Recently, Juniper’s been “straight talking” a lot about automation tools, orchestration plugins, open source consortiums, ecosystem partnerships and, of course, software-defined networking. All of this activity (and the various acronyms that go along
If you’ve been in the networking industry as long as I have, you’ve no doubt been in conversations kicking around the idea of Packet-Optical Convergence many times over the years. The hope for lower cost structures (capex and more importantly operational costs), collapsing layers, a common control plane, high performance and resiliency, and common management all fuel the business case and desire to see it happen. Bu
A recent edition of the UK The Economist had an interesting article called “The Server Market; Shifting Sands”. What the article highlighted was the fragile and fluid nature of the global server market. What stands out in the article is the decline in server revenue for the two leading server manufacturers HP and IBM when comparing Q1 2013 to Q1 2012 ($3.0 B down from $3.5 B). What is surprising is the declines are
The networking industry has become more competitive each year; additionally the demands by service providers and enterprises are rapidly increasing to satisfy the needs for advanced applications and services. It’s critical we prepare customers with networking platforms that enable their business to scale and evolve with the ever changing world not only opens up new revenue options but also gives organizations the ag
The other day my daughter asked me what I did for a living. It had been a particularly challenging day so my immediate response was “TROUBLESHOOTING” (yes – in a loud voice!). Those of you who work on networks know troubleshooting skills are critical; the ability to address problems on the network quickly and effectively ensures smoother and more profitable operations. Juniper is pleased to introduce a series of c
There’s no single solution that’s going to resolve all your security woes and, therefore, the best defense remains a layered defense. And better security intelligence and attacker identification can add important new layers to protect your data center.
Juniper recently launched the next version of its security management offering, Junos Space Security Director. When we talk to our customers about what they expect from such a product, we hear time and time again that what matters most to them is:
1) Security management is easy, not burdensome
2) Security management shouldn’t hinder business operations
Juniper Networks is strongly committed to the US Department of Defense Unified Capabilities Approved Product List (UC APL) certification process. Recently, I blogged about MX certifications, today I am blogging about the most recent completion of EX family certifications.
Recently, Juniper’s been “straight talking” a lot about automation tools, orchestration plugins, open source consortiums, ecosystem partnerships and, of course, software-defined networking. All of this activity (and the various acronyms that go along with it) is enough to make even a seasoned networking expert’s head spin.
The other day, in between meetings, I headed to the break room. Usually in a rush, I typically grab a coffee and head back to my desk for the next meeting. But this time, something stopped me right in my tracks.
Whenever I interview a candidate for a role in the company I work at, the very first question I ask them is how much they know about the company they are looking to join.
The purpose of that question is twofold. Firstly, have they done their research, their data gathering? Then, have they synthesized that data into information and opinion about the company and its role, offers and business etc. Key here is that t
Network access control (NAC) as we used to know it is dead.
Conceived and delivered nearly a decade ago, NAC was positioned as the next great hope for network security. NAC was going to address any and all aspects of network security. In its halcyon days, NAC was hyped – and in many cases over-hyped – as a sort of panacea for all that ailed network security. Many believed that NAC was going to generate hundreds of