Cisco Data Virtualization

| February 15, 2018

article image
Customers need their data so they can make better business decisions today. With Cisco Data Virtualization, you provide the software that lets them access all their data-wherever it’s stored across the network.

Spotlight

PhishMe, Inc.

Our team developed the PhishMe® concept based on dozens of years of experience in penetration testing, social engineering, abuse management, incident response and forensics. As our founding team looked at the results of the annual assessment model we implemented for clients, we realized that to effectively combat phishing attacks, our customers needed to combine compelling exercises with dynamic, immersive training.

OTHER ARTICLES

VMware Adds More Hybrid Cloud Features to Network Virtualization Tech

Article | April 8, 2020

VMware on Wednesday announced new versions of its NSX-T and vRealize Network Insight software that simplify network virtualization and improve network visibility and security. The two products, along with VMware SD-WAN by VeloCloud, make up VMware’s Virtual Cloud Network, the company’s portfolio of software defined networking (SDN) technologies. It allows enterprises to deploy and manage network connectivity and security from internal data centers and branch locations to multi-cloud environments. While previous versions of NSX-T network virtualization and security software for data centers added support for public clouds and platforms that run containers on bare metal, the latest release, NSX-T 3.0, adds new networking and security features that improve the company’s vision to deliver a public cloud experience on premises, VMware executives said.

Read More

Virtualizing Broadband Networks: Q&A with Tom Cloonan and David Grubb

Article | June 11, 2020

The future of broadband networks is fast, pervasive, reliable, and increasingly, virtual. Dell’Oro predicts that virtual CMTS/CCAP revenue will grow from $90 million in 2019 to $418 million worldwide in 2024. While network virtualization is still in its earliest stages of deployment, many operators have begun building their strategy for virtualizing one or more components of their broadband networks.

Read More

8 reasons to consider hyperconverged infrastructure for your data center

Article | March 1, 2020

Demand for on-premises data center equipment is shrinking as organizations move workloads to the cloud. But on-prem is far from dead, and one segment that’s thriving is hyperconverged infrastructure (HCI). HCI is a form of scale-out, software-integrated infrastructure that applies a modular approach to compute, network and storage capacity. Rather than silos with specialized hardware, HCI leverages distributed, horizontal blocks of commodity hardware and delivers a single-pane dashboard for reporting and management. Form factors vary: Enterprises can choose to deploy hardware-agnostic hyperconvergence software from vendors such as Nutanix and VMware, or an integrated HCI appliance from vendors such as HP Enterprise, Dell, Cisco, and Lenovo.

Read More

Oracle Unbreakable Enterprise Kernel R5U3 Released With Better ARM 64-Bit Support

Article | March 24, 2020

The Oracle Linux team has released Unbreakable Enterprise Kernel Release 5 Update 3 as the newest version of their optimized downstream Linux kernel catering to cloud workloads. Unbreakable Enterprise Kernel R5 Update 3 is based off the Linux 4.14.35 upstream kernel but with extra patches atop. The focus for R5 Update 3 is on offering better 64-bit ARM (AArch64) architecture support, on-demand paging support, an XFS file-system deadlock fix, virtualization updates, and various driver updates back-ported to the kernel. The Unbreakable Enterprise Kernel continues to offer full user-space compatibility with Red Hat Enterprise Linux for which Oracle Linux continues to be based.

Read More

Spotlight

PhishMe, Inc.

Our team developed the PhishMe® concept based on dozens of years of experience in penetration testing, social engineering, abuse management, incident response and forensics. As our founding team looked at the results of the annual assessment model we implemented for clients, we realized that to effectively combat phishing attacks, our customers needed to combine compelling exercises with dynamic, immersive training.

Events