Impressions from a Business Seminar in Vienna: Freezing Outside, Hot Inside! A couple of weeks ago, during part of my European business travel to visit our customers, I had the privilege… Nir Ilani | February 12, 2012
Lesson Learned: ISPs & CDNs aren’t enough for Anti-DDoS Well, I suppose that many in the Hacktivist world have resolved that 2012 would be a ‘breakout’ year for them… Carl Herberger | January 18, 2012
Our Next-Generation ADC Rocks! (or so our customers say…) Several weeks ago I returned from a business trip to Europe, in which I met with customers and new prospects… Nir Ilani | December 29, 2011
Mobile Data Growth Drives the Standardization on Diameter As mobile data and the demand for extensive bandwidth-hungry content and applications continues to grow, service providers are forced to… Nir Ilani | December 12, 2011
Cyber Monday Survival Tips for eRetailers: Ensuring Network and Application Availability and Guaranteeing High QoE With Thanksgiving right around the corner, businesses everywhere are readying themselves for the post-holiday shopping blitz. And with the National… Nir Ilani | November 22, 2011
To LSN or Not to LSN? While everyone is talking about IPv6 in light of the IPv4 address space depletion – driven by the increasing demand for… Nir Ilani | September 14, 2011
The Rise of the Tablet: How It Affects IT Organizations… and You Tablet computers popularity skyrockets. Devices like Apple iPad, Samsung Galaxy Tab, ASUS Eee Pad, BlackBerry Playbook and more not only… Nir Ilani | August 18, 2011
If You’re on the Highway to the Cloud, Make Sure You Pack the Right ADC to Take You There After recently reading about VMware’s view on the evolution of IT towards cloud services, or as they call it the… Yaron Azerual | August 15, 2011
Mobile Data Advancements & Cloud Transformation Everyone knows that both the bandwidth and scope of mobile applications continue to grow and evolve. It’s all around. Just… Nir Ilani | August 4, 2011
Top Things Your Service Provider Needs to Know About Security So far, when one mentioned mobile security, it meant two possible security attack vectors. They were either attacks at the… Nir Ilani | July 28, 2011