Archive

Category Archives for "Network World SDN"

AWS targets IPv6 migration for serverless, container workloads

Amazon Web Services has launched new support for IPv6-only subnets that can meet the needs of workloads that require more IP addresses than IPv4 can readily provide.The service is available through Amazon Virtual Private Cloud (VPC) and suitable for workloads such as serverless and container applications, according to a blog by Rohit Aswani, a senior specialist solutions architect and Aditya Santhanam, a senior product manager, both with AWS. “Workloads that are constrained by the limited size of the IPv4 address space can now migrate to an IPv6-only environment on AWS to scale up,” they wrote.To read this article in full, please click here

SmartNICs set to infiltrate enterprise network, security worlds

Enterprise infrastructure that supports data center, cloud and edge networks could someday be dominated by one of its tiniest components--the smartNIC or data processing unit (DPU).Use of smartNICs in the enterprise is still evolvinging, but the idea behind them--offloading server CPU duties onto a separate device to free up server cycles--is not new. Specialized hardware accelerators such as graphics processing units (GPU), field-programmable gate arrays (FPGA), and focused NICs have offloaded CPU workloads in telco, financial, and scientific application processing. NaaS is the future but it's got challenges Looking ahead, users and vendors see a way to reduce enterprise costs, improve performance and increase security with smartNICs.To read this article in full, please click here

How to buy Wi-Fi 6 access points

Wi-Fi 6 has some impressive improvements over its predecessor Wi-Fi 5 including lower latency, faster speeds, higher throughput, and increased range that can make it a better fit to serve both dense clusters of clients and clients running high-bandwidth applications.As Wi-Fi in general replaces wired networks in some enterprises and with the increased use of tablets, laptops, and mobile phones within enterprises, wireless-network responsiveness and versatility are becoming more desirable. Wi-Fi 6 (802.11 ax) can help. It can also improve the efficiency of IoT Wi-Fi networks by letting sensors lie idle more of the time so their batteries last longer.To read this article in full, please click here

Cisco CCIE certification explained

Cisco Certified Internetwork Expert is Cisco’s most prestigious and most difficult certification to achieve, typically requiring years of industry experience and a deep understanding of networking technologies. The lab portion of the exam alone is eight hours long and costs $1,600, and candidates typically spend much more than that on preparatory courses. But professionals with the expert-level CCIE networking certification are in demand, and the value is reflected in significantly higher salaries. "It is a preeminent certification in the industry," says Nick Marentic, senior manager for IT infrastructure and security at cybersecurity training firm Cybrary. "It requires years in the industry to understand the concepts contained."To read this article in full, please click here

Using the script command on Linux to record command line activity

The Linux script command has been around for ages and provides a simple but useful service. It lets you record command line activity – both input and output. This can be very helpful in troubleshooting problems or verifying what was done later by reviewing the commands that were run along with their output.Even if you've used the script command time to time, it offers more options than many of us realize. In this post, we will look at the simplest use of script and some of the options that can make it even more useful.The easiest way to use the script command is simply to type "script" in the terminal window and press ^d when you want to stop the recording. The output, by default, will be saved in a file called "typescript". You will see the file name that is used in the first line of output.To read this article in full, please click here

Researchers show how to exploit Bluetooth Classic security flaws

Researchers at Singapore University of Technology and Design has released a proof-of-concept exploit for a family of vulnerabilities it has dubbed BrakTooth, which affects the software development kit used to program Bluetooth chipsets using the ESP32 standard.BrakTooth affects the Bluetooth Classic protocol, which is widely used in laptops, smartphones and audio devices. The team says 16 flaws make up BrakTooth, the effects of which, if exploited, range in severity from crashing affected systems to remote code execution.The most serious flaw, dubbed V1 by the team, targets the ESP32 SoCs used in industrial automation, smart home, and fitness applications, among others. Certain models of MacBooks and iPhones are known to be affected. Because the ESP32 BT Library does not correctly run an out-of-bounds check on certain types of inputs, a malicious request to the system can allow an attacker to inject code onto a vulnerable system and potentially take control.To read this article in full, please click here

Report: Chip shortage and edge/IoT will drive IT change in 2022

The author of a new report from Forrester Research says that the simultaneous growth of IoT and edge computing usage are interlinked, and that future growth in both areas will be fueled heavily by federal regulations to reduce emissions.“We cannot disassociate the advancements in IoT without talking about the effect on edge,” he said. “They’re not distinct from each other..and the effect they have on use cases is combined.”[Get regularly scheduled insights by signing up for Network World newsletters.] The demand for “sustainability-related service,” will place IoT and edge front and center, according to Forrester’s “Predictions 2022: Edge, IoT, And Networking” report. Environmental use cases like monitoring CO2 levels, pollution, and air quality will all be increasingly sought-after, as will IoT systems that allow businesses to manage their resources (think water and power usage) more efficiently.To read this article in full, please click here

