byac02-23-200912:32 PM - edited 02-24-200901:24 AM
As you may have already noticed, we have rolled out a new site skin
for J-Net today. This is to coincide with the launch of the new
Juniper.net website. This redesign is wide ranging and includes not
only changes to the Juniper branding, but also an entirely new web
infrastructure, new content, multimedia and resources. We've also used
this opportunity to make a few changes to content organization in J-Net
in order to better match the taxonomy on the new website.
Changes made today include:
1. We are pleased to announce the launch of two new company blogs in the new blogs category:
The Network Ahead - Juniper executives on topics from cloud computing to economics and green IT.
of the old community content in areas moved will remain archived and
URLs to the original content pages will remain unchanged.
hope you enjoy the new look and feel we've implemented in our
community. Please do not hesitate to leave a comment or send me a
private message if you have any questions or comments about the these
Douglas Richard Hanks Jr. is a Director of Product Management with Juniper Networks and focuses on solution architecture. He is certified with Juniper Networks as JNCIE-ENT #213 and JNCIE-SP #875.
Douglas’ interests are network engineering and architecture for enterprise and service provider technologies. He is the author of the Juniper MX Series book by O'Reilly Media and several Day One books published by Juniper Networks Books. Douglas is also the co-founder of the Bay Area Juniper Users Group (BAJUG).
Douglas can be reached on Twitter @douglashanksjr.
Lisa Lorenzin is a Principal Solutions Architect with Juniper Networks, specializing in security and mobility solutions, and a contributing member of Trusted Network Connect, a work group of the Trusted Computing Group that defines an open architecture and standards for endpoint integrity and network security. She has worked in a variety of Internet-related roles since 1994, with more than a decade of that focused on network and information security, and is currently concentrating on enterprise security including network segmentation, end-to-end identity-based access control, and integration of mobile security.