Archive

Category Archives for "Network World SDN"

Cisco directs high priority patches for IP phone security exposures

Cisco this week advised customers using its 7800 and 8800 series IP phones they should patch a variety of high-priority vulnerabilities that could lead to denial of service and other security problems.The company issued five security advisories, four for the 8800 and one for both the 8800 and 7800 series of IP phones. The 8800 is a high-end business desktop device that features high-definition video and mobile device integration. The 7800 is more of a general business IP phone.  Learn about 5g networks: How enterprises can prep for 5G networks 5G vs 4G: How speed, latency and apps support differ Private 5G networks are coming 5G and 6G wireless have security issues How millimeter-wave wireless could help support 5G and IoT The security advisories include:To read this article in full, please click here

Nvidia launches new hardware and software for on-prem and cloud providers

Nvidia used its GPU Technology Conference in San Jose to introduce new blade servers for on-premises use and announce new cloud AI acceleration.The RTX Blade Server packs up to 40 Turing-generation GPUs into an 8U enclosure, and multiple enclosures can be combined into a "pod" with up to 1,280 GPUs working as a single system and using Mellanox technology as the storage and networking interconnect. Which likely explains why Nvidia is paying close to $7 billion for Mellanox.Instead of AI, where Nvidia has become a leader, the RTX Blade Server is positioned for 3D rendering, ray tracing and cloud gaming. The company said this setup will enable the rendering of realistic-looking 3D images in real time for VR and AR.To read this article in full, please click here

Quantum computing will break your encryption in a few years

Modern public-key encryption is currently good enough to meet enterprise requirements, according to experts. Most cyberattacks target different parts of the security stack these days – unwary users in particular. Yet this stalwart building block of present-day computing is about to be eroded by the advent of quantum computing within the next decade, according to experts.“About 99% of online encryption is vulnerable to quantum computers,” said Mark Jackson, scientific lead for Cambridge Quantum Computing, at the Inside Quantum Technology conference in Boston on Wednesday.[ Now read: What is quantum computing (and why enterprises should care) ] Quantum computers – those that use the principles of quantum entanglement and superposition to represent information, instead of electrical bits – are capable of performing certain types of calculation orders of magnitude more quickly than classical, electronic computers. They’re more or less fringe technology in 2019, but their development has accelerated in recent years, and experts at the IQT conference say that a spike in deployment could occur as soon as 2024.To read this article in full, please click here

Printing from the Linux command line

Printing from the Linux command line is easy. You use the lp command to request a print, and lpq to see what print jobs are in the queue, but things get a little more complicated when you want to print double-sided or use portrait mode. And there are lots of other things you might want to do — such as printing multiple copies of a document or canceling a print job. Let's check out some options for getting your printouts to look just the way you want them to when you're printing from the command line.Displaying printer settings To view your printer settings from the command line, use the lpoptions command. The output should look something like this:To read this article in full, please click here

Cisco spreads AI across Webex meetings

Cisco Webex has rolled out a package of AI-based features that brings together recently acquired technologies it says will make business meetings more efficient and intuitive.The Webex conferencing tool enhancements, which include faster meeting startup, a better way to know the people attending a meeting and facial-recognition improvements will help customers more effectively collaborate from any location, the company said. Read about SD-WAN How to buy SD-WAN technology: Key questions to consider when selecting a supplier How to pick an off-site data-backup method SD-Branch: What it is and why you’ll need it What are the options for security SD-WAN? Cisco bought Webex in 2007 for about $3.2 billion with an eye toward competing more effectively with Microsoft and other collaboration software vendors. Today Webex conferencing tools are used by over 130 million customers a month, Cisco says.To read this article in full, please click here

IDG Contributor Network: Software-defined perimeter: Identity-centric enforced network perimeter

With the introduction of cloud, BYOD, IoT and virtual offices scattered around the globe, the traditional architectures not only hold us back in terms of productivity but also create security flaws that leave gaps for compromise.The network and security architectures that are commonly deployed today are not fit for today's digital world. They were designed for another time, a time of the past. This could sound daunting...and it indeed is.What we had in the past? Traditionally, we have had a static network and security perimeter with clear network and security demarcation points. In terms of security, the perimeter-based approach never worked. It did, however, create a multi-billion-dollar industry. But the fact is, it neither did, not will it provide competent security.To read this article in full, please click here

