Issue OverviewNetwork Evolution - November 2010 Vol. 1, No. 1
This issue of the Network Evolution E-Zine will cover the road to flat Data Center network architecture. Learn about how to design a high-performance network with virtualization in mind. We'll help you understand virtualization security, virtual cluster switching, and more. Get your biggest ATA over Ethernet questions answered, and find out if it's a good solution for converged data center networks. We'll help you weed through the vendor hype, and explore ways to build a flatter converged data center network. Finally, read a case study about The New Mexico Human Services Department, and how they implemented a virtualization security plan that had all core applications running on virtual machines. Access >>>
Premium Content for Free.
ATA over Ethernet for converged data center networks? No way
ATA over Ethernet is pitched as a solution for converged data center networks, but ATAoE has a host of technology shortcomings, including a lack of packet loss recovery and shaky security, according to Fast Packet blogger Ivan Pepelnjak. So why bother?
Virtual cluster switching: Finding management in a flat network
by Michael Brandenburg
Using virtual cluster switching, the UCLA Laboratory of Neuro Imaging manages dozens of switches as one switch in a flat Layer 2 network for high-performance computing.
- ATA over Ethernet for converged data center networks? No way
Navigating the road to flatter, converged data center networks
by Shamus McGillicuddy
IT professionals explore the process of building converged data center networks based on expectations of vendors’ promises, as well as their reservations, the benefits and technicalities of this technology.
- Navigating the road to flatter, converged data center networks by Shamus McGillicuddy
Virtualization security plan: Replacing physical separation
by Rivka Gewirtz Little
The New Mexico Human Services Department implemented a virtualization security plan that ensures security of core applications running on virtual machines.
- Virtualization security plan: Replacing physical separation by Rivka Gewirtz Little
More Premium Content Accessible For Free
Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...
The average person carries three mobile devices, according to an informal poll conducted last year by Sophos Labs. While Kindles and Fitbits probably...
More -- and more complex -- mobile devices are jumping on your enterprise network, gobbling up bandwidth from the WLAN infrastructure. This technical...