Archive

Category Archives for "Network World Wireless"

IDG Contributor Network: Network visibility and assurance for GDPR compliance

The EU General Data Protection Regulation, or GDPR, came into force on May 25. With every organization with customers and suppliers in the European Union now accountable for the way in which they handle or process personal data, much work has been done to ensure compliance by the deadline. As a result, all levels of a business are now concentrated on meeting the requirements of the new regulation, throwing the issue of data protection into focus like never before.When you consider how big and complex IT networks have become in recent times, however, it has become almost impossible to detect just when and how a security breach or network failure might occur. Unsurprisingly, network security and information assurance are crucial to GDPR compliance, with the regulation stating that measures must be put in place to mitigate the risk associated with assuring information integrity and availability in the face of threats such as malicious code or distributed denial of service (DDoS) attacks.To read this article in full, please click here

IDG Contributor Network: 6 sneaky ways cloud infrastructure providers lock you in

With more enterprises adopting multi-cloud and hybrid cloud computing strategies, it's more important than ever to avoid getting locked into just one cloud provider's tools and technologies. Multi-cloud and hybrid cloud deployments offer many benefits. They include the ability to pick and choose which cloud vendor's add-on services are right for your business, as well as the ability to implement best-of-breed solutions when the time is right. Multi-cloud also adds redundancy and security because all of your proverbial eggs are not in one basket.Despite the trend toward multi-cloud, however, there are still plenty of ways to find yourself locked in. Here's a quick look at six common ways enterprises get locked into using one provider, along with some advice on how businesses can keep cloud implementations open and interoperable. To read this article in full, please click here

Happy Amazon Crash Day

On one of the biggest shopping days of the year for Amazon.com the company’s web site crapped out intermittently for hours yesterday.Instead of Prime Day purchases, many customers just got error messages and pictures of the dogs of Amazon, along with a message from Amazon that read: "Sorry, we're experiencing unusually heavy traffic. Please try again in a few seconds. Your items are still waiting in your cart," or “"Uh-Oh. Something went wrong on our end." [ Related: How to plan a software-defined data-center network.] Prime Day started at 3PM ET and the problems emerged almost immediately after.  Around 5 p.m., Amazon tweeted acknowledgement of the problem stating: “Some customers are having difficulty shopping and we are working to resolve this issue quickly.  Many are shopping successfully – in the first hour of Prime day in the US, customers have ordered more items compared to the first hour last year.”To read this article in full, please click here

BrandPost: How Cloud Migration Impacts Network Infrastructure

The Cloud ImperativeEnterprise IT is increasingly a multi-cloud affair. With Gartner projecting that 85 percent of enterprises are currently using a multi-cloud strategy, it seems difficult to find an enterprise that doesn’t. IT leaders are like conductors – orchestrating SaaS, PaaS, and on-premises code and data in increasingly virtualized, software-defined environment. With the cloud taking center stage, what impacts does migration of workloads have on infrastructure overall?Migration Challenges for InfrastructureAs IT strives to be more responsive to both lines of business and development teams seeking to spin up new instances and environments, workloads often need to move – and rapidly. But workload mobility has a downside, namely an increasing demand on the shared services on- and off-premises.To read this article in full, please click here

IDG Contributor Network: The 5 pillars of cloud data management

As more and more businesses adopt cloud services, seizing on the latest software tools and development methodologies, the lines between them are blurring. What really distinguishes one business from the next is its data.Much of the intrinsic value of a business resides in its data, but we’re not just talking about customer and product data, there’s also supply chain data, competitor data, and many other types of information that might fall under the big data umbrella. Beyond that there are a multitude of smaller pieces of data, from employee records to HVAC system logins, that are rarely considered, but are necessary for the smooth running of any organization. And don’t forget about source code. Your developers are using cloud-based repositories for version control of application code. It also needs to be protected.To read this article in full, please click here

Extreme faces challenges, girds for future networking battles

Extreme Networks is contending for greater influence from the data center to the network edge, but it has some obstacles to overcome.The company is still grappling with how to best integrate, use and effectively sell the technologies it has acquired from Avaya and Brocade in the past year, as well as incorporate and develop its own products to do battle in the cloud, mobile and edge computing environments of the future. Remember, too, that Extreme bought wireless player Zebra Technologies in 2016 for $55 million.[ Now see: The hidden cause of slow internet and how to fix it.] In terms of results that Wall Street watches, Extreme Networks grew revenue 76% to $262 million in its recent fiscal third quarter. According to Extreme, those gains were fueled mostly by growth from its acquisitions and around an 8% growth in its own products. To read this article in full, please click here

Two studies show the data center is thriving instead of dying

Once again research is showing that rumors of the demise of the data center are greatly exaggerated. One study shows across-the-board growth in IT spending, while a second predicts that the financial services sector is really set to explode.Market research firm IHS Markit surveyed IT managers at 151 North American organizations and found that most of them expect to at least double the amount of physical servers in their data centers by 2019.“We are seeing a continuation of the enterprise DC growth phase signaled by last year’s respondents and confirmed by respondents to this study. Enterprises are transforming their on-premises DC to a cloud architecture, making the enterprise DC a first-class citizen as enterprises build their multi-clouds,” wrote Clifford Grossner, senior research director in the cloud and data center research practice at IHS Markit.To read this article in full, please click here

IDG Contributor Network: Machine learning takes a load off in network management

As networks become more software-driven, they generate vastly greater amounts of data, which provides some challenges: adhering to compliance and customer privacy guidelines, while harvesting the massive amounts of data—it is physically impossible for humans to tackle the sheer volume that is created. But the vast amounts of data also provide an opportunity for businesses: leveraging analytics and machine learning to gather insights that can help network management move from reactive to proactive to assurance. This doesn’t just mean a massive shift in technology because the human element won’t simply go away. Instead, by combining human intellect and creativity with the computing power AI offers, innovative design and management techniques will be developed to build self-improving intelligent algorithms. The algorithms allow networks to operate in a way that far outweighs networks of the past.To read this article in full, please click here

IDG Contributor Network: 4 ways data science services is helping businesses reach IoT goals, faster

Data scientists are an essential part of an IoT deployment. They fill a critical need to interpret data and provide valuable context around machine learning. However, as IoT initiatives expand and mature in a business, in-house data science resources can become thinly stretched. This creates a data pile-up that is a surefire way to set your deployment back.Hiring more data scientists is typically not an option either as there is a significant shortage in the market. Demand is only going up too: Gartner predicts that a shortage of data scientists will hinder 75% of organizations from reaching their full potential with IoT through 2020. Because hiring is difficult, time consuming and expensive, many organizations are turning to data science services to fill in resource gaps. Outsourcing data scientists has the dual benefit of helping keep IoT initiatives moving forward while freeing up internal resources to focus on other areas of the business.To read this article in full, please click here

BrandPost: 5G. More than just a wireless upgrade.

Ciena Brian Lavallée Senior Director of Portfolio Marketing with global responsibility for Ciena’s 5G, Packet, and Submarine networking solutions. 5G is the hottest topic in the wireless industry these days, but as Ciena’s Brian Lavallee explains, it means a massive upgrade to wireline network infrastructure as well. That’s why today Ciena has unveiled new capabilities to help network operators prepare for 5G.To read this article in full, please click here

Geeky ways to celebrate Friday the 13th

You're in luckWe've cobbled together a slew of things for the geeky among you to do on July 13 -- Friday the 13th that is. And we suggest you do it up because you won’t get another chance until Sept. 13, 2019.Don’t miss the day!Mobile apps exist solely for the purpose of reminding you when Friday the 13th is coming up. Pocketkai’s free iOS app will remind you of the one to three Friday the 13ths coming up each year for the next 50 years. The Bogeyman’s Android app will do likewise, for the next 10 Friday the 13ths.To read this article in full, please click here

OPAQ enables total network security from the cloud

Today’s threat landscape has led organizations to defend their networks with numerous point solutions, most of which are complex and require significant attention to operations and ongoing maintenance. While large enterprises often have sufficient skilled resources to support the security infrastructure, small- to medium-sized businesses sometimes struggle in this area.For the SMB market in particular, Network Security-as-a-Service is an attractive offering. It allows companies to get the very best security technology at an affordable price point while having someone else maintain the complex infrastructure.This has given rise to a genre of service provider that builds its own network backbone in the cloud and embeds network security as an integral service. More and more players are starting to offer this kind of service. They generally start with a global network backbone and software-defined wide-area networking (SD-WAN), add a full security stack, and connect to various cloud services from Amazon, Google, Microsoft, etc. Customers connect their data centers, branches, end users, and cloud apps to this network, and away they go. It’s networking, plus network security, all in one place, and all managed as a service.To read this article in full, please click here