BrandPost: Deploying highly secure, easy to deploy and cost-effective Micro Data Centers

Industry trends such as the Internet of Things (IoT) and content distribution networks (CDNs) are driving the need for edge computing. That’s because these solutions often require low latency, high bandwidth, greater reliability, and strong security.It’s a tall order meant for Micro Data Centers (MDCs) to fulfill. An MDC is a self-contained data center architecture that offers complete IT infrastructure within a stand-alone, secure enclosure.MDCs offer a number of key advantages beyond today’s server rooms and traditional data centers. First, because they’re distributed closer to bandwidth-intensive content, MDCs can significantly reduce latency and lower costs. Secondly, it’s easy and cost-effective to add data center capacity to them anywhere and anytime it is needed – in both IT room and non-climate-controlled environments. And because MDC IT equipment is pre-installed before shipment in a self-contained and secure enclosure, it can provide physical security and protection of critical business applications.To read this article in full, please click here

How did Facebook go down despite its several data centers?

The Mercury retrograde kicked in big time on Wednesday as Facebook suffered an eight-hour outage that also affected Instagram and Facebook Messenger.No one was believed to be harmed; a few might have even had offline interactions with other human beings. Learn about backup and recovery: Backup vs. archive: Why it’s important to know the difference How to pick an off-site data-backup method Tape vs. disk storage: Why isn’t tape dead yet? The correct levels of backup save time, bandwidth, space Facebook said it wasn’t attacked, such as via a denial-of-service attack, and has since issued a statement attributing the problem to a configuration error.To read this article in full, please click here

How did Facebook go down despite multiple data centers?

The Mercury retrograde kicked in big time on Wednesday as Facebook suffered an eight hour-outage that also affected Instagram and Facebook Messenger.No one was believed to be harmed; a few might have even had offline interactions with other human beings. Learn about backup and recovery: Backup vs. archive: Why it’s important to know the difference How to pick an off-site data-backup method Tape vs. disk storage: Why isn’t tape dead yet? The correct levels of backup save time, bandwidth, space Facebook said it wasn’t an attack, like a Denial of Service attack, and has since issued a statement attributing it to a configuration error.To read this article in full, please click here

BrandPost: Micro Data Centers Evolve to Fit New Business Requirements of Edge Computing

Recent breakthroughs in technology have expanded the possibilities for where data is gathered, processed, stored and analyzed. IT staffs and their business counterparts now have the flexibility of deciding whether their applications are more efficient residing in the cloud, within a traditional data center, or on the network edge. In fact, for the first time, the nature of the applications themselves is determining where they best should run. Over the last several months, micro data centers have emerged as a technology of choice for helping to manage the growing computing needs across edge environments.To read this article in full, please click here

3 steps to take before deploying SD-WAN

As enterprises develop network strategies and technical roadmaps, one hot technology that will be on their radar is SD-WAN, a significant transformational solution in networking and a major change  from the MPLS status quo that most enterprises have deployed.As bullish as we are on SD-WAN, we recommend that any enterprise contemplating its adoption take a few preliminary steps to minimize the disruption and costs associated with transitioning from the legacy network. To read this article in full, please click here

Data center giants announce new high-speed interconnect

A group of big names in the data center space have linked arms to develop yet another high-speed interconnect, this one designed to connect processor chips.It's called Compute Express Link, or CXL, which is aimed at plugging data-center CPUs into accelerator chips. Members of the alliance that developed the spec are Intel, Microsoft, Google, Facebook, HPE, Cisco, and Dell-EMC, plus Huawei and Alibaba.[ Learn who's developing quantum computers. ] Where are IBM, AMD, Nvidia, Xilinx, or any of the ARM server vendors such as Marvell/Cavium? They have their own PCIe-nased spec, called CCIX. The group consists of AMD, Arm, Mellanox, Qualcomm, Xilinx, and Huawei.To read this article in full, please click here

