Archive

Category Archives for "Network World Wireless"

SSDs get bigger, while prices get smaller

With so much going on in the enterprise storage world, two bits of good news have come out — and it’s only Tuesday. Capacity is going up, and prices are coming down.According to the report from DRAMeXchange, the enterprise SSD market has been growing fast. It projects enterprise SSD sales to top 30 million units this year, up from fewer than 20 million units in 2016, and that rate of growth is expected to continue in the next three years.That’s despite tight supply for memory chips in the first quarter resulting in high average selling prices. For the second quarter, which we are in the midst of, DRAMeXchange expects a rebound in demand due to increased supply.To read this article in full, please click here

IDG Contributor Network: Build your technology layers on a cloud data foundation

The modern enterprise is comprised of a complex set of application stacks that span a disparate variety of virtual machines, physical servers, and proprietary storage hardware. Tentacles reach from headquarters, branch and remote offices, and offshore facilities around the world to technology stacks, SaaS providers and a multitude of applications.Over the years layer after layer of technology has accumulated, but rather than replace what came before, we simply built on top through a long series of incremental decisions and implementations. For many, mainframes were bolstered by a client-server layer that moved into data centers. Web technology added SaaS beyond our data centers before virtualization and server consolidation reorganized everything into more manageable chunks.To read this article in full, please click here

How to use logger on Linux

The logger command provides an easy way to add log files to /var/log/syslog — from the command line, from scripts, or from other files. In today's post, we'll take a look at how it works.How easy is easy? This easy. Just type logger <message> on the command line and your message will be added to the end of the /var/log/syslog file.$ logger comment to be added to log $ tail -1 /vvar/log/syslog May 21 18:02:16 butterfly shs: comment to be added to log Command output You can also add the output from commands by enclosing the commands in backticks.$ logger `who` $ tail -1 /var/log/syslog May 21 18:02:43 butterfly shs: shs pts/0 2018-05-21 15:57 (192.168.0.15) [ Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ] Content from a file The contents of text files can be added by using the -f option. Put the name of the file to be added to the log following the -f option as shown below.To read this article in full, please click here

Using logger on Linux

The logger command provides an easy way to add log files to /var/log/syslog -- from the command line, from scripts or from other files. In today's post, we'll take a look at how it works.How easy is easy? This easy. Just type logger <message> on the command line and your message will be added to the end of the /var/log/syslog file.$ logger comment to be added to log $ tail -1 /vvar/log/syslog May 21 18:02:16 butterfly shs: comment to be added to log Command output You can also add the output from commands by enclosing the commands in backticks.$ logger `who` $ tail -1 /var/log/syslog May 21 18:02:43 butterfly shs: shs pts/0 2018-05-21 15:57 (192.168.0.15) Content from a file The contents of text files can be added by using the -f option. Put the name of the file to be added to the log following the -f option as shown below.To read this article in full, please click here

Asigra evolves backup/recovery to address security, compliance needs

As backup and recovery products and solutions evolve, they are beginning to intersect with security and compliance. Online backup and recovery software company Asigra has announced a new version of its software that addresses the risks posed by ransomware and non-compliance with Article 17 of the European Union’s General Data Protection Regulation (GDPR). Both should be a concern for organizations of all sizes, from global enterprises on down to small/medium businesses.Let’s take a look at the new capabilities that Asigra is bringing to market with the version 14 release of its Cloud Backup software, and why these capabilities are an important evolution in backup and recovery.To read this article in full, please click here

Access management is critical to IoT success

Onboarding devices has always been kind of a pain, but IT has managed to muddle its way through the process.The bring your own device (BYOD) wave hit created some problems. Still, many organizations allowed employees to bring those devices onto the network by shifting the responsibility to the end user. What happens, though, when there are so many new devices that IT can’t keep up? Or when devices are brought in without IT’s knowledge? That’s the trend businesses are about to face as the Internet of Things (IoT) goes mainstream.[ Read also: Network World's Corporate Guide to Addressing IoT Security. ] The IoT era is here, and it’s about to make IT’s life a lot more difficult The IoT era has arrived, and I say this because more and more companies I talk to are connecting non-traditional IT devices, such as lighting systems and point-of-sale devices, to the internet without uttering the phrase “IoT.” It’s no longer this futuristic thing that we ponder and pontificate over.To read this article in full, please click here

Cost-savings theme pervades IBM storage news

A flurry of storage announcements from IBM share a common theme: Helping customers achieve greater efficiency and wring cost savings from their multitier, multi-cloud storage environments.Anchoring the news is IBM Storage Insights, a new AI and cloud-based storage management platform that’s designed to give users a fast view of storage capacity and performance, as well as make tiering recommendations to help cut storage costs. A single dashboard shows the status of block storage and captures trend information.[ Check out What is hybrid cloud computing and learn what you need to know about multi-cloud. | Get regularly scheduled insights by signing up for Network World newsletters. ] “Imagine you have an up-to-the-second event feed where you can see everything happening, not just on one of your arrays but across your entire environment,” said Sam Werner, vice president of offering management for IBM’s software-defined infrastructure (SDI) and storage software.To read this article in full, please click here

