Archive

Category Archives for "Network World Wireless"

AWS wants to get your mainframe apps into the cloud – fast

AWS is now offering a mainframe service that promises to help Big Iron customers interested in moving apps to the cloud cut that migration time by two-thirds.The goal of AWS Migration Acceleration Program for Mainframe is to get those customers off of the Big Iron “as fast as they possibly can” in order to take better advantage of the cloud, according to Adam Selipsky, CEO of AWS, speaking at Amazon’s AWS re:Invent conference. [Get regularly scheduled insights by signing up for Network World newsletters.] “It can be a messy business and involves a lot of moving pieces, and it isn’t something that people really want to do on their own,” Selipsky said.  “And while AWS partners can help with the transition, it can still take a long time.”To read this article in full, please click here

Shortcuts for adding multiple lines of text to files on Linux

There are a number of ways to add text to files on Linux systems without having to open an editor, such as the echo and printf commands. On the other hand, when you need to add A LOT of text, the technique you use can make the job tedious or a piece of cake.This post describes some of the commands you can use and the problems and benefits you can expect.Also see: How to loop forever in bash on LinuxThe echo commands append lines of text to existing files in a straightforward way:To read this article in full, please click here

Quantum primacy: Is it real (and if so, does it matter)?

The nexus of the ongoing competition among nations and corporations (such as   Google and IBM) to demonstrate quantum primacy has shifted to a university in China where not one, but two experimental quantum computers reportedly have shown that quantum primacy is attainable.Quantum primacy is when a quantum computer is able to solve computational problems that are beyond the ability of traditional “classical” computers, yoked as they are to their quaint system of ones and zeroes.Researchers show quantum computers can reason Don’t get me wrong; classical computers long have served with distinction. So did the abacus in its day. However, as society’s computational challenges became more complex--such as splitting a restaurant bill 11 ways among your cheap and quarrelsome family members--this ancient calculating device eventually gave way to the digital calculator.To read this article in full, please click here

SmartNICs set to infiltrate enterprise networks

Enterprise infrastructure that supports data center, cloud and edge networks could someday be dominated by one of its tiniest components--the smartNIC or data processing unit (DPU).Use of smartNICs in the enterprise is still evolvinging, but the idea behind them--offloading server CPU duties onto a separate device to free up server cycles--is not new. Specialized hardware accelerators such as graphics processing units (GPU), field-programmable gate arrays (FPGA), and focused NICs have offloaded CPU workloads in telco, financial, and scientific application processing. NaaS is the future but it's got challenges Looking ahead, users and vendors see a way to reduce enterprise costs, improve performance and increase security with smartNICs.To read this article in full, please click here

FCC auction for prime 5G bandwidth rakes in $21.8B

The FCC auction for a prime band of 5G wireless spectrum has attracted $21.8 billion in bids, underscoring the importance of the frequency blocks that range from 3.5GHz to 3.55GHz.Of the 4,060 blocks available for discrete geographic areas throughout the country, all but 19 sold during the 29-day auction, according to the FCC.[Get regularly scheduled insights by signing up for Network World newsletters.] Carriers have been hungrily buying up this mid-range spectrum that some call the Goldilocks Zone because its transmissions propagate over a significant distance and also support high data rates. Earlier this year an auction for blocks of spectrum in the 3.7GHz (C-band) range raised more than $81 billion. To read this article in full, please click here

Xilinx launches a data-center accelerator for HPC

Xilinx has introduced its latest data-center accelerator, the Alveo U55C, which it says is its most powerful accelerator yet thanks to a memory change.For the most part, the FPGA-powered Alveo U55C is similar to its predecessor, Alveo U280. But the U280 has 8GB of HBM2 memory and 16GB of DDR4 DRAM, while the U55C comes with 16GB of HBM2 memory, and no DDR4. HBM2 is considerably faster and more expensive than DDR4 memory.[Get regularly scheduled insights by signing up for Network World newsletters.] By going to all HBM2 and removing the DDR4, Xilinx is able to increase performance and considerably reduce power and size. The Alveo U55C card is a single-slot full height, half length (FHHL) form factor vs. the full height, full length, dual width form of the U280. It also has a much lower power draw, 150W vs. 215W.To read this article in full, please click here

Spinoffs Kyndryl and VMware team up on multicloud

The two new spinoffs on the block—Kyndryl and VMware—have expanded their relationship and promised to help customers with their app modernization and multicloud plans.Under the agreement the companies say they will focus on developing a range of services aimed at multicloud infrastructure and management, digital workspace, managed applications, and other areas.[Get regularly scheduled insights by signing up for Network World newsletters.] “Our combination with VMware is especially important as Kyndryl continues to invest in our industry-leading skills in key areas, most notably in cloud, network and edge computing, and in security and resiliency services,” said Martin Schroeter, Chairman and CEO of Kyndryl in a statement. Through previous agreements, Kyndryl already has thousands of staffers with VMware certifications.To read this article in full, please click here

