Internet Industry Search Engine

The role of open source in networking

Source: networkworld.com

Feb 5, 2019 12:55 PM 1+ week ago

Technology is always evolving. However, in recent time, two significant changes have emerged in the world of networking. Firstly, the networking is moving to software that can run on commodity off-the-shelf hardware. Secondly, we are witnessing the introduction and use of many open source technologies, removing the barrier of entry for new product innovation and rapid market access.Networking is the last bastion within IT to adopt the open source. Consequently, this has badly hit the networking industry in terms of slow speed of innovation and high costs. Every other element of IT has seen radical technology and cost model changes over the past 10 years. However, IP networking has not changed much since the mid-?90s.To read this article in full, please click here...Read more.

Search Builder

(Click to add to search box)
Search Suggestions Level 1
cost model changes  source components  box hardware  source software stacks  product development cycles  Network World communities  data plane applications  IDG Contributor Network  M N model  Intel AES NI  source technologies  IP networking  hardware resources  source code  software stacks  source stack  source software  process encryption  Intel chip  kernel level  Casandra Today  YANG models  system software  disaggregated network  box spec  cell towers  security companies  development cycles  network strategy  backhaul traffic  price pressure  RFP process  labs Testing  Open VPN  use cases  source networking  company bets  t need  WAN routers  Open source  Terabit speeds  Gigabyte servers  Terabyte router  production routers  gigabit speeds  glass approach  CPU cycles  development process  Cisco device  WAN edge  box environment  optimization stack  area network  protocol daemons  Sorell Slaymaker  optimized stack  processing power  REST API  flow stats  market access  
Search Suggestions Level 2
IDG Contributor Network  data networking  engineering hierarchy  
Search Suggestions Level 3
IDG Contributor Network  Network World communities  mapping team  network teams  service providers  box hardware  Intel AES NI  border gateway protocol  Hourly map updates  water flow sensors  cave water depth  bidirectional forwarding detection  network layer  M N model  cloud migration  Analyst firm Gartner  Amazon Web Services  TLS session setup  track water conditions  cyber threat landscape  cost model changes  customers networking approach  data plane applications  VxLAN cost networks  Cloud Native Networking  network topology changes  Monitoring oxygen levels  support business applications  tunnels Transmitting data  caves Thailand Department  transport layer security  product development cycles  Internetworking design  IPsec tunnel  measure developer happiness  cloud service providers  software stacks  Virtual Extensible LAN  IPsec encrypts everything  Single stack security  internetworking design  network architectures backhaul  source software stacks  transmission control protocol  workforce accessing network  service teams need  customer relationship management  source components  use cases  hotel booking system  integration testing  networking architectures  engineering organization  session state  Network study  cloud resources  application layer  rescue operations  oxygen levels  water levels  TCP perspective  Disaster Prevention  Sorell Slaymaker  area network  source software  Terabit speeds  hardware resources  source stack  source code  

**Content contained on this site is provided on an “as is” basis. 4Internet, LLC makes no commitments regarding the content and does not review it, so don't assume that it's been reviewed. What you see here may not be accurate and should not be relied upon. The content does not necessarily represent the views and opinions of 4Internet, LLC. You use this service and everything you see here at your own risk. Content displayed may be subject to copyright. Content is removed on a case by case basis. To request that content be removed, contact us using the following form: Contact Us.