Lippis Report 184: Network Services to Differentiate Next Generation of Campus Core Switches

January 9th, 2012

During the middle of 2012, a few firms will introduce core switches for campus networking. Many of these products will be based upon merchant silicon such as HP Networking’s A10500 Series Enterprise Core Switch. While these products will boast performance advantage, they will find it difficult to win share against established firms such as Cisco’s Catalyst 6500, thanks to its investment in network services. In this Lippis Report Research Note 184, we explore the importance of network services and their role in campus network design.

Read the rest of this entry »

HP Networking Nearly 2 Years After 3Com Acquisition: What A Disappointment

Listen to the Podcast

August 23rd, 2011

On Tuesday Auguest 16th a week before HP’s news of potentially exiting the PC business, Zeus Kerravala, Senior VP of Research at the Yankee Group and Andre Kindness Senior Analyst at Forrester Research joined me in a round table discussion to reflect on HP Networking. We assess HP Networking’s progress since it announced the acquisition of 3Com back in Nov of 2009 and its prospects for the future. In a word our mutual assessment is disappointment with major short and long-term threats from Huawei. But there is hope for the future if HP can create a bold new vision for the industry and execute it. If you are going to listen to one podcast this year about HP, this should be it.

Access Control Security Best Practices for the HP Wired Infrastructure

Get the White Paper

November 1st, 2010

By HP Networking

Securing your LAN network infrastructure is challenging. Factors such as cost, network instability, risk of breach and ease of implementation all play an equal part in making the right decision to retrofit an insecure, albeit functional, LAN. This white paper outlines approaches to securing the network that we, at HP, know work, in addition to providing information about what we know does not work. Getting all of the correct pieces to fit together is not so easy, so we have also provided the necessary configuration specifics to help with securing some of those devices connected to your network that you may have forgotten about, such as network printers, VoIP phones and security cameras.

Find out how by downloading this white paper:

HP’s Networking Vision

Listen to the Podcast

October 5th, 2010

Saar Before HP purchased 3Com it would seldom engage in discussion about the future of networking. It was product focused. But now in an exclusive interview with Mr. Saar Gillai, Vice President of Advanced Technology Group & CTO of HP Networking, HP opens up and talks freely about industry trends it’s watching and most importantly influencing. These trends are guiding HP investment in networking with hopes of market share gain, thought leadership and increased industry influence. It’s a fascinating interview into the mind of HP Networking.

Lippis Report 157: The Problem with Application Delivery Appliances

September 22nd, 2010

Major IT Delivery Transitions IT Business Leaders Are Managing
Application owners and developers have been deploying and writing applications as if networks had no boundaries or were borderless. By “application owners” I mean IT departments chartered with IT application delivery and management. By “application developers” I mean in-house corporate software developers, independent software vendors (or ISVs) and software companies. There has always been a disconnect between applications and network architects where developers write applications to run over a network as long as there is connectivity. In addition, service-oriented architecture (SOA) based applications call for greater application componentization, which increases messaging between application components, resulting in the network having a direct impact on application performance. In essence, application owners, developers and application standard bodies assume that networks are borderless as the industry is organized around the OSI model where knowledge and skills at one layer, e.g., the network is not necessarily taken into account at another layer, i.e., the application. Therefore, the normal state of affairs is that network designers have been tasked to optimize applications to improve user experience especially when the application was not written to run over a particular kind of network. This status quo does not scale and needs to be re-thought.

Read the rest of this entry »

HP’s Intensified Networking & Communications Focus Explained

Listen to the Podcast

September 13th, 2010

Marius HaasI interview Marius Haas, Senior Vice President and World Wide General Manager of the HP Networking Business. I asked him

• How HP will compete in the highly competitive networking market,
• What is its salient value proposition,
• Why is HP so focused on networking now, and
• Why should IT business leaders consider HP Networking.
His responses had a ring of market truth to them. As such, any IT business leader worth his/her salt needs to listen to this podcast.

Enjoy, Nick

Lippis Report 156: Why We Are Entering The Age of Borderless Networking

September 9th, 2010

nicklippis.jpgNetworking is entering a new phase or era. During the 1990s, new networking markets opened up, creating multi-billion dollar opportunities for the vendor community and corporate cost savings for IT business leaders. First, it was shared LANs and routing, then switched LANs, then Frame Relay to speed up WANs, then SNA over IP, then remote access via dial-up and VPN, then MPLS, then IP telephony, then Wireless LANs etc… and now, it’s video and cloud networking. You get the picture. But what we didn’t realize as we build these networks is that they are silos with disparate management systems and unique access methods resulting in operational cost overlap and, most importantly, user frustration as they transition application use from desktop, to mobile end point, to remote endpoint. In short, we built boundaries around applications in the form of networks and it is the dismantling of these borders that vendors are now starting to deliver and differentiate upon. It’s not just Cisco that communicates borderless networks, but HP Networking, Juniper, Brocade, Extreme, Avaya, Force10 and others too. Why is the industry entering a new age of borderless networking and what’s in it for IT business leaders, is explained in this Lippis Report Research Note.
Read the rest of this entry »

Lippis Report 155: The Two-Tier High-End Data Center Ethernet Fabric Network Gains Steam

August 24th, 2010

nicklippis.jpgIt hasn’t been since the mid 1990s that the networking industry was focused on multi-protocol integration or convergence. But the industry is gearing up for a major innovation and competitive cycle fueled by the multi-billion dollar addressable market for data center network fabrics. Over the last eighteen months, every major Ethernet infrastructure provider has been talking about two and three tier network fabrics for high-end data centers.

Companies such as Cisco, Arista Networks, HP/3Com, Force10, Voltaire, Extreme, Brocade, Juniper et al have announced network fabrics for data centers with five thousand and more servers with and without storage enablement. Juniper talks of a one-tier fabric through their Project Stratus work with IBM to be available some time in the future. Brocade recently introduced its Brocade One, which is a converged data center fabric. Extreme Networks launched its DirectAttachTM that eliminates virtual plus blade switch layers. HP has FlexFabric, a virtualized fabric for the data center. Cisco launched its FabricPath Switching System or FSS for the Nexus 7000 that enables massive scale of a two-tier fabric.

In this Lippis Report Research Note, we review the architectural attributes of two tier network fabrics.

Read the rest of this entry »

Improved Network Security with IP and DNS Reputation

Get the White Paper

August 10th, 2010

By HP Networking

As cyber threats across the globe continue to increase in number and sophistication, security and networking personnel must not only work harder but also smarter to stay ahead of malicious attacks. Sophisticated scanning, penetrating, and obfuscating tools and techniques are more widely available now more than ever before. Worst of all, hackers are now highly motivated to penetrate networks, applications, and databases to steal information that can quickly be sold for profit using botnets and other resources
they control.

To learn how to defend IT assets and business reputation by download this paper from HP Networking.

HP FlexFabric Virtualize network connections and capacity From the edge to the core An HP Converged Infrastructure innovation primer

Get the White Paper

August 10th, 2010

By HP Networking

The fundamental nature of data center computing is rapidly changing. The traditional model of separately provisioned and maintained server, storage, and network resources are constraining data center agility and pushing budget envelopes to the limit. IT organizations recognize that these static pools of isolated resources are being underutilized, a problem that can be exacerbated when dedicated infrastructure or computer systems are used to support different classes of data center workloads. One response has been for IT organizations to adopt virtualization and blade technologies, which enable a more flexible and highly utilized infrastructure. These new, more scalable technologies can be dynamically provisioned to meet continuously evolving business requirements. At the same time, these technologies apply new pressures to the multiple networks in the data center, further worsening spend issues. And it increases the burden on the IT teams that support them.

Learn how to avoid these data center problems with HP FlexFabric by downloading this white paper: