Juniper Networks
We believe the network is the single greatest vehicle for knowledge, collaboration, and human advancement that the world has ever known. Now more than ever, the world relies on high-performance networks. And now more than ever, the world needs network innovation to unleash our full potential.
Every day, Juniper Networks is helping our customers build the best networks on the planet. Every innovation we envision, every technology we create is informed by our desire to help solve our customers’ toughest challenges so they can compete and thrive today and into the future.
For more information, visit our website www.juniper.net
-
10:34 Popular
WLAN - Configuring A WLAN Captive Portal
Added 335 Views / 0 LikesThe Configuring a WLAN Captive Portal shows how to configure a captive portal for user login to a wireless network. It demonstrates how to set this up through both the Ringmaster GUI and the WLC CLI. Presenter: Kevin Barker, Juniper Ambassador, JNCI Relev
Featured -
01:41 Popular
Bezeq International
Added 335 Views / 0 LikesIsrael's leading Internet Service Provider finds ways to innovate and add services with Juniper's Universal Edge portfolio.
Featured -
10:37 Popular
Overview And Upgrade Of A QFabric System
Added 335 Views / 0 LikesThe Overview and Upgrade of a QFabric System learning byte provides a brief overview of the basic components used in a QFX3000-G and QFX3000-M QFabric system. It also covers the necessary steps when upgrading the QFabric system. A hands on example upgradi
Featured -
01:19 Popular
How To Protect Your Mobile Life
Added 334 Views / 0 LikesDan Hoffman, Chief Mobile Security Evangelist at Juniper's Mobile Threat Center, mobile device management and mobile security tactics to avoid malware attacks. These recommendations are based on findings from the 2011 Mobile Threat Report. 1. Have an anti
Featured -
06:25 Popular
The Cloud And Data Centre Architecture: Part 3
Added 334 Views / 0 LikesPhil sets out the landscape for Cloud Networking and discusses how developments such as Infrastructure as a Service (IaaS) and Dynamic and Shared Services is impacting the Architecture and the Security of the Data Centre. Andy explains how Internal Cloud
Featured -
01:31 Popular
Use Security, Timing & Sync To Differentiate Your Wholesale Services
Added 334 Views / 0 LikesMobile operators increasingly turn to carrier Ethernet backhaul wholesale services to shorten time to market and lower capital costs. As they deal with small cells and the Internet of Things, mobile operators will need advanced security and timing and syn
Featured -
01:15 Popular
What Is Virtual Chassis Fabric?
Added 334 Views / 0 LikesBrief overview of data center overlay network advantages. The written form of this video can be read at http://www.juniper.net/documentation/en_US/junos13.2/topics/concept/vcf-overview.html
Featured -
15:31 Popular
Using Generated Routes
Added 333 Views / 0 LikesThe Using Generated Routes Learning Byte covers what the difference is between an aggregate and generated route as well as an example of generating a route based on upstream connectivity. This byte is most appropriate for users who need a basic understand
Featured -
05:40 Popular
Cyber Attacks And Intellectual Property
Added 333 Views / 0 LikesSky News Business interview with Greg Bunt, Director of Security of Juniper Networks, on cyber attacks and intellectual property. A report by Juniper Networks reveals that IT and security professionals in Australia doubt the ability of their own organizat
Featured -
02:04 Popular
EBay Classifieds Group Blends Cloud & SDN To Accelerate New Services
Added 332 Views / 0 LikeseBay Classifieds supports multiple internal clients and all of their requirements in more than 1,000 cities around the world. The company adopts cloud and virtualization services to get to market faster with new features, services, and campaigns using Jun
Featured -
02:14 Popular
Data Center Rap Battle: On Demand Vs Always On
Added 332 Views / 0 LikesDave is all about virtualization, the cloud and deploying the next big money-making app or service. But if Nick from IT knows one thing, it's that a security breach means the entire company is down for the count. Sure, they've struggled in the past, but n
Featured -
00:31 Popular
NFV: Post Notes
Added 331 Views / 0 LikesJuniper NFV helps you bring new ideas to market faster than ever. What’s your Big NFV Idea? Learn more at www.juniper.net.
Featured -
15:10 Popular
Implementing BGP Over IPsec
Added 331 Views / 0 LikesThe Implementing BGP over IPsec Learning Byte covers how to configure and troubleshoot BGP over IPsec on SRX Series devices. This byte is most appropriate for users who are looking to understand how to implement BGP over IPsec with SRX Series devices. If
Featured -
11:43 Popular
Basic Service Chaining In Contrail
Added 331 Views / 0 LikesThe Basic Service Chaining in Contrail Learning Byte covers how to configure a basic service chain within Contrail. This byte is most appropriate for users who are new to working with Contrail or anyone looking for a quick-start guide of how to configure
Featured -
01:46 Popular
What Is The Best Control Plane Protocol To Use In A Data Center IP Fabric?
Added 331 Views / 0 LikesBrief overview of why BGP is the best control plane technology for data center IP fabrics. The written form of this video can be read at http://www.juniper.net/documentation/en_US/junos13.2/topics/concept/data-center-technology-overview-videos.html
Featured -
05:32 Popular
Hoff's Security Bulletin: Active Defense Security
Added 331 Views / 0 LikesSr. Director of Security Strategy Chris Hoff discusses active defensive security that involves preemptive and counter strikes or hacking back.
Featured -
1:00:22 Popular
Migrating EIGRP To OSPF: A Discussion
Added 331 Views / 0 LikesYour IGP is the foundation for network reachability information. Choosing the correct IGP enables the building blocks for future network services, protocols, and connectivity. Join host Jack W. Parks, Consulting Systems Engineer and author of the Juniper
Featured