Kyndryl weds Microsoft as independent company looks to grow cloud services

IBM spin-off Kyndryl has made the first of what likely will be many strategic cloud partnerships with a pact with business software giant Microsoft.Under the agreement the companies will develop new products built on Microsoft Cloud and aimed at facilitating digital transformation, Kyndryl stated. Microsoft has also become Kyndryl’s only Premier Global Alliance Partner.[Get regularly scheduled insights by signing up for Network World newsletters.] Microsoft will sell products developed by the two companies through its global enterprise sales force and will develop a Microsoft Cloud training ground for employees called Kyndryl University for Microsof. The companies said they will focus on data modernization and governance, AI-driven innovations for industries, cyber security and resiliency, and transformation of mission critical workloads to the cloud. Kyndryl will lead with advisory, implementation, and managed services for hybrid environments, Kyndryl stated. To read this article in full, please click here

RHEL 8.5 caters to multicloud, predictive analytics, containerization

Red Hat has rolled out version 8.5 of its main-line branch of Red Hat Enterprise Linux (RHEL), which upgrades its support for containerization, predictive analytics, and multicloud.Red Hat Insight, the company’s predictive-analytics service—available through most RHEL subscriptions—now has more robust abilities in the areas of vulnerability identification, compliance, and remediation, the company said.Containerization is upgraded with RHEL 8.5 to make containerized applications easier to deploy and manage, according to Red Hat. The company introduced the ability to create containerized images faster through rootless use of the OverlayFS filesystem. OverlayFS is “union file system,” which allows users to overlay one file system over another, enabling multiple users or applications to access it at the same time.To read this article in full, please click here

Drone demo shows it’s possible to protect 5G-managed devices from DDoS, exfiltration attacks

A demonstration earlier this year at Stanford School of Engineering proved that a small fleet of computer-controlled drones can maintain their flight integrity in the face of continual cyberattacks on the 5G network used to manage the devices through the deployment of software-defined networking (SDN).For enterprise IT pros charged with securing devices wirelessly across a 5G network, the drone test results are promising evidence that SDN can help networks under cyberattack to recover almost instantaneously.To read this article in full, please click here

Using chpasswd to change account passwords on Linux

The chpasswd command allows admins to change account passwords by piping username and password combinations to it.This can be done one-account-at-a-time or by putting all of the accounts to be modified in a file and piping the file to the command.[Get regularly scheduled insights by signing up for Network World newsletters.] How to use chpasswd Using the chpasswd command requires root privilege. You can switch to the root account and run a command like this:# echo nemo:imafish | chpasswd Better yet, you can use sudo with a command like this:To read this article in full, please click here

Rockport Networks debuts the “switchless” network

A startup called Rockport Networks has exited stealth mode with an intriguing product: a switchless network. It claims the Rockport Switchless Network product can move data faster and with better latency than switched networks.In a Rockport Switchless Network, switching functionality has been reassigned to intelligent endpoint network cards where these devices (nodes) become the network. Each device has an FPGA and can connect up to 24 endpoints to a dedicated 1U SHFL (pronounced “shuffle”) optical device using passive cabling.[Get regularly scheduled insights by signing up for Network World newsletters.] SHFLs need no power or cooling and can be linked together to scale out the network. Ethernet and InfiniBand traffic can be carried over the Rockport network. The network cards are standard, low-profile half height, half length (HHHL) PCIe cards.To read this article in full, please click here

Wacky as Facebook’s metaverse sounds, enterprises will have to deal with it

In our modern world, “metaverse” is the term applied to an artificial reality, a virtual world inhabited by avatars that represent real people and perhaps other AI virtual beings, too.What makes the concept relevant to enterprises are the Facebook decision to embrace metaverse as the future, the fact that others like Microsoft are following along, and the promise that it could redefine meetings, sales calls, support, and even work overall. Network planners would then have to consider its impact on traffic and connectivity.[Get regularly scheduled insights by signing up for Network World newsletters.] One big get-it-approved problem with the metaverse for enterprise is likely to be security. Facebook has had a lot of recent bad press for favoring profit over the welfare of its users, and that sort of thing sets compliance officers a-tingle, so self-hosting might be a solution. Executing that is partly a software issue and partly a network issue.The former, we can assume, would be handled by open-source development arising out of the interest Facebook has created. The latter isn’t as easy to dismiss.To read this article in full, please click here

Graphcore beefs up data center AI offerings

Graphcore, the British semiconductor company that develops accelerators for AI and machine learning, has greatly increased the performance of its massively parallel Intelligence Processing Unit (IPU) servers.Graphcore sells its AI-oriented chips in rack-mounted designs called IPU-PODs. Up until now, the maximum per cabinet has been 64 units (in the IPU-POD64). The newest racks are twice and four times as large: the IPU-POD128 and IPU-POD256. Read more: 10 of the world's fastest supercomputersTo read this article in full, please click here

How to right-size edge storage

Edge computing is shaping up as the most practical way to manage the growing volume of data being generated by remote sources such as IoT and 5G devices.A key benefit of edge computing is that it provides greater computation, network access, and storage capabilities closer to the source of the data, allowing organizations  to reduce latency. As a result, enterprise are embracing the model: Gartner estimates that 50% of enterprise data will be generated at the edge by 2023, and PricewaterhouseCoopers predicts the global market for edge data centers will reach $13.5 billion in 2024, up from $4 billion in 2017. To read this article in full, please click here

Gartner says IT spending to top $4 Trillion in 2022

With IT budgets growing at the fastest rate in 10 years, worldwide IT spending is projected to total $4.5 trillion in 2022, an increase of 5.5% from 2021, according to the latest Gartner forecasts.All IT spending segments—from data-center systems to communications services—are forecast to grow next year, according to Gartner.  [Get regularly scheduled insights by signing up for Network World newsletters.] Enterprise software is likely to have the highest growth in 2022 at 11.5%, driven by infrastructure software spending. Global spending on devices grew over 15%  as remote work, telehealth and remote learning took hold, and Gartner expects 2022 will continue that growth as enterprises upgrade devices and/or invest in multiple devices to support the hybrid work setting. “Enterprises will increasingly build new technologies and software, rather than buy and implement them, leading to overall slower spending levels in 2022 compared to 2021,” said John-David Lovelock, distinguished research vice president at Gartner.To read this article in full, please click here

Gartner says IT spending to top $4 trillion in 2022

With IT budgets growing at the fastest rate in 10 years, worldwide IT spending is projected to total $4.5 trillion in 2022, an increase of 5.5% from 2021, according to the latest Gartner forecasts.All IT spending segments—from data-center systems to communications services—are forecast to grow next year, according to Gartner.  [Get regularly scheduled insights by signing up for Network World newsletters.] Enterprise software is likely to have the highest growth in 2022 at 11.5%, driven by infrastructure software spending. Global spending on devices grew over 15% as remote work, telehealth and remote learning took hold, and Gartner expects 2022 will continue that growth as enterprises upgrade devices and/or invest in multiple devices to support the hybrid work setting. “Enterprises will increasingly build new technologies and software, rather than buy and implement them, leading to overall slower spending levels in 2022 compared to 2021,” said John-David Lovelock, distinguished research vice president at Gartner.To read this article in full, please click here

MTU size issues, fragmentation, and jumbo frames

The maximum transmission unit (MTU) is the largest number of bytes an individual datagram can have without either being fragmented into smaller datagrams or being dropped along the path between its source and its destination.For Ethernet frames—and many other types of packets—that number is 1500 bytes, and it generally meets the requirements of traffic that can cross the public internet intact.[Get regularly scheduled insights by signing up for Network World newsletters.] So, if 2000-byte Ethernet packets arrive at a router, it will split their payloads in two and repackage them into two packets that are each smaller than 1500 bytes and so meet the MTU.To read this article in full, please click here

Using the xargs command on Linux to simplify your work

The xargs command on Linux can make it easier to build and execute commands. If you want to run the same command for a group of files or users, xargs can often make that process easier. Here's a very simple example of xargs that creates or updates the update time on some files.$ echo file1 file2 file3 | xargs touch $ ls -l total 0 -rw-r--r--. 1 shs shs 0 Oct 15 12:41 file1 -rw-r--r--. 1 shs shs 0 Oct 15 12:41 file2 -rw-r--r--. 1 shs shs 0 Oct 15 12:41 file3 The command below is similar, but creates a file with blanks in its name because the -d specifies the input termination character.To read this article in full, please click here

Mid-band spectrum for 5G growing, with fits and starts

A new auction for enormously valuable mid-band spectrum and a rollback of availability for a different piece of it illustrates the uneven progress of 5G rollouts in the U.S. and represents a challenge for enterprises looking to take advantage of 5G technology. 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises The mid-band is valuable because it’s in a “Goldilocks” zone of the wireless spectrum—its frequencies are high enough to support higher throughput, while also being low enough to propagate effectively across relatively large areas.To read this article in full, please click here

1 2 3 332