Atmosphere 2017

No podcast/blogpost this week, as I’m out living it up in Nashville with some of the best and brightest minds in the wireless networking industry! They’ve revealed a lot of exciting new features in just the first day, ranging from the ambitious machine learning based security on the internal network to the practical new wired tunneling […]

Read More Atmosphere 2017

VXLAN – One Tunnel to Rule Them All

I often feel like half my job is just keeping up with the new advancements and offerings that constantly churn through my inbox. I think the blogosphere likes to call it… “Disruption.”  Some trends don’t make it much further than the marketing department’s brainstorming session, but some actually stick and begin to be widely accepted […]

Read More VXLAN – One Tunnel to Rule Them All

General Blogspam

Sorry it’s been so quiet over here lately. I’ve been engaged in several new projects that are taking up the majority of my time. I don’t have anything to share with you today that I’VE created… but I have something better! Something that OTHER people have created! Here’s a few articles and videos from around […]

Read More General Blogspam

Software Defined Stuff

  So, this is going to be a bit of an informal blog post, but I’m in the middle of a weeklong boot camp for VMware NSX and I wanted to share a few things I’ve learned with the internet. First, this is one of the first times that I’ve had a chance to get […]

Read More Software Defined Stuff

Understanding Wireless Encryption

Wireless is great because it gives you mobility – you can get your work done just about anywhere these days (which is both a good and a bad thing)! But there is an inherent drawback to mobility as wireless traffic is unbounded. It flows in all directions and eavesdropping on private conversations is both easy […]

Read More Understanding Wireless Encryption

Role Based Access Control

You’re only as strong as your weakest link. This old adage is especially true when it comes to network security. You can purchase the most expensive, ridiculously feature-rich firewall on the market, install it at the WAN edge, and think that you are safe. But without internal network controls in place as well, you run […]

Read More Role Based Access Control