IDC: Cisco, Fortinet, HPE-Aruba, VMware lead hot SD-WAN market

Cisco, Fortinet, HPE-Aruba, and VMware lead the evolving and highly-competitive software-defined wide-area networking (SD-WAN) market according to a new report from IDC. “MarketScape: Worldwide SD-WAN Infrastructure 2021 Vendor Assessment” looks at the capabilities of 12 SD-WAN infrastructure vendors evaluating then on a core set of SD-WAN features such as WAN routing, WAN link management, application-based policy controls, and application steering and prioritization.Beyond these features, most current SD-WAN  packages include others such as optimized connections to public clouds (IaaS and SaaS), WAN-link visibility and analytics, end-user experience monitoring, zero-touch provisioning, and forward error correction, according to the author of the report, Brandon Butler, IDC research manager, Enterprise Networks.To read this article in full, please click here

Researchers warn of Bluetooth Classic security vulnerability, release proof-of-concept

Researchers at Singapore University of Technology and Design has released a proof-of-concept exploit for a family of vulnerabilities it has dubbed BrakTooth, which affects the software development kit used to program Bluetooth chipsets using the ESP32 standard.BrakTooth affects the Bluetooth Classic protocol, which is widely used in laptops, smartphones and audio devices. The team says 16 flaws make up BrakTooth, the effects of which, if exploited, range in severity from crashing affected systems to remote code execution.The most serious flaw, dubbed V1 by the team, targets the ESP32 SoCs used in industrial automation, smart home, and fitness applications, among others. Certain models of MacBooks and iPhones are known to be affected. Because the ESP32 BT Library does not correctly run an out-of-bounds check on certain types of inputs, a malicious request to the system can allow an attacker to inject code onto a vulnerable system and potentially take control.To read this article in full, please click here

How to inventory server hardware with PowerShell

Most of us have dealt with hardware that stays in service well past its planned end-of-life date or that, for reasons of budget and bureaucracy, doesn’t even make it into service until well into its lifespan.Step one in planning and prioritizing server-hardware upgrades is inventorying and evaluating your existing hardware, which may seem like an appropriate job for an IT intern, it’s also a perfect job for PowerShell.[Get regularly scheduled insights by signing up for Network World newsletters.] Read system telemetry with PowerShell The primary PowerShell cmdlet throughout this discussion is Get-WmiObject. Most server admins will have at least a passing familiarity with Windows Management Interface (WMI), a set of telemetry points to help monitor performance and server health, among other things. WMI is frequently used to filter the application of Group Policy Objects to only those computers that meet a specific set of criteria. WMI is Microsoft’s implementation of Common Information Model (CIM), which is an industry standard. The Get-WmiObject cmdlet is able to access both WMI and CIM classes.To read this article in full, please click here

Palo Alto software advances end-to-end enterprise cloud security

Palo Alto Networks has bolstered its security software to better protect  enterprise Software-as-a-Service (SaaS) applications.The company rolled out a new version of its core cloud-security package, Prisma Cloud 3.0, which includes the ability to code security directly into SaaS applications. The package includes a cloud-access security broker (CASB) to control access to cloud resources.[Get regularly scheduled insights by signing up for Network World newsletters.] Prisma is a cloud-based security bundle that includes access control, advanced threat protection, user-behavior monitoring, and other services that promise to protect enterprise applications and resources. Managed through a single console, Prisma includes firewall as a service, Zero Trust network access and a secure web gateway. To read this article in full, please click here

New Cisco/Intel feature provides troubleshooting data from Intel Wi-Fi endpoints

Cisco and Intel have extended their technology relationship to enable Cisco Wi-Fi gear to gather data from Intel-based PCs in order to troubleshoot and optimize wireless connections for end-user machines.The companies announced Intel Connectivity Analytics, a feature that helps to evaluate Wi-Fi connectivity and for IT teams to monitor wireless resources.[Get regularly scheduled insights by signing up for Network World newsletters.] The feature is supported by Intel-based PCs deployed with Wi-Fi 6/6E chipsets and Cisco Wi-Fi offerings including the Cisco Catalyst 9800 series wireless-controller family, its Embedded Wireless Controller, and the full range of Meraki cloud-managed access points.To read this article in full, please click here

New Cisco/Intel feature provides troubleshooting-data from Intel Wi-Fi endpoints

Cisco and Intel have extended their technology relationship to enable Cisco Wi-Fi gear to gather data from Intel-based PCs in order to troubleshoot and optimize wireless connections for end-user machines.The companies announced Intel Connectivity Analytics, a feature that helps to evaluate Wi-Fi connectivity and for IT teams to monitor wireless resources.[Get regularly scheduled insights by signing up for Network World newsletters.] The feature is supported by Intel-based PCs deployed with Wi-Fi 6/6E chipsets and Cisco Wi-Fi offerings including the Cisco Catalyst 9800 series wireless-controller family, its Embedded Wireless Controller, and the full range of Meraki cloud-managed access points.To read this article in full, please click here

