphones and tablets – and more generally mobility – are changing the networking landscape. Let me now discuss with you the steps that need to be taken in order to make your network “BYOD proofed”.

Read more...

Gilles

The Game Changers – The “Bring Your Own Device” Effect (BYOD)

by Gilles ‎11-03-2011 01:19 AM - edited ‎12-14-2011 02:45 AM

Looking backward, computing and connectivity have always moved along side by side. We have evolved from serial to Ethernet, thus gaining speed and flexibility, have introduced switching and have added different prefixes to Ethernet to gain even more speed. Then we have introduced wireless to attach some specific devices primarily for casual access. Now there is another shift; mobility changes everything and wireless is becoming the easiest and quickest way to connect devices to the network, while ensuring performance and security.

 

Read more...

The UK government estimates shared services will save £500m each year on a current spend of £2.5BN. Would a private company pursue such a reward more aggressively?

Read more...

About Industry Solutions and Trends

Subscribe RSS Icon

Follow our Twitter Accounts:
Juniper Networks Twitter
UK Twitter
Japan Twitter
Australia Twitter
Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.