Skip to main content

WAN Optimization: NetEx teams up with VMware with its HyperIP

HyperIP for VMware is also the first software-only release of the product by NetEx, which also offers HyperIP in an appliance configuration running on industry-standard hardware. One of the key competitive advantages of HyperIP is the software-focused design even in the appliance version that provides unmatched flexibility in deployment and performance scalability. Competitive products, such as those from Riverbed, Silver Peak Systems and F5 Networks, use a hardware-based architecture, locking customers into a proprietary hardware platform with limited performance scalability, and precluding their use in virtualized hardware environments such as VMware ESX. With HyperIP for VMware customers have the freedom to deploy high-performance software-based WAN optimization on their preferred hardware platform with the ability to scale the performance up to 600x with no hardware upgrades.

Staging WAN optimization on a VMware virtual machine is the latest breakthrough that once again demonstrates NetEx's market leadership and HyperIP's design superiority, said Diamond Lauffin, President of the Lauffin Group and a consultant to NetEx. Infrastructure virtualization is no longer a trend, but a business imperative to control IT costs in several areas. Applications and technologies that can't compete in a virtualized world will quickly be kicked to the sidelines in favor of more versatile and advanced technologies such as HyperIP for VMware.

Configuring HyperIP software with VMware ESX server provides our customers with significant flexibility when implementing their WAN optimization strategies, said Rod Lucero, Chief Technology Officer at VMpowered, a St. Paul, Minn.-based integrator specializing in virtualization solutions. This helps customers further leverage their VMware investments, and reduces the number of special-purpose appliances in their network.


Press Release

NetEx can be reached here.

Comments

Popular posts from this blog

DeepLearningTrucker Part 1

Avastu Blog is migrating to IdeationCloud.com; 1st Jan 2009 live

YOU DON'T HAVE TO DO ANYTHING. WITHIN 2 SECONDS YOU WILL BE REDIRECTED TO THE NEW HOME OF AVASTU BLOG. PLEASE DO UPDATE AVASTU BLOG'S URL to : http://www.ideationcloud.com on your website.

I will send out emails personally to those who are using my link(s) on their sites.

Thanks much for your co-operation and hope you enjoy the new site and its cool new features :-)




Not like the site is unlive or something..on the contrary, its beginning to get a lot of attention already. Well most of the work is done, you don't have to worry about anything though:

What won't change

Links/Referrals: I will be redirecting the links (all links which you may have cross-posted) to IdeationCloud.com - so you don't have to do anything in all your posts and links. Although, I would urge however that you do change the permalinks, especially on your blogs etc yourselfThis blog is not going away anywhere but within a few months, I will consider discontinuing its usage. I won't obviously do …

Cloud Security: Eliminate humans from the "Information Supply Chain on the Web"

My upcoming article, part - 3 data center predictions for 2009, has a slideshot talking about the transition from the current age to the cloud computing age to eventually the ideation age- the age where you will have clouds that will emote but they will have no internal employees.

Biggest management disasters occur because internal folks are making a mess of the playground.

Om's blog is carrying an article about Cloud security and it is rather direct but also makes a lot of sense:

I don’t believe that clouds themselves will cause the security breaches and data theft they anticipate; in many ways, clouds will result in better security. Here’s why: Fewer humans –Most computer breaches are the result of human error; only 20-40 percent stem from technical malfunctions. Cloud operators that want to be profitable take humans out of the loop whenever possible.Better tools – Clouds can afford high-end data protection and security monitoring tools, as well as the experts to run them. I trust…