Category Archives for "Network World Wireless"

Hook Up Your Business with Award-Winning Video Conferencing For As Little As $19.99/mo

If you’re still using a business landline, you’re likely not doing much business in 2018. Video conferencing is as commonplace as sending an email, and remote team members are increasing by the minute, making internet-based communication systems essential for any rising company. So if you’re finally looking to get your office set up with a state-of-the-art communications system, look no further than RingCentral, an award-winning VoIP (voice over internet provider). RingCentral offers comprehensive, affordable packages for any size organization, and you can set it up in minutes for as low as $19.99 per month. To read this article in full, please click here

Quantum-embedded chips could secure IoT

Microprocessors that are unique to each Internet of Things (IoT) device is the way forward in the ongoing and tricky quest to secure the IoT, says Crypto Quantique. One idea is that by making each chip one of a kind and unclonable, an application would become almost impossible to hack.The U.K.-based startup says it has introduced “the world's most advanced security product for IoT devices.” The microprocessor-based solution uses quantum physics, combined with cryptography, all embedded in silicon, it explained in a press release last October.To read this article in full, please click here

IoT for retailers: opportunities and challenges

The rise of the Internet of Things (IoT) is already having a profound impact on the world of retail, both online and in the brick-and-mortar world. But according to Darin Archer, chief marketing officer of ecommerce software vendor Elastic Path, we haven’t seen nothing yet.Via email, I asked Archer about the opportunities and challenges the IoT poses for retailers, and he offered some illuminating answers, including how IoT devices are “especially useful for routine purchases” and how they will increasingly pit retailers against manufacturers.[ Read also: 6 ways IoT is transforming retail ] Opportunity in the home, the car, online, and IoT devices That retailer/manufacturer competition will play out in four key fields, Archer said: the home, the car, online and social media, and from devices themselves.To read this article in full, please click here

Zipping files on Linux: the many variations and how to use them

Some of us have been zipping files on Unix and Linux systems for many decades — to save some disk space and package files together for archiving. Even so, there are some interesting variations on zipping that not all of us have tried. So, in this post, we’re going to look at standard zipping and unzipping as well as some other interesting zipping options. [ Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ] The basic zip command First, let’s look at the basic zip command. It uses what is essentially the same compression algorithm as gzip, but there are a couple important differences. For one thing, the gzip command is used only for compressing a single file where zip can both compress files and join them together into an archive. For another, the gzip command zips “in place”. In other words, it leaves a compressed file — not the original file alongside the compressed copy. Here's an example of gzip at work:To read this article in full, please click here

Edge gateways: Flexible, rugged IoT enablers

Edge gateways have emerged as architectural components that improve the performance of IoT networks, and vendors have stepped up with off-the-shelf devices flexible enough to meet the varying demands of individual deployments.To read this article in full, please click here(Insider Story)

Coding, cloud skills are most in demand for network pros

As more companies build their businesses around software, network and data-center pros will also be looking toward software to optimize their skills.While software may not be the first thing to come to mind when dealing with data centers, IT industry watchers say experienced network and infrastructure professionals would be wise to up their code game. Popular technology trends such as public, private and hybrid cloud, Internet of Things, artificial intelligence and machine learning will prompt network and data center pros to invest their training time and dollars in better understanding the software side of the IT house. BE SURE NOT TO MISS:To read this article in full, please click here

Oculeus anti-fraud offering protects against telecom system abuse

When most enterprise companies worry about having their systems hacked by attackers, the main concern is for the enterprise networks. Few companies consider that their phone systems may be vulnerable to hacking resulting in costly toll fraud. Nevertheless, the practice of hacking into corporate PBX systems and injecting fraudulent calls over the network is causing billions of dollars in damage worldwide every year.Enterprise companies use modern PBX (private branch exchange) systems to run their communications. A PBX switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines. Modern PBX systems work on the Session Initiation Protocol (SIP), which is a signaling protocol used for initiating, maintaining, and terminating real-time sessions that include voice, video, and messaging applications.To read this article in full, please click here

