TITLE

Exploring Content-Aware Network Appliances

AUTHOR(S)
Kobielus, James
PUB. DATE
December 2005
SOURCE
Business Communications Review;Dec2005, Vol. 35 Issue 12, p16
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports that increase in the XML and Web services traffic will boost the content-aware networking. Under its Application-Oriented Network product strategy Cisco Systems Inc. plans to offer content-filtering blades that can be configured into its routers and switches. Driven by policy, network appliances can take very specific actions to achieve very specific results. Cast Iron Systems and Solace Systems specialize in content-aware application data routing, whereas, others such as ActivNetworks, focus on compression, caching and other application acceleration functions. In the present scenario it seems that the pace of merger, acquisition and partnering activity will remain vigorous and the functional distinctions between content-aware network appliances and traditional Layer 2-4 devices will continue to blur, as vendors increasingly tout routers, load balancers, firewalls and other products that operate across many service layers. However the content-aware network appliances will only supplement, not replace the traditional routers, load balancers, firewalls and other traffic-control nodes.
ACCESSION #
19414261

 

Related Articles

  • Efficient Querying of Structure and Contents for Xml Documents. Raut, Atul D.; Atique, M. // International Journal of Computer Applications;May2012, Vol. 45, p30 

    XML is recognized as a standard for data storage and exchange for web applications. This is because it has certain unique features like it is self describing, extensible and it is stored in the form of text document. In spite of all these unique features XML has an inherent limitation of...

  • XML adds muscle to new firewalls. Chen, Anne // eWeek;3/1/2004, Vol. 21 Issue 9, p49 

    With no tried-and-true (or even agreed-upon) methods to secure XML messages and schemas, the march toward Web services has been halting and unsteady, despite the efforts of standards organizations to develop frameworks to secure Web services. The lack of a guaranteed level of trust between...

  • NETWORK PROTOCOL FIREWALLS/ROUTERS NOT ADEQUATE FOR XML.  // Computer Protocols;Sep2002, Vol. 15 Issue 9, p5 

    Deals with the inadequacy of existing firewall, proxy and switch solutions for processing Extensible Markup Language content according to the report released by ZapThink LLC.

  • Security Wares Weigh In Strong at NetWorld+Interop. Moore, Cathleen // InfoWorld;5/17/2004, Vol. 26 Issue 20, p21 

    This article reports that steeling enterprise networks against security breaches allegedly captured much of the limelight at NetWorld+Interop 2004, as an array of vendors showcased offerings that promise to secure XML data and wireless networks. Forum Systems at the show allegedly unveiled...

  • Don't Segment Desktop XML. Udell, Jon // InfoWorld;4/28/2003, Vol. 25 Issue 17, p50 

    Expresses views on the ability of Reach Site Summary (RSS)-enabled Weblogs to deliver Extensible Markup Language (XML) applications. Support for the next version of the Microsoft Office business application software; Stand on the idea that the stratification of the XML offerings is a...

  • Microsoft's unified app goals follow XML path. Scannell, Ed; Jones, Mark // InfoWorld;2/24/2003, Vol. 25 Issue 8, p26 

    Focuses on the integration of Microsoft Office and its InfoPath forms engine to push the Microsoft Office 2003 suite into enterprise applications. Applications with extensible markup languages; Problems of information technology administrators; Application software products from Microsoft.

  • Cisco switch module taps virtual partitions.  // eWeek;4/10/2006, Vol. 23 Issue 15, p20 

    The article focuses on the launch of the multifunction application control engine module designed by Cisco Systems Inc. This switch uses a 250 virtual partitions to help streamline the workflow involved in setting up security policies, ensure server and network capacity and provides the...

  • XML-BASED ENCRYPTION SCHEME TOUTED. Evans, James // Network World;12/04/2000, Vol. 17 Issue 49, p10 

    Cites the introduction of XML Key Management Specification (XKMS) by VeriSign, Microsoft and WebMethods to simplify the integration of public-key infrastructure and digital certificates with extensive markup language (XML) applications. Plan to submit XKMS to the appropriate Web standards...

  • INTERVOICE UNVEILS INVISION STUDIO FOR VOICEXML 2.0.  // Audiotex Update;May2003, p4 

    Intervoice Inc., a provider of converged voice and data solutions has unveiled VoiceXML application development environment to more efficiently align enterprises' voice and web customer service channels. The development tool InVision Studio for VoiceXML 2.0 designs easy-to-use and...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics