A management shake-up at Juniper Networks continues, as Stefan Dyckerhoff has been replaced as executive vice president of Juniper’s Platform Systems Division by Rami Rahim, who currently leads the company’s edge and aggregation routing business unit.
The University of New Hampshire InterOperability Laboratory (UNH-IOL) hosted its fourth IPv6 Customer Edge (CE) Router Interoperability Test Event the week of April 16 at its facility in Durham, N.H., bringing together both users and suppliers of home router equipment. The goal was to gain perspective on the current status of IPv6 interoperability against the Internet Engineering Task Force's (IETF) Basic Requirements for IPv6 Customer Edge Routers and support the Internet Society's (ISOC) World IPv6 Launch. Eight vendors -- Broadcom, CHT-TL IPv6 Testing Lab, D-Link, NDM Systems, Motorola Mobility LLC, Netgear, Time Warner and ZyXEL -- tested ten router implementations using publicly routable IPv6 addresses.
Cisco Systems has taken a step back from its Cisco Connect Cloud service, removing it as the default setting for management of its Linksys EA Series Wi-Fi routers after a firestorm of complaints from customers about automatic firmware updates and the service's terms of service.
Continued growth in the data center network equipment market has opened a window of opportunity for vendors looking to cut into industry leader Cisco's share, and, for those with the right products, "the time to strike is now," one analyst says.
In an effort to accommodate enterprise users looking to implement private and hybrid clouds, Cisco in the coming months will unveil an "integrated" WAN routing system of existing, but enhanced, products.
Cisco Systems made its fortune selling routers for the cores of enterprise and service-provider networks, but now the company is sending its technology farther from those cozy confines than ever before.
A researcher at Black Hat has revealed a vulnerability in the most common corporate router protocol that puts networks using it at risk of attacks that compromise data streams, falsify network topography and create crippling router loops.