Home Devin Partida Bio
Image of Devin Partida
Devin Partida

Devin Partida is a contributing writer for Enterprise Networking Planet who writes about business technology, cybersecurity, and innovation. Her work has been featured on Yahoo! Finance, Entrepreneur, Startups Magazine, and many other industry publications. She is also the Editor-in-Chief of ReHack.1

What Is an Application-Level Gateway? How ALGs Work
An application-level gateway (ALG) is a type of firewall that filters traffic at the application layer of the OSI model. Here’s how they work—and how they can benefit your...
Best Practices for Implementing Rural Broadband
For many people, broadband is inseparable from everyday life. However, much of the U.S., including businesses performing vital services, still lack access to high-speed internet. Implementing rural broadband to address this gap poses a challenging but...
The Human Role in Network Automation
The IT landscape is an ever-moving target, full of new trends and technologies, and it keeps every data scientist, IT specialist, and CIO on their toes. Various data science, IT, and cybersecurity trends illustrate the major advancements in technologies like...
Network Digital Twin Use Cases
Digital twins are highly realistic digital versions of real-life assets. They allow managers to see the effects of certain decisions or process changes before proceeding with those options in the real world. Many companies are particularly interested in...
Supporting Sustainability with Energy-Efficient Networking
Creating a more sustainable digital environment can take many forms. However, one that many companies overlook is their network, which has a massive carbon footprint despite its seemingly invisible appearance. The energy required to connect humanity to...
How to Build a Zero-Trust Network Model
Clearly, modern IT systems are highly advanced. Enterprises must prioritize protecting their IT infrastructure because the cybersecurity landscape is becoming more complex and threatening. Enterprise network experts now require specialized knowledge of...
Endpoint Backup for Remote Work
Backups have always been an important part of organizational cybersecurity. However, most backup technologies and protocols focus on servers and data, not the endpoints generating the information themselves. As remote work becomes the norm, endpoint backup...
BGP Routing vs. DNS Routing
The number of routing protocols feels endless and overlapping. Some of the most common household names for IT and data specialists are BGP and DNS routing. How does each of them perform? Do any of them overlap? Is every routing protocol safe? These two...
Guide to IoT Analytics: 7 Key Tips
The Internet of Things (IoT) is one of today’s most disruptive technologies. Interconnected device networks can streamline operations and make the customer experience more convenient, and their potential goes beyond these straightforward use cases. In...
Types of Edge Computing and How to Use Them
Edge computing is the next step forward beyond cloud computing. More organizations are looking to bring the cloud closer or distribute their computing resources across broader networks as data demands rise. This shift to the edge has many advantages, but it...