Northbound applications, Southbound applications, SDN security applications, SDN management applications, Layer 4-7 network services, Network automation and orchestration, Service Provider SDN applications
SDN control plane, Network hardware and SDN, SDN network virtualization, Network overlay software, SD-WAN, Campus LAN SDN, Software-defined data center, Software-defined storage, SDN testing, Service provider networks and SDN
OpenFlow, Network APIs from vendors, Cloud APIs for networking, Storage APIs, SDN-OpenFlow research, Emerging SDN protocols, SDN research
SDN strategy and ROI, SDN use cases, SDN companies, SDN certifications, skills and careers
See also -Topics Related to
SDN applications, SDN architecture, SDN standards and research, SDN business issues
This week, bloggers look into how to manage asymmetrical network traffic flows, Broadcom Trident telemetry and cloud security as part of a data protection strategy.
Learn how to use the Shodan search engine, which allows users to find specific types of computers and applications, to uncover security flaws and vulnerabilities.
Cisco has launched a Catalyst switching line that provides a redesigned platform for the campus network. The Cisco DNA software console provides the policy-based management layer.
Figuring out how to calculate bandwidth requirements is vital to ensuring your network runs smoothly, and it's best to get the formula correct from the beginning.
Learn about the different types of noise in data communication -- including thermal, intermodulation, cross-talk, impulse and shot noise -- and how they can affect your network.
Provisioning and deploying a WAN and VPN is an everyday function for engineers. But can you do that for an office 4,000 miles away without leaving your office?
Channel companies entering the cloud computing business must prepare for a subscription-based revenue model, cultivate partnerships and differentiate their services.
Gary Fish is no stranger to business reinvention. In 2016, he decided to transition from background in traditional cybersecurity and spin up a cloud security firm.
ENKI, a managed cloud services provider, has developed a series of applications using Agiloft's customizable business software applications platform.
As enterprises adopt team chat applications, IT leaders should examine security tools. End-to-end encryption, for example, can provide key access to messaging servers.
Managing hybrid unified communications can be tricky. Follow these steps to prepare your organization and IT team for the challenges of managing a hybrid environment.
Zoom is offering its cloud-based video conferencing service on Cisco hardware through its integration app, Zoom Connector. Zoom's service competes with Cisco WebEx.
Distributed data center architectures increase IT resiliency compared to traditional single-site models, with networking, data integrity and other factors all playing critical roles.
The latest threat to server security could be the firmware. That's the emphasis of at least one server-maker, hoping to help users thwart new attacks -- and spark server demand.
Admins can use vSphere permissions to assign VM controls to different IT groups within their enterprise. Follow the networking example below to get started.