Juniper Networks Unveils New Cloud-Based Environment

Juniper Networks Unveils New Cloud-Based Environment

Juniper Networks has announced a first-of-its-kind cloud offering that is touted to revolutionize the way service providers and enterprises design, test and operate networks.

Network operators can leverage the new virtual environment to create and run networks on-demand, which enables network modeling, testing and planning at a very large scale.

For $50 a day, Junosphere Lab allows companies to speed modeling projects by more than 30 percent and reduce total cost of ownership by as much as 90 percent when compared to the alternative of building a physical lab.

Junosphere Lab leverages the power of cloud networking to help customers plan and operate their networks more efficiently,” said Manoj Leelanivas, executive vice president, Junos Application Software Business Group, Juniper Networks. “The economic and operational benefits of cloud-based network modeling are astounding, and the innovation of Junosphere Lab brings these benefits to our customers so they can shape and scale their next generation networks with agility.

Juniper Networks notes that its newly released Junosphere Lab extends the capabilities of the Junosphere environment and further demonstrates the company’s commitment to helping customers leverage the power of the cloud in innovative new ways.

Energy efficiency and environmental responsibility is very important to us at NTT Communications, and we highly value technologies that can help us reduce power demand by delivering a highly scalable, realistic environment at less cost,” said Dr. Shin Miyakawa, director, Network System and Technologies, Innovative IP Architecture Center at NTT Communications. “We are excited about Junosphere Lab because it could enable us to perform many testing and modeling exercises in the cloud, rather than with physical test labs, which in turn could significantly reduce the amount of power, space and cooling our labs require.”

Juniper has also unveiled an optional application- Junosphere Connector- that allows users to connect their Junosphere networks to physical networks or lab environments.

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…