GigaSpaces Update Appeals To Mainstream Developers
GigaSpaces Technologies, which specializes in products that address scalability in the application stack, is now shipping eXtreme Application Platform (XAP) 8.0, which enables organizations to transition their existing infrastructure into more modern systems such as distributed architectures, virtualized environments and the cloud. The company says its Same Data, Any API capability promotes openness and interoperability, supporting all common interfaces for accessing data, such as Memcached, JPA
ProQueSys Ships Network And Security Monitoring Software
Process Query Systems (ProQueSys) has shipped the first of what the company says will be a quarterly series of updates to its FlowTraq network flow monitoring product. New features in this version include support for virtual local area networks (VLANs) and autonomous systems (AS); improved filtering; enhancements to the user interface; and improvements in speed.
IT Pros Vote Cisco in FCoE Switch Brand Leader Survey
Cisco recently swept the FCoE Switch Brand Leader Awards for the second year in a row, based on responses from IT professionals who participated in an IT Brand Pulse Brand Leader Survey. The results demonstrate that the IT community recognizes the leadership role Cisco has played in converged networking and FCoE.
Planning the Interop Network Has Begun
The planning for the Interop network kicked off with engineers from the participating vendors meeting in person or via audio conferencing. The kick-off meeting starts the long process of designing the Interop network, which will ultimately support tens of thousands of users and devices, both on the expo floor and around the conference. It's a daunting task for seven days of network activity. This year, the goals of the Interop net are to showcase IPv6 support, interoperability among vendors, clo
Fonality Moves UC Dashboard Into Cloud
IP telephony and Unified Communications provider adds Heads Up Display product to its fully hosted suite, with plans for a mobile version later this year.
Broadcom Raises the Bar for CNA Technology
Broadcom recently unveiled the BCM578x0, its latest generation of 10Gbit Ethernet ASICs for LAN-on-Motherboard (LOM) and NIC applications, and the first in a new class of converged network adapters (CNAs), or converged NICs (C-NICs). The new family of ASICs includes several innovations that raise the bar for CNA technology and provide a glimpse at the capabilities of the next generation of high performance Ethernet adapters.
HP Beefs Up Cloud Management Offerings
HP has introduced a package of new service offerings to help business and enterprise customers develop hybrid cloud environments that are a combination of private and public clouds for delivery of IT. An industry analyst says this is one of several moves technology vendors like HP have made to become cloud service providers, thus putting them in competition with the service providers to which they sell their hardware.
NetWitness Adds Automated Malware Analysis To Network Monitoring Platform
NetWitness has introduced an automated malware analysis module to its NextGen network security monitoring and analysis platform. Spectrum combines the platform's network capture/recording capabilities to obtain detailed information on suspect file activity and techniques that malware researchers commonly use in a "sandbox" environment. These capabilities include static analysis to reveal details such as packing, obfuscation, embedded Java scripts, etc., in order to examine the nature of the malw
Cisco Broadens SMB Portfolio
Cisco Systems is building out its small business portfolio, Cisco Small Business, with today's rollout of networking, security and storage products, as well as both service and financing offerings. The products include entry-level Ethernet switches, a network security firewall, backup service for its NSS300 storage products, and a three-year, 3 percent financing package.
New Migration Tool Seeks To Spur Adoption Of Windows 7
More than a year after its introduction, Windows 7 adoption is at only 10 percent in the enterprise market. Prowess, a maker of software to simplify migration, is improving its tools to accomplish increased adoption of Windows 7, even as its CEO expresses skepticism at industry optimism that 2011 may be "The Year of Windows 7."
Give Me Unlimited Data Or Give Me Death
If you haven't seen the latest T-Mobile commercial touting its $10 4G data plans, you should. I won't totally give it away, but it's pretty humorous. The spoken line, "Sometimes you just gotta pay more to be ...slower. It makes sense if you don't think about it," is delivered by the AT&T character in a perfectly monotone, yet arrogant way. The 30-second spot got me wondering just what you actually get for $10 from T-Mobile, and what you might get measured in real applications from other data pla
Cisco Expands SMB Networking, Storage
In partnership with Mozy, the networking provider is offering online backup to small and midsize businesses as well as introducing a managed switch and network security firewall.
New OS33 Software Helps MSPs Deliver Cloud To Their Customers
OS33, a company that bills itself as a cloud-based IT delivery automation platform provider, has introduced SaaS-based software for managed service providers (MSPs) to deliver applications to their customers. The OS33 Cloud Platform includes a WebTop offering that creates a Web-based browser portal for MSPs to provide their customers access to their corporate applications and file systems from any computing device, including Apple iPad and Google Android-based tablet computers. The customers can
Brocade and Dell Enhance iSCSI Storage
Since the introduction of iSCSI storage in 2004, the population of 1Gbit iSCSI storage arrays has grown to comprise almost a third of all disk arrays shipped each year. Connecting servers to all those 1Gbit iSCSI SANs requires only a generic port on a server LAN-on-motherboard (LOM) chip, or 1Gbit Ethernet NIC. No special Ethernet hardware or software is needed because IP networks don't discriminate between NAS/SAN storage traffic and LAN traffic. That's because the iSCSI protocol is transparent
FrontRange Adapts ITSM Tool For SaaS Environments
FrontRange Solutions, which delivers IT service management products to business and enterprise customers, has now adapted its flagship product for software as a service (SaaS) environments. The product, which includes comprehensive service management, service catalog and asset management capabilities, will be the first FrontRange product released under its new SaaSIT brand.
TamoSoft Wi-Fi Tools Worth Looking At
Keeping a critical wireless network up and high-performing takes good design, sound policies and effective tools. Thankfully, Wi-Fi support tools have evolved along with wireless technology, and we have plenty of options to pick from. At the same time, some tools have steep learning curves and big price tags that keep them on the wish list, but out of reach. And then there are tools like those offered by TamoSoft, whose robust feature sets don't cost a fortune or require an engineering degree to
Huawei Comes Out Of Stealth Mode
Known as 'the biggest company you've never heard of', Huawei is taking the wraps off of its 2-year-old presence in North America, with the unveiling of its cloud computing strategy and the opening of an R&D facility. The China-based telecommunications equipment vendor has been averaging annual growth in the 30 percent range, says John Roese, who was recently appointed head of R&D in North America for Huawei.
Symantec Adds VeriSign Services To Protection Center Management Platform
Symantec has announced the integration of VeriSign authentication products into Protection Center, its platform for unified management, intelligence and automation of Symantec and third-party partner security tools. The announcement means that users will be able to manage VeriSign Managed PKI, VeriSign Managed PKI for SSL and VeriSign Identity Protection (VIP) Authentication Service from a single console.
Is NFS A Viable Protocol For Converged Networking?
Last week's "Ethernet Has a Goldilocks Problem" post generated some thought-provoking responses, but one really caught my attention: If we are to suggest that iSCSI is a viable alternative storage protocol for converged networking, where does that leave NFS? After all, storage vendors are increasingly pushing NFS as an alternative to iSCSI for the storage of virtual machine environments. If it's good enough for VMware ESX, doesn't it deserve a place at the adult table when discussing converged n
Talari Takes Big Bite Out Of WAN Costs
The latest addition Talari Networks' Adaptive Private Networking (APN) family, the Mercury T750 appliance, is targeted at midsize enterprises with up to 24 remote sites. Intended for deployment in the data center, and starting at $21,995, the 1U rack-mountable T750 can be used with the company's branch office (T730), SOHO (T200) and data center (T3000) products. The new appliance supports WAN bandwidth aggregation up to 120Mbps downstream and 60Mbps upstream, while doing 128-bit AES encryption.
Announcing Network Computing Pro: For IT, By IT
I am very happy to announce the launch of Network Computing Pro. NWC Pro is a subscription service with access to more than 450 technical analyst reports covering topics in application optimization, cloud computing, data center, storage, virtualization, wireless and more. Written by our cadre of Network Computing real-world experts and InformationWeek Analytics analysts, Network Computing Pro is the ultimate resource for IT, by IT.
F5 Networks Offers Remote Access For Apple Wireless Devices
F5 Networks, an application delivery networking provider, has introduced versions of its Big-IP Edge Client and Big-IP Edge Portal applications that can run on wireless devices from Apple, including the iPhone, iPad and iPod Touch. The applications, which operate on a virtual private network, enable workers to access files and other content on the corporate network remotely, but conform to the security and compliance requirements set for devices that operate behind the firewall.
Cloudy, With A Chance Of Networking
After a busy week of talking with Meraki, Aerohive and startup PowerCloud Systems, my head is spinning a bit after hearing about the cloud-oriented trio's advancements into new niches. Wireless providers are venturing into wired networking, a major acquisition has taken place, and one vendor makes commodity-class hardware compete with enterprise-grade components using a new and interesting approach. The cloud is heating up, and the lines between wireless and wired networking are blurring. If the
PCI To Drive IT Budgets In 2011
A new Payment Card Industry (PCI) survey finds that respondents anticipate significantly increased spending on PCI compliance this year, which should drive security-related budgets across numerous IT areas. The survey of 500 IT executives on what's happening as a result of the recent update to the 5-year-old PCI Data Security Standards (PCI DSS 2.0), conducted by InsightExpress on behalf of Cisco, also found that the majority of respondents believe their organizations are more secure than they w
Pano Logic Raises The VDI Bar
Desktop virtualization specialist Pano Logic is shipping the beta version (4.0) of its Pano System, a zero-client device that supports the three major hypervisor platforms (from VMware, Microsoft and now Citrix). The final version (4.1) will be released at the end of January, according to company officials. The company claims its desktop virtualization approach is unique because it is the only vendor to offer a complete solution that includes the client hardware, software, system management and
Network Error Disables Fire Department
I try not to use this blog simply to indulge in schadenfreude, but I just couldn't resist when I found that the Tokyo Fire Department's emergency call center was down for over four hours on Jan. 5 due to a network error that a few lines in the switch config file could have prevented.
JouleX Updates Software For Emerging ECEM Market
Energy management software maker JouleX is introducing on Monday JouleX Energy Manager (JEM) version 2.5, which helps control energy use within IT systems, and includes the addition of a smartphone application for remote control of those systems. The software product joins a growing market for what the research firm Forrester describes as Enterprise Carbon and Energy Management (ECEM) software.
Ethernet Has A Goldilocks Problem
We're in the midst of a collision between data center networking and enterprise storage. Convergence is the clarion call from the halls of storage giants like EMC, Brocade, NetApp, QLogic and Emulex, as well as from networking powerhouses like Cisco, Intel and Broadcom. Although everyone seems sure that the future will converge on Ethernet, it is not clear how we will get there. Gigabit Ethernet is too slow for converged I/O, and 10Gbit hardware and cabling remains prohibitively expensive. Propo
Cisco 'Outs' Switches From The Closet
Cisco says that freeing data switches from the confines of the enterprise data center/wiring closet is a billion-dollar opportunity. Targeted at a host of new endpoints in customer checkouts, kiosks, warehouses, conference rooms, classrooms, hotel rooms, cruise ship cabins, gaming floors, labs, doctors' offices and call centers, Cisco C-Series Switches are described as the first switches to provide enterprise-class features, including security, Power over Ethernet+ (PoE+) pass-through capability
Sourcefire To Shell Out $21 Million For Immunet
Network intrusion prevention specialist Sourcefire will pay a total of $21 million--$17 million now and $4 million to be paid over the next 18 months upon achievement of product delivery milestones--for Immunet, a developer of cloud-based anti-malware technologies. The acquisition is expected to extend Sourcefire's malware protection to the cloud and provides the company's first endpoint protection offering, according to company officials.
Data Centers: The Next Frontier For WAN Optimizers?
Signs of the increasingly pivotal role that WAN optimization is playing in the enterprise can be seen in the emergence of hybrid cloud architectures within corporate networks. As Mike so poignantly pointed out in his blog, the simple ability to run a VM does not make an application ready for the cloud. If developers are to leverage on-demand services, such as Amazon's EC2, they need to rethink how they architect their software to leverage a hybrid cloud environment.
New Citrix Portal Checks Endpoint Software Configuration
Citrix Systems is introducing the Citrix Endpoint Analysis Portal, which is designed to check desktop computers and other devices for the correct configuration of the software applications they are running. The portal product was developed in partnership with a company called Opswat, which licensed to Citrix its OPSWAT Endpoint Security Integration SDK (OESIS) Framework for ensuring software manageability.
Gartner: WAN Optimization Adapts To New Demands
In its just-released Magic Quadrant for WAN Optimization Controllers (WOCS), Gartner looks at the current state of the WAN optimization market. This Gartner magic quadrant shows a picture of a mature market that is adapting to customer demands, with an increased focus on cloud and data center-to-data center deployments, the consolidation of branch office hardware and increased support for mobile users.
Enterprises Will Tread Cautiously Into VDI In 2011
A new survey shows that many companies are looking into implementing client virtualization--technology that delivers applications to end point computers virtually, rather than from software on a desktop or server. However, the survey says, companies are finding that client virtualization is more complex to implement than they realized, that ROI is difficult to calculate, and that training end users can be a challenge. The survey of IT administrators by enterprise technology provider CDW conclude
Wi-Fi Direct Just Might Kill Bluetooth--Are You OK With That?
In late 2010, I blogged about Wi-Fi Direct's arrival. Though ad hoc wireless networking has been allowed under 802.11 operations since the standard was a baby, it wasn't exactly easy to execute. Now, Wi-Fi Direct puts a friendly face on device-to-device wireless communications, and some predict that it will seriously horn in on Bluetooth's place in the grand scheme of personal connectivity. Wi-Fi Direct has higher speeds and longer ranges than Bluetooth, so it's easy to see why Wi-Fi Direct may
DHS Outlines Critical Infrastructure Protection Plan
The Department of Homeland Security (DHS) plans to ride the momentum of critical infrastructure protection efforts it began last year into 2011. In a blog post, the agency touted some of its accomplishments of the past year and said that the federal government will continue to take steps to protect the electricity grid, power plants and other control systems in the United States as a new year begins. The post comes on the heels of Critical Infrastructure Protection Awareness month, which the age
iPhone Alarm Fix Is Found
Amid silence from Apple, users have taken it upon themselves to develop a workaround for the alarm glitch that plagued iPhone 4.
HP Refreshes Mid-Range Thin Clients
Hewlett-Packard is announcing a refresh of its mid-range thin client portfolio, due to start shipping next week. The line of t5500s (t5550, t5565 and t5570) lowers the entry point to $249 and provides easier deployment. The company, which already dominates this market, according to IDC's "Q310 Enterprise Client Device Tracker," says that its new products provide significantly improved performance, a wireless option and the ability to support new capabilities such as Citrix HDX. The latter provi
My Five 2011 Predictions
What's going to happen in 2011? First, we'll continue to see some cool technology and use cases in cloud computing and unified communications, but I think adoption of both will be slower than expected. We will also start to see more about Fiber Channel over Ethernet (FCoE) standards compliance and interoperation, particularly with FCoE and multipath routing protocols like Transparent Interconnection of Lots of Links (TRILL) and Short Path Bridging, though I am not convinced that the networking i
Android Phones Targeted By Trojan
A new Android Trojan that displays some botnet characteristics has emerged from China, Lookout Mobile Security warns. Called Geinimi, the malware can compromise a significant amount of information on a user's Android smartphone and send it to remote servers, the security developer said in a blog. Once installed on the phone, it could allow the server's owner to control the mobile device, says Lookout.