NPM/NetOps
Artificial intelligence is no longer a future investment. It's already embedded in how we work — whether through copilots in productivity apps, real-time transcription tools in meetings, or machine learning models fueling analytics and personalization. But while enterprise adoption accelerates, there's one critical area many leaders have yet to examine: Can your network actually support AI at the speed your users expect? ...
In MEAN TIME TO INSIGHT Episode 19, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA explains the cause of the AWS outage in October ...
Artificial intelligence is transforming network operations (NetOps), supercharging automation, enabling new predictive capabilities, improving visibility and powering nearly continuous optimization ... When trained on live network data and large libraries of validated automations, GenAI and agentic AI can help NetOps teams be more productive while making networks more reliable, easier to manage and secure. And as agentic AI becomes more powerful, AI's overall usefulness to the NetOps team will increase exponentially ...
Organizations across the globe face unprecedented cybersecurity challenges as their digital footprints expand across cloud, on-premises, and remote environments. Ransomware continues to surge as one of the top global cyber threats, with attacks increasing(link is external) by 33% globally in 2024 and organizations experiencing an average of 1,200 weekly attacks — the highest in three years ...
In MEAN TIME TO INSIGHT Episode 18, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses networking for artificial intelligence ...
Aryaka recently conducted a series of surveys in three distinct industries (manufacturing, transportation, and business services), looking deeper at key trends and pain points in networking and security. Despite differences in industry priorities and digital maturity, IT leaders in these sectors are all clearly facing an uphill battle to secure increasingly hybrid, cloud-connected, and distributed infrastructure without overwhelming their limited resources ...
Most teams go straight to the usual suspects when performance tanks in the cloud: app bugs, code regressions, maybe even the cloud provider itself. However, the real bottleneck is hiding in plain sight more often than not: the network ...
Services firms are grappling with significant new networking and security challenges as they increasingly transition towards digital-first operations, according to The State of Network Security in Business and Professional Services, a report commissioned by Aryaka ...
The line between work and life is blurring faster than ever. A recent Microsoft study revealed that 40% of employees check emails before 6 a.m., and evening meetings have risen by 16% since the shift to remote work began. The result? A new phenomenon many are calling the "infinite workday." While the psychological toll of this always-on culture has rightfully received attention, there's another, often-overlooked dimension: its impact on IT performance, digital access, and user experience ...
In MEAN TIME TO INSIGHT Episode 17, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses cloud network observability ...
Reliance on packet capture to improve mean times to detection (MTTD) and resolution (MTTR) is likely to increase in 79% of enterprise organizations this year, according to the 2025/2026 State of the Network study by VIAVI Solutions ... The study shows that organizations with strong packet capture experienced notable improvements to MTTD, with double the number of respondents reporting a significantly shorter MTTD rate over the past year compared to those lacking strong packet capture capability ...
In MEAN TIME TO INSIGHT Episode 16, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses Do-It-Yourself Network Automation challenges and what vendors can do to help ...
Kubernetes is designed for flexibility, not simplicity. Enterprises now routinely run multiple Kubernetes distributions — EKS for one team, OpenShift for another, and GKE for a third. These are typically adopted organically, often bottom-up by individual teams. The result is tooling sprawl, operational inconsistency, and a growing burden on platform teams responsible for ensuring stability, performance, and security. Here, we'll explore the three top challenges for secure networking in Kubernetes ...
As artificial intelligence (AI) adoption gains momentum, network readiness is emerging as a critical success factor. AI workloads generate unpredictable bursts of traffic, demanding high-speed connectivity that is low latency and lossless. AI adoption will require upgrades and optimizations in data center networks and wide-area networks (WANs). This is prompting enterprise IT teams to rethink, re-architect, and upgrade their data center and WANs to support AI-driven operations ...
In MEAN TIME TO INSIGHT Episode 15, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses Do-It-Yourself Network Automation ...
Zero-day vulnerabilities — security flaws that are exploited before developers even know they exist — pose one of the greatest risks to modern organizations. Recently, such vulnerabilities have been discovered in well-known VPN systems like Ivanti and Fortinet, highlighting just how outdated these legacy technologies have become in defending against fast-evolving cyber threats ... To protect digital assets and remote workers in today's environment, companies need more than patchwork solutions. They need architecture that is secure by design ...
64% of enterprise networking teams use internally developed software or scripts for network automation, but 61% of those teams spend six or more hours per week debugging and maintaining them, according to From Scripts to Platforms: Why Homegrown Tools Dominate Network Automation and How Vendors Can Help, my latest EMA report ...
A major architectural shift is underway across enterprise networks, according to a new global study from Cisco. As AI assistants, agents, and data-driven workloads reshape how work gets done, they're creating faster, more dynamic, more latency-sensitive, and more complex network traffic. Combined with the ubiquity of connected devices, 24/7 uptime demands, and intensifying security threats, these shifts are driving infrastructure to adapt and evolve ...
Cyber threats are growing more sophisticated every day, and at their forefront are zero-day vulnerabilities. These elusive security gaps are exploited before a fix becomes available, making them among the most dangerous threats in today's digital landscape ... This guide will explore what these vulnerabilities are, how they work, why they pose such a significant threat, and how modern organizations can stay protected ...
In MEAN TIME TO INSIGHT Episode 14, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud network observability...
Telecommunications is expanding at an unprecedented pace ... But progress brings complexity. As WanAware's 2025 Telecom Observability Benchmark Report reveals, many operators are discovering that modernization requires more than physical build outs and CapEx — it also demands the tools and insights to manage, secure, and optimize this fast-growing infrastructure in real time ...
A Gartner analyst recently suggested that GenAI tools could create 25% time savings for network operational teams. Where might these time savings come from? How are GenAI tools helping NetOps teams today, and what other tasks might they take on in the future as models continue improving? In general, these savings come from automating or streamlining manual NetOps tasks ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...
In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...
In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...