Artwork

Contenido proporcionado por The Oakmont Group and John Gilroy. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente The Oakmont Group and John Gilroy o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !

Ep 196 How to take a Federal Network Above and Beyond

29:50
 
Compartir
 

Manage episode 450919840 series 3610832
Contenido proporcionado por The Oakmont Group and John Gilroy. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente The Oakmont Group and John Gilroy o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/

Want to listen to other episodes? www.Federaltechpodcast.com

Ep 196 How to take a Federal Network Above and Beyond

Today, we see our network being pushed and pulled in every direction: remote users demand access, millions of endpoints must be managed, and wireless networks abound. The Internet we use every day was designed for a much more humble requirement: essentially, bursts of communication between small entities.

Our interview with Dan DeBacker from Extreme Networks will define these new requirements and how innovation can keep you up to speed.

One of the best podcasts in Washington, DC, is “Feds at the Edge.” It recognizes the rapid decentralization of systems, which has reached the point where some organizations are considering doing the “compute” aspect of the network at the edge.

Let me state the obvious: a network that is not optimized will not allow speed to be efficiently achieved.

Hybrid networks can increase complexity to the point where speed degenerates and opportunities for malicious actors can appear.

During the interview, Dan DeBacker details how methods and techniques can be applied to carefully examine a network and ferret out stealth networks and areas that can “leak” access.

When a system is visible, it is easier to incorporate legacy networks and enhance connectivity between sites.

  continue reading

208 episodios

Artwork
iconCompartir
 
Manage episode 450919840 series 3610832
Contenido proporcionado por The Oakmont Group and John Gilroy. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente The Oakmont Group and John Gilroy o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/

Want to listen to other episodes? www.Federaltechpodcast.com

Ep 196 How to take a Federal Network Above and Beyond

Today, we see our network being pushed and pulled in every direction: remote users demand access, millions of endpoints must be managed, and wireless networks abound. The Internet we use every day was designed for a much more humble requirement: essentially, bursts of communication between small entities.

Our interview with Dan DeBacker from Extreme Networks will define these new requirements and how innovation can keep you up to speed.

One of the best podcasts in Washington, DC, is “Feds at the Edge.” It recognizes the rapid decentralization of systems, which has reached the point where some organizations are considering doing the “compute” aspect of the network at the edge.

Let me state the obvious: a network that is not optimized will not allow speed to be efficiently achieved.

Hybrid networks can increase complexity to the point where speed degenerates and opportunities for malicious actors can appear.

During the interview, Dan DeBacker details how methods and techniques can be applied to carefully examine a network and ferret out stealth networks and areas that can “leak” access.

When a system is visible, it is easier to incorporate legacy networks and enhance connectivity between sites.

  continue reading

208 episodios

Todos los episodios

×
 
Loading …

Bienvenido a Player FM!

Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.

 

Guia de referencia rapida

Escucha este programa mientras exploras
Reproducir