Artwork

Inhoud geleverd door The Oakmont Group and John Gilroy. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door The Oakmont Group and John Gilroy of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.
Player FM - Podcast-app
Ga offline met de app Player FM !

Ep 196 How to take a Federal Network Above and Beyond

29:50
 
Delen
 

Manage episode 450919840 series 3610832
Inhoud geleverd door The Oakmont Group and John Gilroy. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door The Oakmont Group and John Gilroy of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/

Want to listen to other episodes? www.Federaltechpodcast.com

Ep 196 How to take a Federal Network Above and Beyond

Today, we see our network being pushed and pulled in every direction: remote users demand access, millions of endpoints must be managed, and wireless networks abound. The Internet we use every day was designed for a much more humble requirement: essentially, bursts of communication between small entities.

Our interview with Dan DeBacker from Extreme Networks will define these new requirements and how innovation can keep you up to speed.

One of the best podcasts in Washington, DC, is “Feds at the Edge.” It recognizes the rapid decentralization of systems, which has reached the point where some organizations are considering doing the “compute” aspect of the network at the edge.

Let me state the obvious: a network that is not optimized will not allow speed to be efficiently achieved.

Hybrid networks can increase complexity to the point where speed degenerates and opportunities for malicious actors can appear.

During the interview, Dan DeBacker details how methods and techniques can be applied to carefully examine a network and ferret out stealth networks and areas that can “leak” access.

When a system is visible, it is easier to incorporate legacy networks and enhance connectivity between sites.

  continue reading

218 afleveringen

Artwork
iconDelen
 
Manage episode 450919840 series 3610832
Inhoud geleverd door The Oakmont Group and John Gilroy. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door The Oakmont Group and John Gilroy of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/

Want to listen to other episodes? www.Federaltechpodcast.com

Ep 196 How to take a Federal Network Above and Beyond

Today, we see our network being pushed and pulled in every direction: remote users demand access, millions of endpoints must be managed, and wireless networks abound. The Internet we use every day was designed for a much more humble requirement: essentially, bursts of communication between small entities.

Our interview with Dan DeBacker from Extreme Networks will define these new requirements and how innovation can keep you up to speed.

One of the best podcasts in Washington, DC, is “Feds at the Edge.” It recognizes the rapid decentralization of systems, which has reached the point where some organizations are considering doing the “compute” aspect of the network at the edge.

Let me state the obvious: a network that is not optimized will not allow speed to be efficiently achieved.

Hybrid networks can increase complexity to the point where speed degenerates and opportunities for malicious actors can appear.

During the interview, Dan DeBacker details how methods and techniques can be applied to carefully examine a network and ferret out stealth networks and areas that can “leak” access.

When a system is visible, it is easier to incorporate legacy networks and enhance connectivity between sites.

  continue reading

218 afleveringen

Alle afleveringen

×
 
Loading …

Welkom op Player FM!

Player FM scant het web op podcasts van hoge kwaliteit waarvan u nu kunt genieten. Het is de beste podcast-app en werkt op Android, iPhone en internet. Aanmelden om abonnementen op verschillende apparaten te synchroniseren.

 

Korte handleiding

Luister naar deze show terwijl je op verkenning gaat
Spelen