Contactez-nous Suivez-nous sur Twitter En francais English Language

De la Théorie à la pratique

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN



Juniper Networks and IBM Pursue Shared Vision of IT Transformation

April 2009 by Emmanuelle Lamandé

Juniper Networks, Inc., announced that Juniper and International Business Machines Corporation (IBM) are continuing to broaden their relationship.

Since 2007, the two companies have been working together on joint technology solutions, standards development, network management and managed security services. Specifically in the data center, IBM has included Juniper Networks switching, routing and security products into their data center network portfolio with IBM playing a role of systems integrator.

Most recently, the two companies jointly collaborated on a global technology demonstration highlighting how enterprises can seamlessly extend their private data center clouds. The demonstration between Silicon Valley and Shanghai showed a use case where customers could take advantage of remote servers in a secure public cloud to ensure high priority applications are given preference over the lower priority ones when computing resources become constrained. IBM and Juniper are installing these advanced networking capabilities into IBM’s nine worldwide Cloud Labs for customer engagements. Once installed in the nine worldwide Cloud Labs, IBM and Juniper will be able to seamlessly move client computing workloads between private and publicly managed cloud environments enabling customers to reliably deliver on service level agreements.

For the past year, IBM and Juniper have been working together on the Stratus Project, Juniper’s initiative to create a single data center fabric. The Stratus Project will address the modern mega data center’s pain points and endeavors to enable cloud computing to fulfill its maximum potential.

Continued research and innovation in cloud computing security has been another focus for IBM and Juniper. The companies are jointly researching cloud computing security models to highlight how customers can mitigate attacks on corporate data and computer systems.

See previous articles


See next articles