0
IDG Contributor Network: Closing the PC/TC experience gap for good
When thin clients were first introduced to the market in 1995, there was a cultural backlash. Thin clients may have made working with company data less costly and more secure, but from the workers’ perspective, their PC was replaced by a little box connected by a serial cable, with limited graphics that was much slower than the PC they were used to working on every day.In those early days, even as we swapped the serial cables for network ones, shrunk the cases, and doubled the performance, it didn’t take long before thin clients were banished to niche use cases, becoming the territory of call centers, nurses’ stations and manufacturing plants—often to those workers’ disappointment.To read this article in full, please click here
Riverbed CEO retires; Manoj Leelanivas returns to Juniper; and Microsoft reorganizes.
The organization has more than 60 ongoing initiatives tied to its 3.0 framework and Lifecycle Service Orchestration (LSO) efforts. These include a multi-vendor software-defined wide area networking (SD-WAN) implementation.
The deal strengthens HPE’s Microsoft Azure support and also boosts its hybrid cloud management platform.
The organization had run into challenges with different container registries implementing the protocol using different versions, which led to compatibility issues.
The company had been white labeling an SD-WAN service from another vendor, but it found it to be too expensive and not versatile enough.
Do you want to maintain your network and security infrastructure as a code? Do you want to automate NSX-T? One more option has been just added for you! Following my previous post about NSX-T: OpenAPI and SDKs you might have figured out how easy it is to generate different language bindings for NSX-T. Thankfully to this, we... 
The security vendor posted $116.2 million in revenue for fiscal 2017, up about 39 percent over 2016.


Organizations are automating security incident investigations and making use of deception grids to identify breaches more quickly.