Catching the Buzz on Coffee Shop Networking
 
 
The traditional wide area network was designed to connect offices to the data centers. However, branch / retail networking has become extremely complicated in light of requirements for cloud and internet access. It’s also becoming more difficult to address security, due to performance tradeoffs and inconsistent enforcement of policy at different locations.
To address these concerns, we have seen a dramatic shift in network design priorities, inspired by the user experience at the coffee shop. Could the open, casual public network model be applied at the enterprise as well?
In this session, we’ll explore the concept of coffee shop networking. Hear insights from Cloudflare Field CTO Trey Guinn and get your questions answered on the future of enterprise networking.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
- 
 HPE's new Cray system is a pocket powerhouse HPE's new Cray system is a pocket powerhouseNews Hewlett Packard Enterprise (HPE) had unveiled new HPC storage, liquid cooling, and supercomputing offerings ahead of SC25 
- 
 High performance and long battery life: How Dell AI PCs offer the best of both worlds High performance and long battery life: How Dell AI PCs offer the best of both worldsUnlocking the true potential of on-device AI requires a perfect balance between software and hardware 
- 
 Secure 5G for Operational Technology Environments Secure 5G for Operational Technology Environmentswhitepaper 
- 
 2025 State of Procurement Data 2025 State of Procurement Datawhitepaper 
- 
 The Laptop’s Role in the AI Revolution The Laptop’s Role in the AI Revolutionwhitepaper 
- 
 Atera - Autonomous IT, made real with AI Atera - Autonomous IT, made real with AIwhitepaper 
- 
 Thales In-Person ID Proofing Solution Thales In-Person ID Proofing Solutionwhitepaper 
- 
 Unlocking the power of AI-driven PCs and edge computing Unlocking the power of AI-driven PCs and edge computingwhitepaper 
- 
 How to Choose the Best MFA Methods How to Choose the Best MFA Methodswhitepaper 
- 
 New developments in SASE: Post quantum cryptography and Protecting Generative AI New developments in SASE: Post quantum cryptography and Protecting Generative AIwhitepaper 
