Category Archives for "Network World SDN"

Ubuntu’s Cosmic Cuttlefish brings performance improvements and more

Canonical has just recently announced that Ubuntu 18.10, code named 'Cosmic Cuttlefish', is ready for downloading at the Ubuntu release site. Some of the features of this new release include: the latest version of kubernetes with improved security and scalability access to 4,100 snaps better support for gaming graphics and hardware including support for the extremely fast Qualcomm Snapdragon 845 fingerprint unlocking for compatible systems (e.g., Ubuntu phones) The new theme The Yaru Community theme -- the theme for Ubuntu 10.18 -- is included with Ubuntu 18.10 along with a new desktop wallpaper that displays an artistic rendition of a cuttlefish (a marine animal related to squid, octopuses, and nautiluses).To read this article in full, please click here

BrandPost: Top Ten Reasons to Think Outside the Router – No. 10: It’s Getting Cloudy

Borrowing from the iconic David Letterman Top Ten List segment from his former Late Show, this new blog series will countdown the Top Ten Reasons to Think Outside the Router.The #10 reason it’s time to retire traditional routers at the branch: It’s getting cloudy! In fact, it’s already cloudy. In November 2017, Forrester projected that 2018 would be the year that more than 50% of enterprise applications would be hosted in public and private clouds. Here we are in 2018, and  96% of 997 SMB and enterprise companies surveyed now use cloud services. The migration to cloud-based applications and infrastructure continues to accelerate and is happening faster than anyone predicted. The challenge: enterprise router-centric WAN architectures weren’t designed for the cloud.To read this article in full, please click here

Rackspace launches disaster recovery as a service program

Give managed cloud computing provider Rackspace points for timing. Coming right after the Uptime Institute issued a warning for data center operators to improve their environmental disaster plans, the company announced it is broadening its existing disaster recovery as a service (DRaaS) program for on-premises, colocation, and multi-cloud environments.The expansion utilizes Zerto’s disaster recovery software, which is specifically designed to provide business continuity and disaster recovery in a cloud and virtualized environment.To read this article in full, please click here

OpenStack Foundation releases software platform for edge computing

The OpenStack Foundation, the joint project created by NASA and Rackspace to create a freely usable Infrastructure-as-a-Service (IaaS) platform, has announced the initial release of StarlingX, a platform for edge computing.StarlingX is designed for remote edge environments, offering node configuration in host, service management, and perform software updates remotely. It can also warn operators if there are any issues with the servers or the network.The foundation says the platform is optimized for low-latency, high-performance applications in edge network scenarios and is primarily aimed at carrier networking, industrial Internet of Things (IIoT), and Internet of Things (IoT).To read this article in full, please click here

The best enterprise level firewalls: Rating 10 top products

You know you need to protect your company from unauthorized or unwanted access. You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall.To read this article in full, please click here(Insider Story)

How we selected 10 hot business continuity startups to watch

The selection process for our business-continuity-startup roundup began with dozens of recommendations and nominations sent via HARO, LinkedIn, Twitter, and subscribers to the Startup50 email newsletter.This roundup, however, was challenging to flesh out because in the IT world, business continuity is a subset of storage.[ Check out 10 hot storage companies to watch. | Get regularly scheduled insights by signing up for Network World newsletters. ] Plenty of vendors pitched DevOps, security, and networking companie but none of those were a good fit for business continuity. You could make a case that all of those things help ensure business continuity, but they all fit better in different categories.To read this article in full, please click here

10 hot business-continuity startups to watch

In the current landscape business continuity is about a lot more than natural disasters: Denial of service attacks, ransomware and even network outages can undermine business continuity, and while moving applications to the cloud might seem like a viable solution, cloud providers aren’t immune to outages.To read this article in full, please click here(Insider Story)

Wi-Fi site survey tips

Wi-Fi can be fickle. The RF signals and wireless devices don’t always do what’s expected – it’s as if they have their own minds at times. A Wi-Fi network that’s been quickly or inadequately designed can be even worse, spawning endless complaints from Wi-Fi users. But with proper planning and surveying, you can better design a wireless network, making you and your Wi-Fi users much happier. Here are some tips for getting started with a well-planned Wi-Fi site survey.Use the right tools for the job If you’re only trying to cover a small building or area that requires a few wireless access points (AP), you may be able to get away with doing a Wi-Fi survey using a simple Wi-Fi stumbler or analyzer on your laptop or mobile device. You’ll even find some free apps out there. Commercial options range from a few dollars to thousands of dollars for the popular enterprise vendors.To read this article in full, please click here