Intel announces new data center processors and more

The Consumer Electronics Show (CES) may seem like an odd place to announce server processors, but Intel knows full well the eyes of the tech world are on the show. And what better place to corral a bunch of journalists?First up was shipment of the new Xeon Scalable CPU, code-named Cascade Lake, featuring improved artificial intelligence (AI) and memory capabilities. Cascade Lake is the first to feature support to the company's Optane DC persistent memory and instruction set, called DL Boost, to facilitate AI-based deep learning (DL) inference.Optane memory goes in the memory slots and has the persistence of flash but better performance. Think of it as a cache between the SSD and the main memory. It will also support multiple terabytes of memory per socket.To read this article in full, please click here

Edge computing best practices

Data processing, analytics, and storage increasingly are taking place at the network edge, close to where users and devices need access to the information. Not surprisingly, edge computing is becoming a key component of IT strategy at a growing number of organizations.A recent report from Grand View Research predicted the global edge computing market will reach $3.24 billion by 2025, expanding at a “phenomenal” compound annual growth rate (CAGR) of 41% during the forecast period.One of the biggest contributors to the rise of edge computing is the ongoing growth of the Internet of Things (IoT). The vast amounts of data created by IoT devices might cause delays and latency, Grand View says, and edge computing solutions can help enhance the data processing power, which further aids in avoiding delays. Data processing takes place closest to the source of the data, which makes it more feasible for business users to gain real-time insights from the IoT data devices are gathering.To read this article in full, please click here

Poor data-center configuration leads to severe waste problem

All of the monstrous data centers popping up globally are having multiple negative impacts on the planet, the EPA notes.First, there is the obvious effect, power consumption. Data centers account for 3 percent of the global electricity supply and consume more power than the entire United Kingdom.But beyond that is the waste caused by disposal. With Amazon and the like deploying more than a million physical servers per year globally, the old server equipment they replace have to go somewhere. The same goes for your old servers.[ Read also: Chip-cooling breakthrough will reduce data-center power costs | Get regularly scheduled insights: Sign up for Network World newsletters ] E-waste 70 percent of toxic waste The EPA estimates e-waste, disposed electronics, now accounts for 2 percent of all solid waste and 70 percent of toxic waste, thanks to the use of chemicals such as lead, mercury, cadmium and beryllium, as well as hazardous chemicals such as brominated flame retardants. A lot of that is old servers and components.To read this article in full, please click here

IDG Contributor Network: Did IoT cyberattacks cause NY power transformers to explode?

Officials blamed a power surge for the blackout on Dec. 28th that left LaGuardia airport in the dark for about 45 minutes, grounding flights. A look at the trend of power outages at American airports shows a disturbing pattern and possibly sinister cause.Background Attacking an adversary’s infrastructure is asymmetrical warfare. It causes a lot of damage for a very small cost. Cyberattacks are an ideal weapon as they disguise who might be behind them, making retaliation much harder.  Attacks on the power grid for airports are especially devastating as they ground flights, stranding passengers and disrupting business nationwide. Just take a look at recent power outages:To read this article in full, please click here

How blockchain will transform the IoT

Two giant industrials, Bosch and Volkswagen, are among companies that are taking seriously the idea that the Internet of Things (IoT) and decentralized data marketplaces should co-exist. That means a type of "blockchain meets IoT" is likely in our future.Both German organizations have recently teamed up with fellow-country, decentralized transactional platform IOTA on various development projects. IOTA’s Tangle is a transactional data transfer and settlement system for connected devices.[Also see our corporate guide to addressing IoT security. ] Bosch announced in November that it intends to use a combination of its XDK (Cross Domain development Kit) product (an IoT prototyping and programmable sensor module used as a come-on to get organizations to work with Bosch on custom mass production and series engineering), and morph XDK with IOTA marketplace along a masked communications channel.To read this article in full, please click here

