Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Networking in 2015: Will IPv6 be an Issue?

5/01/2015 by Sharon Shahzad

W1siziisijiwmtuvmdevmduvmtcvmdkvmjmvnjq4l2lwdjzfzmxpcf9jbg9ja19hcnmuanbnil0swyjwiiwidgh1bwiilci2mdb4ndawxhuwmdnlil1d

Forget about SDN hype, network policy will be the primary topic for networking administrators in 2015.

When it comes to networking in 2015, what's old is new again. Trends and topics that networking professionals have known for a decade or more, will be top of mind this new year.

While much of the networking hype in the last several years has been about Software Defined Networking (SDN) and more recently Network Function Virtualization (NFV), there are deeper underlying trends that will manifest in 2015.

Fundamentally, the promise of SDN that various vendors have evangelized is that of network agility. More often then not though, the tried and true VLAN, a technology that pre-dates the modern SDN era hype has proved to be more than sufficient to handle the agility than many organizations need.

What is difficult is managing policy across a distributed network, not just for quality of service and bandwidth, but for security and access control as well. Before the SDN hype, there was an era of hype around Network Access Control (NAC). While NAC hype has long since died down, the fundamental feature set is still valuable and is often just baked into networking best practices, hardware and software today. The same will likely be true with SDN increasingly in 2015. SDN like NAC before it, will become a feature of broader network policy.

This article has been extracted from http://www.enterprisenetworkingplanet.com, please click on this link to read the article in full http://www.enterprisenetworkingplanet.com/datacenter/datacenter-blog/networking-in-2015-will-ipv6-be-an-issue.html

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy Technology, Demand IT and Business Engagement, Digital and E-commerce, Leadership Talent, Infrastructure and Service Delivery, Project and Programme Delivery.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...