Is your wireless network producing more data than you can manage? Is there a way to sort through it all to provide real information? And how does that all scale in a stadium? Tom Hollingsworth takes a look at the new hardware and software releases from Extreme Networks and how they’re working together to build the next generation of wirelessly-connected stadiums.
Tech Field Day Events
What Are Tech Field Day Events Posts?
Tech Field Day events bring together innovative IT product vendors and independent thought leaders to share information and opinions in a presentation and discussion format. Independent bloggers, speakers, freelance writers, and podcasters have a public presence that has immense influence on the ways that products and companies are perceived by IT practitioners. The world of media has changed, with social media and blogging gaining special importance. Tech Field Day is an opportunity for tech companies and independent writers to meet, update and discuss products and form new communications.
Join Gestalt IT and Tech Field Day live from Cisco Live Europe in Barcelona, Spain! We will be live blogging the keynote address on Tuesday, January 29th at 9:15am CET. Follow along for the exciting announcements from Cisco!
Arjan Timmerman got to get a look at the latest from Zerto at Storage Field Day last year. In this post, he breaks down how their virtual workload replication works. He then looks at how this technology served as the foundation for an interesting backup offering for existing Zerto customers.
In this piece, we break down the difference between data management and secondary storage. This is necessary to understand the importance of what Komprise presented at Storage Field Day. Their software solution provides data management to make data visible, save space, and manage your data in a way that enables the data, instead of just storing it.
Inevitably when companies explore the prospect of microsegmentation, a common question arises. Why bother using a firewall at the hypervisor level when the VMs themselves have a host based firewall built into the OS or you could just use a hardware firewall to segment workloads?
Managing infrastructure is hard enough. But in today’s world of cloud computing it can be tough to manage constructs that live for seconds instead of persisting. How can you keep a handle on it all. Confidentially, the best way is with Aporeto. Tom Hollingsworth discusses the power of identity management for workloads in this post.
WPA3 is the new wireless authentication protocol just around the corner. It’s being developed to fix some of the issues with the ancient WPA2 protocol. But what about open encryption? Why don’t we just run everything over SSL and save time? Tom Hollingsworth examines the need for WPA3 with OWE and why TLS alone isn’t going to work.
Visualizing something is one of the fastest ways to learn it. Tom Hollingsworth takes a look at the people of Apstra and how they’re using visual networking to help everyone learn advanced concepts around intent-based networking.
Would someone buy your product if you didn’t show them how effective it could be? Illumio did just that during Networking Field Day 19 in San Jose. Tom Hollingsworth takes a look at why this is so important to the way we see software.
Two-factor authentication is a simple security measure, right? What if you could take that and build on it to the point where it becomes a huge piece of your overall security posture? Tom Hollingsworth takes a look at Cisco’s recent Duo acquisition and how it can be leveraged for more than just a few factors.