Feeds

3Com adds Linux blade to routers

Application blade runs open source apps

Secure remote control for conventional and virtual desktops

Interoperability and openness will be the keys to the network in the future, 3Com claimed, as it announced Linux-based blades for its 6000-series routers that will let them run third-party apps.

The vendor also unveiled a technology partner programme to help others make their hardware and software interoperate with 3Com's.

The company said it wants to develop an ecosystem around its open systems networking (OSN), IP telephony, and security gear. It added that there's already four apps available to run on the router module: security software from Q1 Labs, a traffic optimiser from Converged Access, Vericept's compliance software, and VMware.

The module also runs provisioning, management, security, and control tools for the router. Called OSN|M, for Open Services Networking Module, it is separate from the proprietary operating software inside the router and communicates with it via an open interface, according to 3Com.

The company said it will also port its own IP PBX software and TippingPoint IDS/IPS to the router module. It claimed that its choice of an open source platform able to run standard software makes OSN|M a more flexible choice than Cisco's similar application blade for routers.

"OSN has the ability to drive a significant change in the networking landscape towards open, flexible multi-vendor integration," 3Com president and CEO Edgar Masri said.

The company added that those signing up for its open partner programme would get marketing and technical support, including development tools and access to 3Com resellers and test labs.

3Com's new-found love of interoperability and open systems makes a refreshing change in an area where companies usually want to do everything themselves, or carefully select their hardware and software development partners. However, the company still has a lot of lost ground to make up in the Cisco-dominated enterprise routing market.®

Internet Security Threat Report 2014

More from The Register

next story
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
The DRUGSTORES DON'T WORK, CVS makes IT WORSE ... for Apple Pay
Goog Wallet apparently also spurned in NFC lockdown
Cray-cray Met Office spaffs £97m on VERY AVERAGE HPC box
Only 250th most powerful in the world? Bring back Michael Fish
Microsoft brings the CLOUD that GOES ON FOREVER
Sky's the limit with unrestricted space in the cloud
'ANYTHING BUT STABLE' Netflix suffers BIG Europe-wide outage
Friday night LIVE? Nope. The only thing streaming are tears down my face
Google roolz! Nest buys Revolv, KILLS new sales of home hub
Take my temperature, I'm feeling a little bit dizzy
Cisco and friends chase WiFi's searing speeds with new cable standard
Cat 5e and Cat 6 are bottlenecks for WLAN access points
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.