Network World staff

Author Archives: Network World staff

Glossary of networking terms

5G 5G is fast cellular wireless technology for enterprise IoT, IIoT, and phones that can boost wireless throughput by a factor of 10. Network slicing Network slicing can make efficient use of carriers’ wireless capacity to enable 5G virtual networks that exactly fit customer needs.To read this article in full, please click here

FAQ: What in the wireless world is CBRS?

First off, CBRS is an acronym for Citizens Broadband Radio Service, and the upshot for IT pros is that it’s enabling enterprises to build their own private 4G/5G networks and result in improved 4G/5G offerings from service providers. Here’s a primer on CBRS—because you are going to want to know about this.CB, as in CB radio? No, good buddy, this has nothing to do with the Citizens’ Band radio service used by truckers for two-way voice communications and that lives in the 27MHz band in the US. CBRS lives in the 3.5GHz band.To read this article in full, please click here

The current state of the UK internet: outage tracker

ThousandEyes, a firm that monitors network infrastructure, measures the UK internet for Network World UK each week, covering Monday at 12:01 UTC through Sunday at 23:59 UTC.Click NEXT below to see the latest data.[Get regularly scheduled insights by signing up for Network World newsletters.] Week of 10-16 January 2022 ISPs. Outages at UK internet service providers (ISPs) decreased 38% from 13 to 8. Globally, they were 173, up 15% from 150 the prior week.Cloud providers. In the UK, there were 0 cloud outages for the fifth week running. Globally, the number was 10, up 400% from 2 the prior week.To read this article in full, please click here

UCL team uses supercomputers in worldwide effort to beat COVID-19

A group of researchers at University College London is tapping supercomputers in the U.S. and Europe in an effort to find ways to fight COVID-19, looking for vaccines and anti-viral drugs, among other things.The team at UCL is part of an international group called the Consortium on Coronavirus and is made up of more than 100 researchers around the world including those at UCL and eight other universities, five U.S. national laboratories, a private research center and a public academy.To read this article in full, please click here

UCL team uses supercomputers in worldwide effort to beat Covid-19

A group of researchers at University College London is tapping supercomputers in the U.S. and Europe in an effort to find ways to fight COVID-19, looking for vaccines and anti-viral drugs, among other things.The team at UCL is part of an international group called the Consortium on Coronavirus and is made up of more than 100 researchers around the world including those at UCL and eight other universities, five U.S. national laboratories, a private research center and a public academy.To read this article in full, please click here

How AppArmor can protect your Linux system

AppArmor is a useful Linux security module that can restrict the file-system paths used by an application.It works differently than Security-Enhanced Linux (SELinux) and cannot run on at the same time on the same system with SELinux, which comes installed on some Linux distributions.The question is when to use AppArmor and what it can do to protect your system.This 2-Minute Linux Tip video below is an introduction to AppArmor and how to get starting using it. YT embed: To read this article in full, please click here

The Linux who command tells who’s logged in and a lot more

Did you ever wonder who is logged into a Linux system but not know how to find out? This two-minute tip can solve the problem with an introduction to the who command in this 2-minute Linux Tip by Network World blogger Sandra Henry-Stocker.The who command can tell you who is logged in to the network, count them and give a list of them on a single line. It can also show when a system was last booted as well as the run state that the system is in.For those who don’t want to use the formal commands for the various who functions, it’s possible to create aliases that are more intuitive than the commands as written for Linux.To read this article in full, please click here

Contribute to the 2019 Network World State of the Network survey

Network World’s annual State of the Network study provides a comprehensive view of technology adoption trends among network IT.This definitive research focuses on technology implementation objectives and reveals how leading objectives change the way IT decision-makers do their jobs, as well as the way their organizations function.Survey results reveal trends about how network teams collaborate with other departments in the corporate structure, what factors derive technology investment, which way IT spending is moving and more.This year Network World is looking for IT pros’ experience with technologies including 5G, SD-WAN, Wi-Fi and Edge ComputingTo read this article in full, please click here

2-Minute Linux Tip: The env command

When working in shell sessions on Linux, it is sometimes necessary to investigate the settings for that particular environment, and the env command can help with that.In this 2-minute Linux Tip by Network World's  "Unix As A Second Language" blogger Sandra Henry-Stocker, learn how to use the env command to provide information about the shell environment and running commands in the altered environment. To read this article in full, please click here

