F5 Networks in the city

Steve Cassidy has been cooking up an IT storm with a simple list of ingredients.

The new City offices, in the coat-tails of Tower 42, are a bit of a departure for a technology company so pure they probably floss with Cat5 cable. This is a demo suite, with a gorgeously curved and logically designed data centre which I will be going back to slobber over armed with my very best cameras. It has a complete telepresence VC room, with immersive acoustics, shared whiteboards and a bit of a "bridge of the Enterprise" feel to the tiered seating. Such is the focus of attention on the data centre that while it only has F5's own kit in it, it seems curiously empty in the racks but then a chat with the High Priest, oops I mean friendly techie, reveals that each 19 inch enclosure can run 10Kw of servers and there are customers who bring in trolley-loads of kit to rack up, try out, and then take away again. Stubbing my toe in the back hot-air exhaust room on rows of fat Commando power connectors rather supported his assertion.

F5's only slightly curious statement was around the desirability of IPv6 vs IPv4. Its success has been almost entirely in the IPv4 era, and their takeup of IPv6 has been so early inside their own architecture that they have been sitting on the finisher's line throughout the often rocky and peculiar uptake of v6 that has characterised the last few years for smaller, lower-IQ or more urgently motivated adopters. From a traffic management perspective, I suspect it views IPv4 as adequate into the hundreds of millions of transactions scale, and the trumpeted advantages of v6 as being some years away from full relevance.

But with both the downloadable VM appliance demo, and the entirely physical, bruise-raising multikilowatt demo suite, you don't need to take its word for it. You can try it for yourself.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354232/raspberry-pi-4-owners-complain-of-broken-wi-fi-when-using-hdmi
Hardware

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019