Review: Icinga enterprise-grade, open-source network monitoring that scales

Continuing our quest for robust, enterprise-grade open source network monitoring, we tested Icinga Core 2 (version 2.8.1) and the stand-alone Icinga Web 2 interface. Created in 2009 as a fork of the Nagios network monitoring tool, Icinga has come a long way.We found Icinga to be a powerful monitoring tool with many great features. The Core install is straightforward and basic monitoring is easy with either pre-configured templates or plugins. However, we discovered that the Web install is a bit more complicated and could stand to be streamlined. [ Don’t miss customer reviews of top remote access tools and see the most powerful IoT companies . | Get daily insights by signing up for Network World newsletters. ] Icinga runs on most of the popular Linux distros and the vendor provides detailed installation instructions for Ubuntu, Debian, Red Hat (including CentOS and Fedora) and SUSE/SLES. Icinga does not publish specific hardware requirements, but our installation ran well on a quad-core processor with 4 GB RAM and this is probably be a good starting point for a basic installation.To read this article in full, please click here

Cisco CEO trumpets Catalyst 9K advances, software business success

Industry bellwether Cisco revealed some important financial numbers this week – its revenues were $12.5 billion, up 4 percent for the third quarter year-over-year, with product revenue up 5 percent.But one of the of the more interesting tidbits is that the company said it was selling some 40 Catalyst 9000 systems a day in and has installed 2,700 of the big boxes this quarter bring the total to 5,800 since its introduction in 2017. The Catalyst 9000 is key to a number of Cisco’s future initiatives – one of the most important being its drive to build out its Network Intuitive plans for intent-based networking.[ Related: Getting grounded in intent-based networking] | The other is that the way its software is sold – via a variety of subscription/feature levels is a key component of its overall strategy to become a more software-oriented company.To read this article in full, please click here

Magnetic smart fabrics will store data in clothes

High-density data could one day be stored in fabric patches embedded in people’s clothing, say scientists at the University of Washington. Importantly, it wouldn’t require electricity, so the smart-fabric could be washed or ironed just like regular clothing. That could make it more convenient than other forms of memory.Off-the-shelf conductive thread, which the scientists say they recently discovered can be magnetized, is being used in trials. The data is read using a simple magnometer. The conductive thread is used commercially now in gloves for operating touch screens, for example.“You can think of the fabric as a hard disk,” said Shyam Gollakota, associate professor in the Paul G. Allen School of Computer Science & Engineering at the University of Washington, announcing the breakthrough on the school’s website at the end of last year. “You’re actually doing this data storage on the clothes you’re wearing.”To read this article in full, please click here

IDG Contributor Network: Rationale in irrationality – The coming of cloud bust?

Any technology, product, or service can become so popular that it develops a trendiness, in which case it becomes difficult to determine if the tool actually has its perceived value or is causing overzealousness in the market. Cloud computing has the huge visibility that could allow it to become an overvalued product, which could allow industry analysts to think it will expand more rapidly than it actually will. This article explores the current industry growth rate projections for the cloud and signs that these growth rates could begin to slow in the years ahead.The numbers: how fast is cloud growing? For many reasons, businesses are turning toward the cloud. One key one is that a greater understanding has developed that the security of cloud is preferable to the security of on-premise architecture.To read this article in full, please click here

Survey: Mainstream adoption of SDN, SD-WAN finally arrives

In 2018, for the first time cloud and software-defined data-center concerns have become the primary focus of enterprise network teams, bumping server virtualization from the top spot, according to an Enterprise management Associates (EMA) report based on a survey of 251 North American and European enterprise network managersThis is the first shift in their priorities for in more than a decade. Since 2008, EMA has been asking network managers to identify the broad IT initiatives that drive their priorities. Server virtualization has dominated their responses year after year. Cloud and software-defined data center (SDDC) architectures have always been secondary or tertiary drivers.To read this article in full, please click here

How Cisco’s Multigigabit Technology can increase network speeds

If you remember, in a previous Switch IT Up blog post I referenced Wireless AC and Wave 2 — some of the things that we could expect and some of the problems we could run up against. Things like having enough bandwidth to our APs to support a 6.8 gig connection.So, what can be done about that?Well, in 2015, Cisco introduced its Catalyst Multigigabit Technology, along with a new group of products, that address that issue and allow users to get more than just that 1 gig speed that most people have in their closets or in their infrastructure. How can users leverage that and still use their preexisting infrastructure rather than having to rip everything out and replace it?To read this article in full, please click here

