Drew Conry-Murray, blogging in Packet Pushers, discussed Citrix's release of a free load balancer software package,...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
aimed at luring developers away from open-source options like HAProxy. The free load balancer is called CPX Express and offers a limited version of Citrix CPX -- which is itself a container-based version of Citrix NetScaler ADC. Both CPX and the CPX Express free load balancer are intended for container-based applications and microservices.
According to Conry-Murray, Citrix hopes to influence developers to adopt CPX for DevOps by offering a free version. The free load balancer has lower throughput (20 Mbps versus 1 Gbps) as well as throttled-down, packet-per-second, SSL connectivity and throughput. Conry-Murray added that Citrix categorizes its potential customers three ways, grouping DevOps, traditional IT departments and developers separately.
Read more of Conry-Murray's thoughts on the free load balancer.
Nutanix pursues buying spree
Terri McClure, an analyst with Enterprise Strategy Group in Milford, Mass., explored Nutanix's ongoing acquisition of PernixData and Calm.io. McClure quotes a fellow ESG researcher, Mark Peters, who believes that IT has shifted from meaning "information technology" to "infrastructure technology."
In McClure's view, the ongoing need to understand the entire IT stack-- including infrastructure, applications, workloads and resource availability,--is driving Nutanix's thinking. Acquiring Pernix gives Nutanix greater capabilities in the IO stack and IO analytics. Similarly, the purchase of Calm.io gives Nutanix resource allocation and automation capabilities.
Explore more of McClure's thoughts on Nutanix.
Gartner makes cybersecurity predictions
John Wheeler, an analyst at Gartner, offered cybersecurity predictions during a presentation in Johannesburg, South Africa. Wheeler believes that through 2020, 99% of exploited vulnerabilities will be known by cybersecurity professionals for at least a year. A third of enterprise attacks will target shadow IT and by 2018, preventing data breaches in the cloud will spur 20% of organizations to adopt data governance programs. By 2020, 40% of DevOps organizations will use application security self-testing and 80% of deals for cloud access security broker technology will be bundled with secure web gateways and network firewalls.
Wheeler said that by 2018 and 2019, 40% of IDaaS implementations will take the place of on-premises IAM; password use in medium-risk cases will drop 55% and 50% of IoT device makers will struggle with weak authentication. Finally, he said that by 2018, up to 60% of enterprises will use native mobile containment and by 2020 25% of enterprise attacks will involve internet of things devices.
Learn more about Wheeler's predictions.
University takes advantage of load balancing
Hyper-converged infrastructure offers great opportunities
Reducing attacks with a cybersecurity checklist