Nvidia announces new InfiniBand networking hardware

Networking equipment was the news of the day at Nvidia’s GPU Technology Conference (GTC), with new hardware for improved end-to-end performance.Nvidia announced the Quantum-2 platform, a 400Gbps InfiniBand networking platform consisting of the Quantum-2 switch, ConnectX-7 network adapter, BlueField-3 data processing unit (DPU), and all the software to support the new architecture.[Get regularly scheduled insights by signing up for Network World newsletters.] At 400Gbps, NVIDIA Quantum-2 InfiniBand doubles the network speed and triples the number of network ports over the Quantum-1 product. With a three-fold performance increase in performance, data-center fabric switches can be reduced by six-fold, cutting data center power consumption and reducing the overall data center space by 7%, the company says.To read this article in full, please click here

Rethinking the WAN: Zero Trust network access can play a bigger role

The WAN as initially conceived was about one simple job: the WAN was the network that “connects my sites to each other.” That is, the network connecting users in corporate sites to corporate IT resources in other corporate sites or perhaps colocation facilities. It was all inside-to-inside traffic.Over the past decade so much has changed that, just before COVID-19 work-from-home mandates took hold, only about 37% of a typical WAN’s traffic was still inside-to-inside, according to Nemertes’ “Next Generation Networks Research Study 2020-2021”. The rest touched the outside world, either originating there as with remote work against data-center systems or terminating there as with SaaS use from a company site or both as with VPNing into the network only to head back out to a SaaS app.To read this article in full, please click here

3 steps to improve collaboration between networking and security pros

(Enterprise Management Associates finds that enterprises are trying to improve collaboration between their network-infrastructure and operations teams and their information-security and cybersecurity teams. This article discusses challenges faced by these teams based on a survey of 366 IT and security professionals detailed in the report “NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transformation”, by EMA Vice President of Research Networking Shamus McGillicuddy.)To read this article in full, please click here

Monitoring Linux system resources with bpytop

The bpytop tool is similar to other performance monitoring tools available for Linux systems like top, iotop, htop, bashtop etc. It’s a terminal-based resource monitor that works efficiently and is visually appealing.The tool was ported from bashtop and rewritten in Python, so you need to have Python—version 3.6 or later—installed on your system to use it. (The “bpy” portion of the name undoubtedly stands for “bash Python”.)If you already have Python installed on your system, you can check the version using one of these sets of commands:Fedora Linux Mint ====== ========== $ which python $ which python3 /usr/bin/python /usr/local/bin/python3 $ python -V $ python3 -V Python 3.9.7 Python 3.8.10 Both systems shown are running Python3, but the Fedora system has /usr/bin/python set up as a symbolic link to python and the other system does not. So, they’re both using Python3.To read this article in full, please click here

3 steps to better collaboration between networking and security pros

(Enterprise Management Associates finds that enterprises are trying to improve collaboration between their network-infrastructure and operations teams and their information-security and cybersecurity teams. This article discusses challenges faced by these teams based on a survey of 366 IT and security professionals detailed in the report “NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transformation”, by EMA Vice President of Research Networking Shamus McGillicuddy.)To read this article in full, please click here

Nvidia jumps into Zero Trust

Nvidia has announced a Zero Trust platform built around its BlueField data-processing units and Nvidia software.Zero Trust is an architecture that verifies every user and device that tries to access the network and enforces strict access control and identity management that limits authorized users to accessing only those resources they need to do their jobs.[Get regularly scheduled insights by signing up for Network World newsletters.] “You cannot just rely on the firewall on the outside, you have to assume that any application or any user inside your data center is a bad actor,” said Manuvir Das, head of enterprise computing at Nvidia. “Zero Trust basically just refers to the fact that you can't trust any application or user because there are bad actors.”To read this article in full, please click here

Kyndryl weds Microsoft to grow cloud services

IBM spin-off Kyndryl has made the first of what likely will be many strategic cloud partnerships with a pact with business software giant Microsoft.Under the agreement the companies will develop new products built on Microsoft Cloud and aimed at facilitating digital transformation, Kyndryl stated. Microsoft has also become Kyndryl’s only Premier Global Alliance Partner.[Get regularly scheduled insights by signing up for Network World newsletters.] Microsoft will sell products developed by the two companies through its global enterprise sales force and will develop a Microsoft Cloud training ground for employees called Kyndryl University for Microsof. The companies said they will focus on data modernization and governance, AI-driven innovations for industries, cyber security and resiliency, and transformation of mission critical workloads to the cloud. Kyndryl will lead with advisory, implementation, and managed services for hybrid environments, Kyndryl stated. To read this article in full, please click here

1 2 3 373