Technology advances more rapidly today than ever before. We are hearing more and more tech companies integrating artificial intelligence and virtual or augmented reality into their platforms and products. The exponential growth in cloud computing is drives demand for flexible or “pay as you go” consumption models. As technology becomes more advanced and user-friendly it is becoming integrated into every aspect of our lives. As we integrate technology more and more into our business, there is an increased need for cybersecurity and data availability. But what does this all mean for the IT industry and the skill sets our IT teams will need as we look into the future of IT?
By this time, I’m sure you’ve all heard about the whole SD-WAN, or Software Defined Wide Area Network, craze hitting the industry. Heck, if you are reading this now, it probably means you are in the process of researching, piloting, or operating one yourself. This is great news! However, if you are looking for a high-level, marketing overview of the four pillars of an SD-WAN, then you are probably in the wrong place! In this article, I’m going to pass on some information from my personal experiences with one SD-WAN solution, Cisco IWAN.
Currently I am working on a project where I am going through and optimizing a large set of Access Control Lists (ACL) on a set of 5585 Firewalls. While going through each ACL I have noticed a few mistakes other engineers have made while configuring these rules. I have compiled a list of these common mistakes. The focus of this blog will be around ACLs on Cisco ASA’s; however these rules still apply to other devices as well.
Enjoy the first Fireside Chat. Fireside Chats are a LookingPoint video series where we bring casual technology conversations to you! This week we are discussing one of the hottest topics of 2017: SD-WAN. Sit back, relax, and enjoy a nice fireside chat.
Learn more about SD-WAN here.
Subscribe to the informative Newsletter to be Notified Updates in the Technology world.