We said that the next era of IT would shake things up, and it is. And so is Plexxi.
Today, Plexxi announced two new products that combine to deliver cloud builders unprecedented capabilities to bring public cloud flexibility and efficiency to the private cloud through a focus on agility, ease-of-use, security, scale and cost-effectiveness. The first product, Plexxi 2.2 Software Suite for cloud builders, is available immediately and includes the Plexxi Network OS, the Plexxi Control application-defined fabric controller, and Plexxi Connect workflow orchestration and automation tool set. The second product, the Plexxi Switch 3 (available in January) is a powerful next-generation switch capable of delivering 10/25/40/50/100 GbE connectivity. Together, these new products expand Plexxi’s go-to-market opportunities in content distribution, high frequency trading, enterprise and government market segments.
The cloud enables rapid scaling; both up and down, of compute and storage capacity and facilitates speedy introduction of new services and applications. Early adopters have leveraged public cloud to achieve increased agility and scalability. In times when internal IT teams are challenged to respond quickly to requests, business department heads often turn to public cloud providers to implement new services quickly. This offers competitive advantage from a time-to-market perspective. It Continue reading
Citrix's Michael Leonard & Nuage Networks' Hussein Khazaal answer DemoFriday questions. Read for more insights on demo on network services.
Innovation is the cornerstone for sustained business success, and given how much innovation relies on technology these days, IT has to play a vital role in making it happen. Even so, Brocade's 2015 Global CIO Study found that more than half of CIO respondents spent around 1,000 hours a year reacting to unexpected problems such as data loss, network downtime and application access. With that much time spent fighting fires, how is the average CIO supposed to find the time to innovate?
To read this article in full or to leave a comment, please click here
To get the week started it's our distinct pleasure to introduce CloudFlare's latest PoP (point of presence) in Copenhagen, Denmark. Our Copenhagen data center extends the CloudFlare network to 65 PoPs across 34 countries, with 17 in Europe alone. The CloudFlare network, including all of the Internet applications and content of our users, is now delivered with a median latency of under 40ms throughout the entire continent—by comparison, it takes 300-400ms to blink one's eyes!
As can be seen above, traffic has already started to reach Copenhagen, with steady increases over the course of the day (all times in UTC). The new site is also already mitigating cyber attacks launched against our customers. The spike in traffic around 08:46 UTC is a modest portion of a globally distributed denial of service (DDoS) attack targeted at CloudFlare. By distributing the attack across an ever growing footprint of data centers, mitigation is made easy (and our site reliability engineers can sleep soundly!).
In December 2014 we announced our intention to launch one data center per week throughout 2015. It's an ambitious goal, but we're well on Continue reading
451 Research projects the network visibility and monitoring market will grow to more than $1.6 billion by 2019. Check out an excerpt from its 2015 Network Visibility and Monitoring Forecast to learn more.
The post Worth Reading: Smarter than our tech appeared first on 'net work.
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
SSL/TLS encryption is widely used to secure communications to internal and external servers, but can blind security mechanisms by preventing inspection of network traffic, increasing risk. In fact, Gartner predicts that in 2017 more than half of network attacks targeting enterprises will use encrypted traffic to bypass controls.
With attackers preying on the security gaps created by encrypted traffic, let’s examine the five most common network traffic inspection errors made today:
To read this article in full or to leave a comment, please click here
The problem with anonymity and the modern Internet is we tend to think of being anonymous as either “on” or “off” all the time. The only real reason we can think of to want to be anonymous is to do something evil, to hurt someone, to steal something, or to do something else considered anti-social or wrong.
But there’s a problem with this thinking — it’s much like pitting “the rich” against “the poor,” or any other time bound classification. There are times when I want to be anonymous, and there are times when I don’t care. It’s not a matter of doing that which is nefarious. It’s more about expressing opinions you know people won’t agree with, but which the expression of could cause you material harm, or about being able to investigate something without telling anyone about the situation. Continue reading