IDG Contributor Network: Protecting iOS against the aLTEr attacks

Researchers from Ruhr-Universität Bochum & New York University Abu Dhabi have uncovered a new attack against devices using the Long-Term Evolution (LTE) network protocol. LTE, which is a form of 4G, is a mobile communications standard used by billions of devices and the largest cellular providers around the world.In other words, the attack can be used against you.The research team has named the attack “aLTEr” and it allows the attacker to intercept communications using a man-in-the-middle technique and redirect the victim to malicious websites using DNS spoofing.To read this article in full, please click here

The aftermath of the Gentoo GitHub hack

Gentoo GitHub hack: What happened? Late last month (June 28), the Gentoo GitHub repository was attacked after someone gained control of an admin account. All access to the repositories was soon removed from Gentoo developers. Repository and page content were altered. But within 10 minutes of the attacker gaining access, someone noticed something was going on, 7 minutes later a report was sent, and within 70 minutes the attack was over. Legitimate Gentoo developers were shut out for 5 days while the dust settled and repairs and analysis were completed.The attackers also attempted to add "rm -rf" commands to some repositories to cause user data to be recursively removed. As it turns out, this code was unlikely to be run because of technical precautions that were in place, but this wouldn't have been obvious to the attacker.To read this article in full, please click here

BrandPost: CTO Notes from the Road: 3 take-aways from customers in 6 countries across Asia Pacific

Ciena Anup Changaroth, of Ciena’s CTO Office in APAC, highlights a few insights from Ciena’s recent six-country roadshow he participated in across the Asia-Pacific region. Over the last couple of weeks, I have been on the road supporting our annual Ciena Drive Roadshows in Australia, New Zealand, South Korea, Japan, Vietnam and finishing up with Hong Kong. We had the opportunity to share Ciena’s Adaptive Network vision with both customers and partners, as well as an opportunity to discuss with them their top priorities, challenges and investment plans.To read this article in full, please click here

Most Enterprise of Things initiatives are a waste of money

The Internet of Things (IoT) has captured much attention recently as more devices like wearables, AR/VR headsets and sensor-based products make their way to market. But off-the-shelf consumer-oriented devices are not always what enterprises need. Rather, most companies need a more specialized approach than just deploying things all over the place.As a result, the more specialized Enterprise of Things (EoT) is becoming a significant part of nearly all companies' plans for the next three to five years. Indeed, we expect EoT to become a top 3 item on most organizations' strategic initiatives in the coming two to three years. EoT will partner with ongoing enterprise cloud and security initiatives as organizations look to transform how they do business and run more efficient and user-responsive operations. But research shows that for many companies currently deploying or planning deployments of EoT, it’s a waste of money.To read this article in full, please click here

IDG Contributor Network: 4 considerations when replacing managed WAN services with SD-WAN

The enterprise wide area networks are mission-critical resources for most enterprises. And when it came to managing and running the WAN, enterprises could choose between two distinct models: Do it Yourself (DIY) or managed WAN services. But with the evolution of SD-WANs, we’re seeing a new type of telco solution that merges elements of both capabilities.Traditional WAN management models With DIY, enterprise IT procures last-mile access at a location and deploys routers, WAN optimization, and network security appliances from several vendors. Continuous monitoring and management is done in house or via a managed service provider. In short, enterprise IT owns the complex task of maintaining, configuring and monitoring the WAN for availability and optimal performance.To read this article in full, please click here

IDG Contributor Network: Networking anomalies

Recently, I had the great opportunity to discuss network security over dinner with one of the world’s best security practitioners. I learned that keeping bad actors from eventually getting inside a network is nearly impossible. While we maintain our vigilance at our borders over time we should assume our network would be penetrated, so the key to preventing exfiltration (which generally follows) is to look for networking anomalies.Look for network uses that are abnormal, unusual, or different in some way from the norm. Techniques for doing this “hunting” are expensive to implement and hard to interpret with frequent false positives but are a necessary evil.To read this article in full, please click here

IDG Contributor Network: Solving for serverless: How do you manage something that’s not there?

Function-as-a-service (FaaS) technologies, including AWS Lambda, Azure Functions and IBM/Apache OpenWhisk, are experiencing mass adoption, even in private clouds, and it’s easy to see why. The promise of serverless is simple: developers and IT teams can stop worrying about their infrastructure, system software and network configuration altogether. There’s no need to load-balance, adjust resources for scale, monitor for network latency or CPU performance. Serverless computing can save you a lot of time, money and operational overhead, if you play your cards right.Say goodbye to the idle instance There’s also less waste with serverless computing. You only pay for infrastructure in the moment that code gets executed (or, each time a user processes a request). It’s the end of the server that just sits there. But with all these advantages, IT practitioners are also faced with an avalanche of complexity and new challenges.  To read this article in full, please click here

1 2 3 317