Cisco WebEx products, it offers real-time collaboration tools, including document, application, and desktop sharing, annotation tools, full host control for effective meeting management, an integrated participant list with active talker, and video switching, recording and playback.
You can deploy and manage Webex conferencing solution in private cloud, behind the firewall in your data center. It is designed for Cisco UCS servers and VMware vSphere.
Network virtualization platform NSX and Software Defined Data Center architecture
IT organizations have gained significant benefits as a direct result of server virtualization. Server consolidation reduced physical complexity, increased operational efficiency and the ability to dynamically re-purpose underlying resources to quickly and optimally meet the needs of increasingly dynamic business applications.
VMware’s Software Defined Data Center (SDDC) architecture is now extending virtualization technologies across the entire physical data center infrastructure. VMware NSX, the network virtualization platform, is a key product in the SDDC architecture. With NSX, virtualization delivers for networking what it has already delivered for compute and storage
For many times my students asked me for the possibility to host (run) mac os on intel processor and/or hyper visor. to get familiar with os setting on their lab environments
the answer was Yes.
I have installed before (Leopard, Mountain Lion, El Capitan and Sierra) in my lab in order to give my students the opportunity to get familiar with macOS X and gain hands on experience.
This time I decided to post and share with you the installation steps for macOS on a VM and the initial configuration
Arista Networks was founded to deliver software defined cloud networking solutions for large data center and high-performance computing environments.
Consolidation of what was traditionally three-tier Core/Aggregation/Access designs into two-tier Spine/Leaf designs; fewer tiers decrease cost, complexity, cabling and power/heat.
Forefront TMG protect your system from flood attack, flood attack are attempts by malicious users to attack a network, by http denial of service attack, SYN attack, worm propagation.
The default TMG configuration setting for flood mitigation set to ensure that Forefront TMG can continue to function under a flood attack; there are some actions you can take during an attack that can further mitigate its effect.