Industry Solutions and Trends
Technology is more than just networking and Juniper experts share their views on all the trends affecting IT
Showing results for 
Search instead for 
Do you mean 

The build phase of any project is always the most exciting. After what can seem an eternity of theortical practice in the planning stages it's great top get your hands on some new technology and start to cut it into your network. But it's also the most risky. Get it wrong and your customer experience degrades and your business can suffer. I comment on a new paper and video designed to help you prepare for, and get the most out of, the build phase of your next network project.


A problem faced by administrators is how to scale the network to support new applications, new devices, or initiatives such as bring your own device (BYOD) or bring your own application (BYOA). All of which can create pressures on the network and the administrator in ways which are difficult to predict and budget for. Best practice guides, consultancy, and proof of concept labs can only give an educated guess of day one production loads, let alone six months into the application life-cycle. No engineer worth their salt will knowingly low-ball the network specification just in case; especially on projects with executive sponsorship (read: CxO with a new toy/something he about read in an airline magazine). As a result, precious budget may be burnt on underutilised kit; perhaps indefinitely.


Delivering Operation-Critical WLANs

by Gilles ‎10-21-2013 01:51 AM - edited ‎10-21-2013 06:49 AM

4 (tough) questions CIOs need to ask their network vendor


Once a convenience for a few laptop-carrying employees, WLANs now deliver critical applications and services to employees and customers alike. I take a look at what that means for WLAN design and highlights 4 critical questions every CIO needs to ask.


WLAN : From Business Casual to Business Critical

by Gilles ‎07-02-2013 02:29 AM - edited ‎09-04-2013 01:31 AM

5 key areas where you need to re-think your WLAN strategy


Once upon a time Wireless LANs (WLANs) were ancillary, used predominantly by visiting employees and guests. Today, nothing could be further from the truth. WLANs are truly mainstream and the primary ramp on to the corporate network in many cases.

With the uptake in usage, organisations need to re-think their WLAN strategies carefully in five key areas to ensure they are fit for purpose now and in the future.


Rethink Holistic: Managing legacy networks in times of rapid change

by Gilles ‎12-28-2012 02:41 AM - edited ‎12-28-2012 02:49 AM

Pity the legacy network, still in use in so many organizations. It was designed mainly to support static employees using primarily corporate-owned devices—employees who used to sit in the office and access applications located in a data center somewhere on-site.


BYOD @ IP EXPO 2012, London

by Gilles ‎10-30-2012 12:52 AM - edited ‎11-15-2012 05:05 AM

Two weeks ago I spoke at IP EXPO 2012 – London – where I presented on Enterprise mobility and the security challenges ahead. The following is a summary of the key facts I discussed; at a glance, you have to be able, as an IT manager or executive, to offer more granular control to the users accessing the network, based on who they are, where they are, what application they want to use and from what device, and all this in a controlled and secured way. It’s all about bringing control back to IT.


Skype in the classroom is free to users - and there are more than 22,500 of them. It's what we expect of the internet isn't it? Access to content that provides value to us but for which we are reluctant to pay. But, throughout history, content has been meaningless without effective distribution. So nowadays why do we value one but not the other? Neil Pound asks if this approach is sustainable.


Is “good-enough” security really good-enough ?

by Gilles ‎04-30-2012 05:20 AM - edited ‎05-16-2012 12:51 AM

From a conceptual point of view, it's all about our attitude to the risk. To keep it simple, we can distinguish three different main security philosophies.


Data Breaches - The Evil from Within

by Gilles ‎02-24-2012 01:28 AM - edited ‎03-23-2012 12:55 AM

In its 2011 Data Breach Investigations Report, Verizon Business reported that 17% of all data breaches in 2010 were due to internal agents. It is true that represents a relative decrease of 31% compared to 2009, but this is mainly due to the exploding number of breaches having external agents as an origin (+22%), which is not a surprise. The bottom line is that the absolute number of such internal breaches didn’t change much over the last couple of years, meaning that you still have to pay high attention to this phenomenon.


I’m not considering myself as a “geek”, but nevertheless, I’m using new technologies everyday to help make my job easier.


About Industry Solutions and Trends

Subscribe RSS Icon

Follow our Twitter Accounts:
Juniper Networks Twitter
UK Twitter
Japan Twitter
Australia Twitter
Juniper Networks Technical Books