article thumbnail

What’s next for network operations

CIO Business Intelligence

By Serge Lucio, Vice President and General Manager, Agile Operations Division This is a continuation of Broadcom’s blog series: 2023 Tech Trends That Transform IT. Stay tuned for future blogs that dive into the technology behind these trends from more of Broadcom’s industry-leading experts.

Network 105
article thumbnail

Data soup and the art of finding relevance: Why AIOps isn’t enough for modern network monitoring

CIO Business Intelligence

Data soup So, why this talk about plastic soup in an IT blog? Well, many of today’s IT teams have a strategy of employing AIOps tools and creating oceans of data across the whole IT stack—from the network to the application layer. These tools deliver actionable insights into user experience and network fault, performance, and flow.

Network 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CIOs in transition: 5 tips for landing your next IT leadership job

CIO Business Intelligence

Ask your network, and you’ll likely find IT leader peers who have been in a similar situation at least once in their career. I was in transition twice and wasn’t ready to handle the networking, persistence, and stress that comes with finding a new opportunity. Networking is a lifelong endeavor.

article thumbnail

AI and automation will play an increasing role in technology

CIO Business Intelligence

By Ram Velaga, Senior Vice President and General Manager, Core Switching Group This article is a continuation of Broadcom’s blog series: 2023 Tech Trends That Transform IT. Stay tuned for future blogs that dive into the technology behind these trends from more of Broadcom’s industry-leading experts.

article thumbnail

How customers can save money during periods of economic uncertainty

CIO Business Intelligence

Today, security, networking, and IT teams are faced with reduced headcount, shrinking budgets, and the very real need to do more with less. Yesterday’s hub-and-spoke networks and castle-and-moat security models were adequate when users, applications, and data all resided onsite in the corporate office or data center.

article thumbnail

Minimizing the negative impact of IT through design and circularity

CIO Business Intelligence

In a previous blog , I described the three areas of product development and operation that HPE Aruba Networking focuses on when designing our products for IT efficiency and sustainable operations—like how products are made, how they work, and how they are being used. But what about the product lifecycle itself?

Network 113
article thumbnail

How customers capture real economic value with zero trust

CIO Business Intelligence

Hub-and-spoke networks and castle-and-moat security architectures were designed for days gone by when users, apps, and data all resided on premises. In this blog, you will learn a few of the means by which Zscaler delivers superior economic value than perimeter-based architectures.