Unix as a Second Language: The touch command

The Linux touch command allows users to create an empty file or update a file’s data and time settings.You might want to do this if you need to be sure that a file exists before a script or process begins. The command can also be used to set the date and time to match those of another file.Watch this Two-minute Linux Tip video by Sandra Henry-Stocker to learn more. To read this article in full, please click here

Complete a survey on enterprise purchasing for a shot at $500

IDG is conducting its annual Customer Engagement survey on how businesses make buying decisions for their major enterprise IT purchases. The survey should take no more than 10 minutes of your time, and it's confidential. Neither your name nor your company's name will be associated with your answers.In return for filling out the survey, you can enter to win a $500 cash prize. For complete sweepstakes rules, click here.To read this article in full, please click here

Can 5G replace high-speed Wi-Fi in the enterprise?

There’s a lot of interest in 5G by enterprises that see is as a way to provide higher bandwidth, lower latency connectivity including IoT applications.In this video, analyst Jack Gold discusses 5G and these uses in more detail, as well as the flap between the U.S. and Huawei over banning the Chinese company’s technology from 5G networks here.Also see The time of 5G is almost hereTo read this article in full, please click here

Huawei may get a 2-year reprieve on Trump ban

While President Trump wants to ban sales of Huawei networking gear in the U.S., the acting head of the Office of Management and Budget recommends putting that action off for two years because it would place too great a burden on U.S. companies supplying Huawei and using its equipment.If the ban goes through it will put the squeeze on the Chinese vendor, and the U.S. action could influence its allies to follow suit, further pressuring the company.To read this article in full, please click here

Free course – Ethical Hacking: Hacking the Internet of Things

IoT devices are proliferating on corporate networks, gathering data that enables organizations to make smarter business decisions, improve productivity and help avoid costly equipment failures, but there is one big downside – security of the internet of things remains a problem.It makes sense, then, for enterprises to try to spot vulnerabilities in the IoT gear in their networks before they can be exploited by malicious actors.[ For more on IoT security see tips to securing IoT on your network and 10 best practices to minimize IoT security vulnerabilities. | Get regularly scheduled insights by signing up for Network World newsletters. ] To help this along, Network World and Pluralsight have teamed up to present a free course, Ethical Hacking: Hacking the Internet of Things, that provides IT pros with skills they need to protect their network infrastructure.To read this article in full, please click here(Insider Story)

What’s hot in enterprise networking for 2019

With 2019 just around the corner there's a lot of  developments and advances coming that will affect how enterprises make use of technologies for SD-WAN, IoT, Wi-Fi, data centers, the cloud and more. Here's a selection of some of the coming trends that industry pros see coming next year.What will be hot for Cisco in 2019? Getty Images Software, software and more software.  That seems to be the mantra for Cisco in 2019 as the company pushes software-defined WANs, cloud partnerships, improved application programs and its over-arching drive to sell more subscription-based software licenses. Check it out.To read this article in full, please click here

What’s hot in enterprise networking for 2019

With 2019 just around the corner there's a lot of  developments and advances coming that will affect how enterprises make use of technologies for SD-WAN, IoT, Wi-Fi, data centers, the cloud and more. Here's a selection of some of the coming trends that industry pros see coming next year.What will be hot for Cisco in 2019? Getty Images Software, software and more software.  That seems to be the mantra for Cisco in 2019 as the company pushes software-defined WANs, cloud partnerships, improved application programs and its over-arching drive to sell more subscription-based software licenses. Check it out.To read this article in full, please click here

Getting grounded in IoT networking and security

download Getting grounded in IoT networking and security The internet of things already consists of nearly triple the number of devices as there are people in the world, and as more and more of these devices creep into enterprise networks it’s important to understand their requirements and how they differ from other IT gear.To read this article in full, please click here

Getting grounded in IoT networking and security

download Getting grounded in IoT networking and security The internet of things already consists of nearly triple the number of devices as there are people in the world, and as more and more of these devices creep into enterprise networks it’s important to understand their requirements and how they differ from other IT gear.To read this article in full, please click here

Getting grounded in IoT networking and security

download Getting grounded in IoT networking and security The internet of things already consists of nearly triple the number of devices as there are people in the world, and as more and more of these devices creep into enterprise networks it’s important to understand their requirements and how they differ from other IT gear.To read this article in full, please click here