What the big four U.S. mobile ISPs are doing with IoT

The Internet of Things is a business phenomenon at least as much as it is a technological one, which means that every company in the world with a possible angle on IoT is doing its best to claim a piece of the large and growing pie. In the case of the big four U.S. mobile data providers, the trick is selling more than just connectivity.To talk about the big four as a single entity, however, is slightly misleading. The bigger two – AT&T and Verizon – have a considerable lead in customer reach and technological maturity over T-Mobile and Sprint, with both of the former companies on track to deliver about $1 billion in IoT-related revenue in 2018, according to 451 Research vice president Brian Partridge.To read this article in full, please click here

Here’s what the big four U.S. mobile ISPs are doing with IoT

The Internet of Things is a business phenomenon at least as much as it is a technological one, which means that every company in the world with a possible angle on IoT is doing its best to claim a piece of the large and growing pie. In the case of the big four U.S. mobile data providers, the trick is selling more than just connectivity.To talk about the big four as a single entity, however, is slightly misleading. The bigger two – AT&T and Verizon – have a considerable lead in customer reach and technological maturity over T-Mobile and Sprint, with both of the former companies on track to deliver about $1 billion in IoT-related revenue in 2018, according to 451 Research vice president Brian Partridge.To read this article in full, please click here

How to speak Linux

I didn’t even stop to imagine that people pronounced Linux commands differently until many years ago when I heard a coworker use the word “vie” (as in "The teams will vie for the title") for what I’d always pronounced “vee I”. It was a moment that I’ll never forget. Our homogenous and somewhat rebellious community of Unix/Linux advocates seemed to have descended into dialects – not just preferences for Solaris or Red Hat or Debian or some other variant (fewer back in those days than we have today), but different ways of referring to the commands we knew and used every day.The "problem" has a number of causes. For one thing, our beloved man pages don't include pronunciation guidelines like dictionaries do. For another, Unix commands evolved with a number of different pronunciation rules. The names of some commands (like "cat") were derived from words (like "concatenate") and were pronounced as if they were words too (some actually are). Others derived from phrases like "cpio" which pull together the idea of copying (cp) and I/O. Others are simply abbreviations like "cd" for "change directory". And then we have tools like "awk" that go in an entirely different direction by Continue reading

What Qualcomm’s rumored exit from data centers means

The tech industry got a jolt last week worse than the 3.5 magnitude quake that hit Oakland, California, on Monday. A report by Bloomberg, citing the usual anonymous sources, said that after a whole lot of R&D and hype, Qualcomm was looking to shut down or sell its Centriq line of ARM-based data center processors.Qualcomm launched the 48-core Centriq 2400 last November. At the time, potential customers, such as Microsoft, Alibaba and HPE, took to the stage to voice their support and interest.To read this article in full, please click here

HPE snaps-up hyperconverged-network (HCN) vendor Plexxi

HPE today took a step toward bolstering its data-center technology with plans to acquire Plexxi and its hyperconverged networking fabric.HPE said it expects the deal to close in its third quarter, which ends July 31, 2018 but did not release other financial details. Plexxi was founded in 2010 and targeted the nascent software-defined networking (SDN) market.[ Check out our 12 most powerful hyperconverged infrasctructure vendors. | Get regularly scheduled insights by signing up for Network World newsletters. ] “Plexxi’s technology will extend HPE’s market-leading software-defined compute and storage capabilities into the high-growth, software-defined networking market, expanding our addressable market and strengthening our offerings for customers and partners,”To read this article in full, please click here

BrandPost: Using “The 3 V’s of Automation” to Maximize Automation ROI

For traditional Communications Service Providers (CSPs), the barriers to applying automation are coming down faster than ever before due to the use of new technologies such as analytics and machine learning. So, what is different, and why is now the time to act?The three V’s of automationWithin most traditional Operations Support System (OSS) projects there is an established methodology for identifying the environments best suited for automation. People use different names for these network automation target areas, but I like to refer to them as The Three V’s. These are:WHITE PAPERTo read this article in full, please click here

Hitachi, HPE and IBM enhance their SSD-based storage products

When three major vendors all make similar product announcements, you know things are cooking in that space. In this case, Hitachi Vantara, HP Enterprise, and IBM all made news around SSD-based storage, much of it related to de-duplication and other ways to get control over data creep.With users generating gigabytes of data every week, the solution for many enterprises has been to throw storage at it. That can get expensive, especially with SSD. SSD averages about 40 cents per gigabyte, while HDD storage averages about 5 cents per gigabyte.To get control over data sprawl, storage vendors are offering de-duplication, or in the case of Hitachi Vantara, better de-duplication with their new systems. We’ll run down the news alphabetically.To read this article in full, please click here

1 2 3 312