Red Hat underpins the growing importance of Linux and open source

While you may not spend a lot of time thinking about this, the role Linux plays in the technology that we all use everyday is growing quite significantly. In an effort to more fully appreciate this, I had an opportunity to speak with the new vice resident and general manager of Red Hat's RHEL Business Unit — Dr. Stefanie Chiras — and ask about her vision for RHEL and Linux in general. She was very enthusiastic — not just for Red Hat, but for the open source movement overall and the rising importance of Linux.Chiras started with Red Hat in July — not quite four months ago — and already describes herself as a “true Red Hatter.” She explained that she has had a serious focus on Linux for the last six years or more. As she points out, we all do development differently these days because of the open source movement. The changes in just the last five years have moved us to very different ways of doing things whether we're working on public or private clouds, containers, or bare metal.To read this article in full, please click here

Uptime Institute issues a weather warning for data centers

Data center operators have to take a number of contingencies into account, but many are failing to pay attention to the increase in natural disasters, such as hurricanes, floods, and wildfires.That’s the word from The 451 Group’s Uptime Institute, which published a report on the impact of natural disasters on data centers. Uptime issued the report to remind data center operators of the growing impact of climate change on data center operations.“Climate change is making us rethink resiliency and operational uptime. Now more than ever, it is crucial to understand any potential vulnerabilities to make new and existing facilities better prepared for extreme weather events,” the report states.To read this article in full, please click here

BrandPost: The Marketplace Requirement for a Secure SD-WAN

When SD-WANs first began to be discussed, the focus of the discussion was on the potential cost savings that would result from incorporating more cost-effective broadband connectivity into the WAN. Reducing cost is clearly an important goal, but achieving that goal is only meaningful if the WAN is also providing all the requisite functionality. This blog will discuss the importance of WAN functionality such as security and the ability to effectively support cloud computing. This blog will also identify the key characteristics of a secure SD-WAN.Required WAN Functionality The functionality that WANs must provide was identified in the 2018 Guide to WAN Architecture and Design. That guide presented the results of a survey in which the respondents were presented with fifteen factors and asked to choose the top three factors that would likely have the most impact on their WAN over the next twelve months. The factors that were the most important are shown in Figure 1.To read this article in full, please click here

Wave energy to power undersea data centers

Offshore, underwater data centers are going to be powered using wave motion, says a sustainable energy developer. And it's going to happen soon.Commercial wave energy company Ocean Energy says it’s almost completed a marine hydrokinetic wave generator build and that the 1.25 Megawatt power-production capacity vessel will be ready to deploy in 2019.The 125-feet-long wave converter OE Buoy will provide enough electricity for a subsea data center platform, the company claims.“Technology companies will be able to benefit from wave power [in] marine-based data storage and processing centers,” Ocean Energy CEO John McCarthy said in a press release earlier this month. “OE Buoy presents them with the potential double-benefit of ocean cooling and ocean energy in the one device.”To read this article in full, please click here

Making better use of your Linux logs

Linux systems maintain quite a collection of log files, many of which you are probably rarely tempted to view. Some of these log files are quite valuable though and options for exploring them might be more interesting and varied than you imagine. Let's look at some system logs and get a handle on some of the ways in which log data might be easier to probe.Log file rotation First, there's the issue of log rotation. Some Linux log files are “rotated”. In other words, the system stores more than one "generation" of these files, mostly to keep them from using too much disk space. The older logs are then compressed, but left available for a while. Eventually, the oldest in a series of rotated log files will be automatically deleted in the log rotation process, but you’ll still have access to a number of the older logs so that you can examine log entries that were added in the last few days or weeks when and if you need to look a little further back into some issue you're tracking.To read this article in full, please click here

BrandPost: When Will We Be Able to Purchase 802.11ax Access Points and Client Devices?

Today we focus on when new 802.11ax access points and client devices will become available. The Wi-Fi industry has made these questions uniquely difficult to answer, but this blog explains what we expect to happen. If you have the patience, save these predictions for rereading toward the end of 2019!The three important milestones along the path to commercial equipment are the IEEE 802.11ax standard, the Wi-Fi Alliance 11ax certification, and integrated circuit chips. These are a sequence in time, but with a lot of overlap.The First Milestone: IEEEThe IEEE writes standards: very detailed definitions of the packet formats, fields, and functions that make the protocols work. IEEE 802.11ax is written as an amendment to the current 802.11 standards and eventually will be folded into the mainstream 802.11 document. Even as an amendment, however, it is 600 pages long. Getting every detail of such a standard correct requires scrutiny from many experts, and the IEEE process involves reviewing drafts and submitting comments and corrections, which then update new drafts, and are reviewed again.To read this article in full, please click here