Posts By VIAVI Staff

Learn how to use HTTP/3 to build your next-generation web using CyberFlood, the only solution that proactively validates network performance and security with emulated HTTP/3 traffic. HTTP (HyperText Transfer Protocol) was released in 1991 and it essentially powers the exchange of information over the web today. Since then, there have been several updates to HTTP […]

Every network and application brings unique characteristics and vulnerability to network impairments. Having a deep understanding of how apps behave in a range of expected scenarios is a critical step in assuring performance. Read how pre-deployment testing and verification will help relieve doubts and reveal the unknown. A perfect storm of tech readiness, big data […]

Satellite broadband products and services are expected to generate over $200 billion in annual service revenue by 2030, serving more than 350 million direct satellite-to-device subscribers. New Low Earth Orbit (LEO) satellite systems will provide connectivity where none exists, supporting the underserved and remote use cases. This brings new challenges of complexity that must be […]

By disguising the exploits at the point of delivery, malicious attackers can avoid detection, making security platforms and policies ineffective. Stay one step ahead of hackers with CyberFlood and CyberThreat Assessment. Malicious attackers are not necessarily all experts in malware manipulation, PowerShell, or other tools trying to constantly come up with new and innovative ways […]

Intense cloud gaming requirements, emerging industrial connectivity needs and a new wave of applications powered by AI and ML are setting new expectations. Read why early, comprehensive testing has become a critical factor in accelerating 800G toward production and deployment to meet market demand. Enterprise demand for higher bandwidth, increased throughput and ultra-low latency is […]

On December 9, 2021, a highest possible-severity vulnerability was discovered, and the entire security industry is racing to fix this issue. Read about details of the impact and how we can help users protect against this latest top-rated vulnerability. This issue named Log4j vulnerability (also known as “Log4Shell”) is tracked by CVE-2021-44228 on December 10. […]

Accurate and traceable time stamps have become a financial trading imperative to protect investors and adhere to regulatory requirements. Who made what trade? When? Did it complete as intended? All simple questions. Read why ensuring accuracy of this information has become a complex business. Timing and synchronization have become top concerns for finance IT managers. […]

We’ve seen the success of web-scale applications due to the power and flexibility of the cloud-native approach to software design they take. They are massively scalable, highly fault tolerant, extremely cost-effective, capable of rapidly evolving with user needs. Read about cloud-native principles and how proactive validation helps navigate the cloud-native networking journey. The cloud-native networking movement originated […]

Close