Main
Log in

Networking

  • Conclusion: Recently, several architectural models and tools have become available to enable the microsegmentation of networks, which helps improve overall security within organisations and can help limit the scope of any potential breach within an organisation. This can be achieved by aligning microsegmentation of networks with the organisation’s mission-critical systems

    ...
  • Conclusion:Preparing the modern business for Cloud requires a common computing and networking infrastructure with new Cloud architectures converging with data centres over a hybrid of both direct Cloud connections and traditional wide area networking.

    Organisations must begin by conducting a “triage” of their applications into three networking categories: those in

    ...
  • Conclusion: Business prefers certainty to doubt and some issues now appear to be clear:

    • Full deployment of Australia’s National Broadband Network now seems likely within about 5 years.
    • Its funding method and construction costs will create broadband access with higher prices than current ISP charges and those of Australia’s trading
    ...
  • Conclusion: The introduction of Software Defined Networking (SDN) offerings touted a number of benefits around simpler and more agile network management and provisioning, lowering capital and operational costs.

  • Conclusion: Although virtualisation is widespread in computing and storage, software-defined everything (SDE) is 3–5 years away from broad adoption by

    ...
  • Conclusion: Enterprise software vendors and enterprise software users are increasingly investing in in functionality that is accessible from mobile devices, and many organisations face the challenge of making key legacy applications accessible on mobile devices. Comprehensive and reliable APIs

    ...
  • Conclusion: As storage vendors increasingly include active-active storage in their proposals, IT Executives must move beyond a naïve understanding of what it is, to a deeper understanding of the scenarios under which it can deliver a benefit, the risks it mitigates, and where is fits within the overall redundancy and availability architecture.

    Since active-active

    ...

In the News

The pros and cons of shadow IT In today’s business world - WHICH-50 - 23 July 2019

Shadow IT sounds like a covert — quite possibly dark — force. And to some people it may well be. But the truth is both far simpler and more complex. According to Cisco, Shadow IT is the use of...
Read More...

Busting The Three Big Cloud Myths - WHICH-50 - 11 June 2019

Organisations that are resisting the shift to cloud computing are often basing their decisions on common misconceptions around security, price and integration. That’s a key finding in a recent...
Read More...

ANZ business users calling the shots in ICT decisions

Conducted by Australia’s Intelligent Business Research Services (IBRS) and commissioned by TechnologyOne, the survey of 261 business leaders in ANZ has shown that business functions are having more...
Read More...

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles