VergeIO enhances VergeFabric network virtualization offering

VergeIO enhances VergeFabric network virtualization offering

VergeIO is not, however, using an off-the-shelf version of KVM. Rather, it is using what Crump referred to as a heavily modified KVM hypervisor base, with significant proprietary enhancements while still maintaining connections to the open-source community. VergeIO’s deployment profile is currently 70% on premises and about 30% via bare-metal service providers, with a particularly strong following among cloud service providers that host applications for their customers. The software requires direct hardware access due to…

Read More

Leading the Charge: Delaware State University's Digital Evolution

Leading the Charge: Delaware State University's Digital Evolution

Picture a university where the digital landscape is as dynamic as the students it serves—where every classroom is a gateway to global learning and every network is a fortress of security. At Delaware State University (DSU), this is not merely a dream but a realized vision, thanks to a bold digital transformation and a strategic partnership with Cisco. Overcoming Initial Challenges When Darrell McMillon joined DSU in 2020 as the Vice President and CIO, he…

Read More

Intel taps semiconductor veteran Lip-Bu Tan as new CEO

Intel taps semiconductor veteran Lip-Bu Tan as new CEO

“This is welcome news for Intel Corporation, as it appoints an industry veteran that has intrinsic understanding of the semiconductor industry, both from a product design aspect as well as the needs of enabling chip manufacturing – an area that Intel Foundry needs help in making their tools more user friendly and accessible for potential customers,” said Jack Gold, president of J.Gold Associates. “I think he understands the business well,” said Alvin Nguyen, senior analyst…

Read More

Chinese cyberespionage group deploys custom backdoors on Juniper routers

Chinese cyberespionage group deploys custom backdoors on Juniper routers

Junos OS provides administrators with a custom command-line interface (CLI) that allows issuing Junos specific commands, but also the ability to switch to the underlying FreeBSD shell and use the general FreeBSD command-line tools and programs. The OS also implements a modified variant of the NetBSD Verified Exec (veriexec), a kernel-based file integrity verification subsystem whose goal is to protect against the execution of unauthorized binaries. As such, deploying and running any malware implant requires…

Read More

Arista delivers intelligent load balancing, AI job-centric observability

Arista delivers intelligent load balancing, AI job-centric observability

The other key feature of CLB is that it is GPU- and NIC-agnostic – CLB ensures balanced utilization, Bhaidasna said. Updates to Arista CloudVision platform To help enterprises manage AI and networking environments, Arista added AI job-centric observability for greater troubleshooting to its CloudVision Universal Network Observability (CV UNO) system. CV UNO is a licensed component of Arista’s CloudVision as-a-service platform. It’s designed to gather network telemetry and analytical data and meld it with AI…

Read More

How the Pittsburgh Steelers leverage the Fortinet Security Fabric for industry-leading defense

How the Pittsburgh Steelers leverage the Fortinet Security Fabric for industry-leading defense

The Pittsburgh Steelers are one of the most recognizable American football teams, with tens of millions of fans tuning into games and a busy stadium that can hold more than 68,000 fans. To support such a successful and popular franchise, the Steelers require cutting-edge technology to ensure everyone using their network, including fans, coaches, and the back office, has a fast, seamless, and secure experience. The Steelers have worked with Fortinet for more than 15…

Read More

Cato Networks unveils next-gen firewall

Cato Networks unveils next-gen firewall

The Cato LAN NGFW requires no additional hardware and converges all firewalls from the internet, site-to-site, and within the LAN to simplify policy management and deliver consistent enforcement via a security engine. The centralized policy management eases the burden of configuring separate firewalls across locations because it allows everything to be managed from one console, according to Cato. The NGFW also enables enterprises to meet compliance requirements for localized traffic control and enforce security policies…

Read More

At long last, OpenStack (now known as OpenInfra Foundation) joins Linux Foundation

At long last, OpenStack (now known as OpenInfra Foundation) joins Linux Foundation

“Open source has changed a lot, and what a project needs out of a foundation in 2025 is quite different from what a project needed in 2010 or 2012 when we were starting the OpenStack foundation,” Bryce said. “Governments are very interested in open source, and we have to make sure that we are participating in the right way to understand and comply with policies.” The Linux Foundation has had multiple efforts in recent years…

Read More

The Quantum Sky Is Falling! Understanding the Quantum Threat to Network Security

The Quantum Sky Is Falling! Understanding the Quantum Threat to Network Security

Confidentiality is a fundamental pillar of information security. In sensitive deployments, such as those involving federal governments, military and defense agencies, and large financial institutions, the demand for confidentiality extends well beyond the typical 5 to 10 years, often reaching 20 years or more. The same also applies to telecom operators and enterprises providing services to any of these critical agencies. With the existing classical computers, this requirement of forward secrecy for encryption could be…

Read More

Join us in the Cisco U. Spotlight

Join us in the Cisco U. Spotlight

I’m excited to announce that Cisco U. Spotlight is back and brighter than ever. It all starts April 24, 2025, at 8:30 a.m. Pacific Time. And it’s free! Join leading minds in leading technologies Amp up your tech knowledge with the best and brightest industry leaders as they illuminate your path to learning in key technologies like network modernization, security, AI, observability, and more. Plus, learn what’s possible when you unlock the transformative power of…

Read More
1 95 96 97 98 99 1,495