How to shop for CDN services

Content delivery networks have been around for more than a decade, but many enterprises are taking a new look at the perks and specialization that today’s CDN services have to offer.Why the renewed interest? The cloud-first movement, all-things-video, IoT and edge computing are all bringing sexy back to CDNs. The content delivery network market was valued at $7.3 billion in 2017 and is expected to reach $29.5 billion by 2023, a compound annual growth rate of 26 percent, according to ResearchAndMarkets.com.To read this article in full, please click here

Software-defined perimeter brings trusted access to multi-cloud applications, network resources

Many companies today have a hybrid approach to their networking and IT infrastructure. Some elements remain in an on-premise data center, while other portions have gone to the cloud and even to multi-cloud. As a result, the network perimeter is permeable and elastic. This complicates access requirements at a time when it’s more important than ever to enable accessibility while preventing unauthorized access to applications and data.To reduce risk, some organizations are applying a zero-trust strategy of “verification before trust” by incorporating stronger, stateful user and device authentication; granular access control; and enhanced segmentation no matter where the applications and resources reside.To read this article in full, please click here

Facebook gets into the fiber-optic connectivity business

When you think of Facebook services, high-speed connectivity is not the first thing that comes to mind. But the social media giant is doing just that, offering high-capacity fiber-optic routes to sell unused capacity between its data centers for third parties.Facebook has created a subsidiary called Middle Mile Infrastructure to sell excess capacity on its fiber, starting with new fiber routes between its data center campuses in Virginia, Ohio, and North Carolina. The company made the announcement in a blog post by Kevin Salvadori, director of network investments.To read this article in full, please click here

BrandPost: Resilience at Edge Computing Sites Is Resilience for the Whole IT Environment

As edge computing deployments get under way, organizations need to make their edge computing sites resilient. As the saying goes, “you’re only as good as your weakest link,” so if edge computing locations are allowed to be the weakest link in a multi-location environment, the entire network surely will suffer.You can’t have a truly resilient IT deployment without resilience at these edge computing sites. So organizations have to harden these sites with best-in-class technology as they do at centralized and regional data centers. Organizations need redundancy, security and management controls designed to prevent downtime.To read this article in full, please click here

How blockchain will manage networks

Ethernet networking technology is flawed, say some engineers. The problem is it doesn’t have any inherent security built in to it. Ethernet also hard to manage because it's centralized. It’s out-of-date, and it needs revamping, researchers say.One attempt to address the issue is the Marconi protocol, which is a strategy to shift network and packet management over to a smart contract, decentralized chain-based system. Smart contracts are trackable, verifiable transactions. They’re performed through encrypted blockchains and are self-enforcing.To read this article in full, please click here

Wireless spectrum shortage? Not so fast

The wireless industry has always had to deal with regular (and alarming) pronouncements that we're somehow running out of radio spectrum. We’re not. But the misconception regardless gives many IT and network managers pause. After all, if the availability, reliability and especially the capacity of wireless were to degrade to the point of a de-facto shortage, the situation would be dire for communications at the edges of both the LAN and WAN.So let’s start putting to rest any conjecture regarding a spectrum shortage and focus on reality: Thanks to a combination of continual advances in wireless technologies, recent enhancements to spectrum regulatory policy, and novel thinking around spectrum allocation, we can be assured that a “spectrum shortage” is, and will remain, an abstract theoretical concept.To read this article in full, please click here

Cisco uncorks 26 security patches for switches, firewalls

Cisco has bundled 25 security advisories that describe 26 vulnerabilities in Cisco NX-OS switch and Firepower FXOS firewall software.While the 26 alerts describe vulnerabilities that have a Security Impact Rating of “High,” most –23 – affect Cisco NX-OS software, and the remaining three involve both software packages.[ Also see What to consider when deploying a next generation firewall. | Get regularly scheduled insights by signing up for Network World newsletters. ] The vulnerabilities span a number of problems that would let an attacker gain unauthorized access, gain elevated privileges, execute arbitrary commands, escape the restricted shell, bypass the system image verification checks or cause denial of service (DoS) conditions, Cisco said.To read this article in full, please click here

1 2 3 293