SSH.COM Blog

SSH Guest Blogger: Jay Bretzmann

IDC, Research Director Cybersecurity Products
Find SSH Guest Blogger: Jay Bretzmann on:

Posts By SSH Guest Blogger: Jay Bretzmann

PAM encrypted traffic SSH Zero Trust just-in-time

The Network Effect, Increasing Number of Critical ...

The Network Effect states the value of a telecommunications network is proportional to the square of the number of connected users of the system (N2). A decade in the naming, this law was a marketing tool to help 3Com sell more Ethernet cards (Token Ring was the IBM developed competitor at the time). It argued that the value of communications rises over time with the number of connections and henc...

Author

Want to be the first to know about new blog posts?

Fill in you email address and be the first to know about it. 

Subscribe to Email Updates

SSH.COM is one of the most trusted brands in cyber security.

We help major enterprises solve the security challenges of digital transformation. We design best-of-breed commercial solutions for secure access that help our customers win in the global data economy.

Read more about our SSH.COM

Latest posts from the SSH.COM blog