Gigamon is revolutionizing Traffic Intelligence by adding new technology. It is designed for the service providers who want to manage the flow of traffic and to protect it from performance issues, access rights issues, and potential data vulnerabilities. It follows a Unified Visibility Framework to provide insight into the network…


Introduction

Annotations are the labels on your data or records, and annotation is the process of generating them. Machine learning annotation refers to the process of labelling the data either in the form of text, images or even audio. Normally, annotation is done by humans. …


Pakistan being the sixth largest populated country, with advantageous geographical location, a large talent pool is well equipped to play an essential role in the future global economy. …


STEM is a curriculum based on the idea of educating students in four specific disciplines — science, technology, engineering and mathematics — in an interdisciplinary and applied approach. …


  1. What is STEM

STEM is a curriculum based on the idea of educating students in four specific disciplines — Science, Technology, Engineering and Mathematics — in an interdisciplinary and applied approach. …


Gigamon is a company providing solutions for public and hybrid cloud since 2004. Their products include physical and virtual network visibility technologies like TAP-Terminal Access Point, which is a monitoring device for traffic passing between network nodes.

GigaSMART has many smart features just as its name suggests like Adaptive Packet…


Go to GNS3 website and click marketplace

Search ost and click ostinato


Watcom Inc. wants to harden their network and infrascture security. So come up with a network architecture and what steps / devices will be integrated to build a full proof network

Hardening is typically the method of securing a system by reducing its surface of vulnerability.

Network infrastructure is that…


Service Chain

Service Chaining simply consists of a set of network services, such as firewalls or application delivery controllers (ADCs). All are interconnected through the network to support an application.

But SDN and NFV can make the service chain and application provisioning process a whole lot shorter and simpler.

Network Service Chain

Also known as…


1. Enterprise VPN

A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. A Virtual Private Network (VPN) is a way to extend the Local Area Network to branch locations and remote locations via the public network (Internet) using technologies like encryption (hence forming…

LogicFinder

Wajid Hassan is a Ph.D. Fellow in Technology Management at Indiana State University, USA. He is a Technology Evangelist and a fierce promoter of STEM Education

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store