Get in touch
Maintaining VLAN Business Intent Across the WAN
/ Dec 21, 2015
VLANs (Virtual LANs) are a staple of enterprise networking — administrators ...
So Which Is It: NFV or NSV?
/ Sep 17, 2015
Because I am sensitive to the fact that I am a recovering academic I am hesitant to get drawn into any “How many angels can dance on the head of a needle”-type discussions. Recently, ...
It’s Time For Network Engineers to Give Up Their “Sine Qua Non”
/ Apr 28, 2015
In the final 2009 season of the TV series Battlestar Galactica (the greatest show in history of TV), Admiral William Adama decides to let the fleet jump away and continue the search for ...
13½ Interesting Questions about SD-WAN
/ Apr 2, 2015
Ethan Banks raised some thought provoking questions around SD-WAN on his blog. Here’s our response to those questions. 1) What’s the impact to hosts on virtual machine based endpoints, ...
It’s The Software, Stupid! But Also The Hardware And ASICs
/ Feb 25, 2015
The mania around software is at an all-time high. Everyone is a software vendor and it seems no one wants to be in the hardware business anymore. Software is the new, sexy item and ...
Extending VMware vSphere 6 Replication over the WAN
/ Feb 3, 2015
Data protection is essential for business continuity and disaster recovery, and that includes the protection of virtual machines (VMs). Today at VMware Partner Exchange 2015, Silver ...
The IoT is About New Experiences, Not Just Connected Things
/ Jan 6, 2015
2014 was a big year for the Internet of Things (IoT). Much of the focus of IoT has been on the topic of connected things. I actually wrote about connected devices in this blog on five ...
Understanding Service Chaining
/ Dec 15, 2014
One of the emerging topics of conversation related to Software-Defined Networking (SDN) has been something called “service chaining”. The topic has gotten a fair bit of media focus of ...
The Growing Need For Intelligent Workload Management
/ Dec 11, 2014
Life used to be so good. An operating system was loaded onto a server of some sort and an application stack loaded on top of that. Provided the workload remained pretty static, the ...
Mobile Security Strategy Shift: Wrap The App
/ Nov 24, 2014
With the fast growth in mobile devices being used to access corporate applications and data, board-level GRC (governance, risk & compliance) requirements for mobile security need to ...
Is Software-Defined Storage A Solution In Search Of A Problem?
/ Nov 20, 2014
Software-defined storage, or SDS, seems such a great idea. After all, when we are faced by a new project most of us still think in terms of how many drives to buy for it, yet the fact ...
Connect With Us
Tweets by @SilverPeak
Call us at +1 408 935 1800 or send us an
© 2015 Silver Peak, Inc. All rights reserved.
To the Top