Six IoT predictions for 2019

This time of year, it can seem like the world is swimming in predictions for the new year, and the Internet of Things (IoT) is no exception. In fact, in fast-evolving areas like IoT, multitudes of trends and opportunities and challenges are in play, making predictions ridiculously easy — just about anything can happen, and probably will.[ Also read: Gartner’s top 10 IoT trends for 2019 and beyond | Get regularly scheduled insights: Sign up for Network World newsletters ] So, my goal here is to identify a set of IoT predictions that are both likely to happen … and likely to have a significant impact on the development and implementation of the technology.To read this article in full, please click here

Linux commands for measuring disk activity

Linux systems provide a handy suite of commands for helping you see how busy your disks are, not just how full. In this post, we're going to examine five very useful commands for looking into disk activity. Two of the commands (iostat and ioping) may have to be added to your system and these same two commands require you to use sudo privileges, but all five commands provide useful ways to view disk activity.Probably one of the easiest and most obvious of these commands is dstat.dtstat In spite of the fact that the dstat command begins with the letter "d", it provides stats on a lot more than just disk activity. If you want to view just disk activity, you can use the -d option. As shown below, you’ll get a continuous list of disk read/write measurements until you stop the display with a ^c. Note that, after the first report, each subsequent row in the display will report disk activity in the following time interval and the default is only one second.To read this article in full, please click here

Network management must evolve in order to scale container deployments

Applications used to be vertically integrated, monolithic software. Today, that’s changed, as modern applications are composed of separate micro-services that can be quickly brought together and delivered as a single experience. Containers allow for these app components to be spun up significantly faster and run for a shorter period of time providing the ultimate in application agility.  The use of containers continues to grow. A recent survey from ZK Research found that 64 percent of companies already use containers, with 24 percent planning to adopt them by the end of 2020. (Note: I am an employee of ZK Research.) This trend will cause problems for network professionals if the approach to management does not change.To read this article in full, please click here

Cisco patches a critical patch on its software-license manager

Cisco this week said it patched a “critical” patch for its Prime License Manager (PLM) software that would let attackers execute random SQL queries.The Cisco Prime License Manager offers enterprise-wide management of user-based licensing, including license fulfillment.RELATED: What IT admins love/hate about 8 top network monitoring tools Released in November, the first version of the Prime License Manager patch caused its own “functional” problems that Cisco was then forced to fix. That patch, called ciscocm.CSCvk30822_v1.0.k3.cop.sgn addressed the SQL vulnerability but caused backup, upgrade and restore problems, and should no longer be used Cisco said.To read this article in full, please click here

Want to use AI and machine learning? You need the right infrastructure

Artificial intelligence (AI) and machine learning (ML) are emerging fields that will transform businesses faster than ever before. In the digital era, success will be based on using analytics to discover key insights locked in the massive volume of data being generated today.In the past, these insights were discovered using manually intensive analytic methods.  Today, that doesn’t work, as data volumes continue to grow as does the complexity of data. AI and ML are the latest tools for data scientists, enabling them to refine the data into value faster.[ Also read: Network operations: A new role for AI and ML | Get regularly scheduled insights: Sign up for Network World newsletters ] Data explosion necessitates the need for AI and ML Historically, businesses operated with a small set of data generated from large systems of record. Today’s environment is completely different where there are orders of magnitude more devices and systems that generate their own data that can be used in the analysis. The challenge for businesses is that there is far too much data to be analyzed manually. The only way to compete in an increasingly digital world is to use AL and ML.To read Continue reading

BrandPost: 5 Steps to Get Ready for 802.11ax

It’s a mobile, cloud and IoT world. Whether it’s a workplace, a classroom or a dorm room, people are using a variety of devices beyond the usual phone and laptop combo—smart TVs, gaming consoles and fitness trackers, for starters. Offices, stores and manufacturing floors are outfitted with sensors that keep us safe, regulate the temperature, water the plants and run the production line. People use a broad variety of applications such as voice and video from their mobile devices. And expectations are at an all-time high. People will simply ditch digital services that don’t work. No one wants jittery presentations and dropped calls. The network experience must be flawless.To read this article in full, please click here

1 2 3 331