Apstra comes out of stealth, solves the multi-vendor SDN challenge

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Virtualization Alert

Jul 04, 2016
Featured Image

IBM and Cisco will make Watson into a virtual workmate

Watson might schedule your meetings someday if a partnership between IBM and Cisco Systems bears the fruit they’re hoping to grow. In the meantime, the companies hope to save employees from some of the meaningless tasks they have to carry out just to work with their colleagues. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Apstra comes out of stealth, solves the multi-vendor SDN challenge
The case for WAN acceleration as NFV
The allure of free storage with FormationOne
Cloud computing slows energy demand, U.S. says
Firmware exploit can defeat new Windows security features on Lenovo ThinkPads
Quick look: Cisco Tetration Analytics
Is network fabric heading down the same path as ‘software defined’ and ‘stacking’?
Y Combinator wants to build a tech city, too
Reports of Google building a phone are preposterous

eBook: Sqrrl

Cyber Threat Hunting eBook: What Security Execs Need To Know

Cyber threat hunting is the proactive, iterative search for advanced cyber threats that have evaded your other defenses. In this ebook you will learn about threat hunting benefits, frameworks, and best practices. Read More

Thumbnail Image

Apstra comes out of stealth, solves the multi-vendor SDN challenge

Apstra’s vendor-agnostic, data center management system delivers on the vision of software-defined networking (SDN) without the associated risks. Read More

Thumbnail Image

The case for WAN acceleration as NFV

WAN optimization might not be ideal as a service, but it is suited for network function virtualization. Read More

Thumbnail Image

The allure of free storage with FormationOne

Virtual Storage Recapture allows enterprises to recapture unused storage in their virtualized server environments. Read More

Thumbnail Image

Cloud computing slows energy demand, U.S. says

In recent years, power usage at data centers grew at an unsustainable rate, soaring 24% from 2005 to 2010. But a shift to virtualization, cloud computing and improved data center management is reducing energy demand. Read More

Thumbnail Image

Firmware exploit can defeat new Windows security features on Lenovo ThinkPads

A newly released UEFI exploit for Lenovo ThinkPad laptops could disable low-level Windows security features like Secure Boot, Virtual Secure Mode and Credential Guard. Read More

Thumbnail Image

Quick look: Cisco Tetration Analytics

The system promises to give IT managers a deeper understanding of their data center resources as well as simplify operational reliability, application migrations to SDN and the cloud as well as security montoring. Read More

Thumbnail Image

Is network fabric heading down the same path as ‘software defined’ and ‘stacking’?

Vendors are stretching the definition of a fabric, which has the potential to cause confusion and slow down both SDN and fabric deployments. Read More

Thumbnail Image

Y Combinator wants to build a tech city, too

Forget wearables, virtual reality and driverless cars. The hottest new tech product is entire cities. Y Combinator is the latest to explore creating a city. Read More

Thumbnail Image

Reports of Google building a phone are preposterous

Google’s Daydream virtual reality platform and DARPA, not a phone, have everything to do with the company’s future. Read More

White Paper: Sqrrl

Threat Hunting Platform White Paper

Threat Hunting Platforms are new critical tool for Security Operations Centers. This whitepaper describes what a Threat Hunting Platform is and how it complements your existing SIEM deployment. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

The 10 most powerful supercomputers in the world

20 highest paid tech CEOs Read More

Most-Read Stories

1. Chuck Robbins sets Cisco up to take off
2. 30 days in a terminal: Day 10 — The experiment is over
3. Microsoft ends its deceptive Windows 10 upgrades
4. Apple sued for $10 billion for 'stealing' his iPhone invention from 1992
5. Latest iPhone 7 rumor shows Apple is getting serious about storage
6. 19 free cloud storage options
7. Kaspersky: Ransomware that encrypts is booming
8. 11 ways to fight off ransomware
9. Terrorism database of 2.2 million people leaked
10. Avaya’s edge network adapter is an IoT onramp
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Virtualization Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.