author:


Networks

Silo-Busting and Dream-Dashing; More Fun With Automation


With the popularity of Agile methodologies and the ubiquity of people claiming they were embracing NetOps/DevOps, I could swear we were supposed to have adopted a new silo-busting software-defined paradigm shift which would deliver the critical foundational framework we needed to become the company …


author:


Database

Why I’m Not Worried About Skynet


I’m 98% confident if you ask three data scientists to define Artificial Intelligence (AI), you will get five different answers. The field of AI research dates to the mid-1950s, and even earlier when you consider the work of Alan Turing in the 1940s. Therefore, …


author:


Networks

The Evolution of Network Operations


When I first began this post, my thinking revolved around the translation problems of a declarative approach to network operation, but having only procedural interfaces to work with. Further thought dismissed that assumption and led to thinking about how declarative models evolve to meet …


author:


Networks

AI-nxiety


So far I’ve written about my love and hatred of what AI can do for me (or cost me) as a network owner. This post is going to cover why I’m afraid to let a machine take the wheel and use all that artificial …


author:


A Strong Customer Community Is Critical When Optimizing Innovation


Having a strong customer community for feedback and ideation is critical when optimizing innovation. It supports product strategy while removing blinders to product deficiencies and allowing a democratic approach to product solutions. Last month we hosted THWACKcamp™ 2018, where we were able to connect …


author:


Networks

If I Was a Grownup, This is the Essay I’d Write


Recently, my friend Phoummala Schmitt, aka “ExchangeGoddess” and Microsoft Cloud Operations Advocate, wrote about her struggles with imposter syndrome. It’s a good read that I highly recommend. But one element of it stuck with me, like an itch I couldn’t quite reach. I knew this itch wasn’t …


author:


Networks

Templates vs. Policies


Are configuration templates still needed with an automation framework? Or does the automation policy make them a relic of the past? Traditional Configuration Management: Templates We’ve all been there. We always keep a backup copy of a device’s configuration, not just for recovery, but …


Security

You Are Here – Identity & Access Security


Where are you? Halfway through this 6-part series exploring a new reference model for IT infrastructure security! As you learned in earlier posts, this model breaks the security infrastructure landscape into four domains that each contain six categories. While today’s domain may seem simple, …