In talking to our customers, CEO Rich Napolitano realized that the rapidly changing dynamics of storage have an impact on network traffic. After reading articles like this one from Enrico Signoretti at the Register on how the network may become the next bottleneck for storage, he decided to investigate further. In a blog post this week, Rich identifies how storage is changing, its impact on the network and how Plexxi solutions can enable scaled-out storage. Give it a read!
Below please find a few of our top picks for our favorite news articles of the week.
SiliconANGLE: Is there a new networking solutions provider du jour for cloud architects?
By R. Danes
How does a young company compete against a behemoth competitor with an 80 percent enterprise marketshare? “We look for the agents of change,” said Plexxi, Inc.’s CEO Rich Napolitano, referring to the company’s strategy for attracting customers looking for novel IT Solutions.
Xconomy: What’s New in Boston VC Land: Assemble, Hyperplane, Pillar
By Gregory T. Huang
GV (not to be confused with GC) is Google Ventures’ new name. The firm, also bicoastal, has been moving away from seed-stage investing, according to a Wall Street Journal story. GV Continue reading

The post Worth Reading: Making IPv6 Work appeared first on 'net work.
Over at the Netflix blog, they were proudly announcing that it took SEVEN years to fully migrate to AWS public cloud platform.
The post Its Hard to Build “Cloud” – Netflix appeared first on EtherealMind.
Brocade Mobile CTO, Kevin Shatzkamer, recently provided a radio show preview of what to expect at Mobile World Congress this year in Barcelona. One of the big themes is expected to be 5G along with the services and new business models it will enable for the mobile industry. We are all familiar with the existing... Read more →

At CloudFlare, we’re committed to making sure the encrypted web is available to everyone, even those with older browsers. At the same time, we want to make sure that as many people as possible are using the most modern and secure encryption available to them. Improving the cryptography used by the majority requires a coordinated effort between the organizations building web browsers and API clients and those working on web services like CloudFlare. Cryptography is a two-way street. Even if we support the most secure cryptographic algorithms for our customers, web visitors won’t get the benefit unless their web client supports the same algorithms.
In this blog post we explore the history of one widely used cryptographic mode that continues to cause problems: cipher block chaining (CBC). We’ll explain why CBC has proven difficult to use safely, and how recent trends in the adoption of secure ciphers by web clients have helped reduce the web’s reliance on this technology. From CloudFlare’s own data, we’ve seen the percentage of web clients that support safer cipher modes (such as AEAD) rise from under 50% to over 70% in six months, a good sign for the Internet.
Ciphers Continue reading
As technology evolves, companies adapt and grow. We are no longer confined to conducting business within brick and mortar offices. We can hold a meeting on our tablet in a coffee shop or organize our schedules in our smartphones at the grocery store. Even storage has travelled from overflowing file cabinets into a vast, expansive cloud that can be reached from portable devices wherever, whenever. As businesses go mobile, security is more vital than ever, and it’s important that we enhance it while remaining productive. But how can we be certain that our valuable, business-critical resources are protected?
Geoff Huang, VMware’s Director of Product Marketing, Networking and Security, will host this half-hour webcast on February 18th at 11:00 am PST on why yesterday’s security measurements have become inadequate with the rise of network virtualization, and how NSX can offer a remedy in the modern, mobile workspace.
The truth is, the mobile cloud’s increased efficiency also comes with increased security threats. Before, security was created by building a moat around a network to guard company resources against outsiders trying to break-in. Once that network transitions into a mobile workspace, however, its borders can no longer be tangibly defined, so Continue reading