This month we were thrilled to announce a new addition to the Plexxi team – Denis Vilfort, our new VP of marketing. With more than 20 years of technology experience, Denis will help amplify the Plexxi HCN message and support the company as we continue to break new ground in networking for the next generation of cloud computing.
Denis brings a rich background in IoT, servers, networks, storage and system architectures, and has held leadership roles at OptumSoft, as well as Dell EMC, and Sun Microsystems. We’re excited about Denis’ vision for Plexxi HCN and the future of cloud computing, and are happy to have him on board.
For more details on this news, click here.
Below please find a few of our top picks for our favorite news articles of the week.
Network World: Why hybrid cloud will turn out to be a transition strategy
By Fredric Paul
As the cloud world gears up for this week’s big AWS re:Invent 2017 cloud computing conference in Las Vegas, it seems like a good time to take look at the future of hybrid cloud. Defined as a computing architecture that — in one way or another — incorporates elements of both the public cloud and private on-premise data centers, hybrid cloud is currently having a moment. As vendors such as Microsoft, Google, and Cisco scramble to offer specific hybrid-cloud solutions, many observers are calling hybrid cloud the best of both worlds, offering the scalability and flexibility of the public cloud along with the security and control associated with on-premise infrastructures.
CIO: The Ins and Outs of Micro-Segmentation
By Tempered Networks
Security and networking professionals are getting excited by vendor promises that software defined networks and network virtualization enable micro-segmentation of network resources to block unwanted traffic from transiting sensitive enterprise assets. A crucial failure of traditional enterprise networking is that once an intruder gains access at any point, they are able to move laterally to other hosts within that network. IT and data security architects attempt to limit the potential damage by splitting the network into logical segments – IP subnets – and limiting access through use of firewalls and virtual LANs.
What do you think? Share your opinions about these stories with us on Twitter.