Jon Gold

Author Archives: Jon Gold

Mid-band spectrum for 5G growing, with fits and starts

A new auction for enormously valuable mid-band spectrum and a rollback of availability for a different piece of it illustrates the uneven progress of 5G rollouts in the U.S. and represents a challenge for enterprises looking to take advantage of 5G technology. 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises The mid-band is valuable because it’s in a “Goldilocks” zone of the wireless spectrum—its frequencies are high enough to support higher throughput, while also being low enough to propagate effectively across relatively large areas.To read this article in full, please click here

Sweet-spot spectrum for enterprise 5G is growing, but slowly

A new auction for enormously valuable mid-band spectrum and a rollback of availability for a different piece of it illustrates the uneven progress of 5G rollouts in the U.S. and represents a challenge for enterprises looking to take advantage of 5G technology. 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises The mid-band is valuable because it’s in a “Goldilocks” zone of the wireless spectrum—its frequencies are high enough to support higher throughput, while also being low enough to propagate effectively across relatively large areas.To read this article in full, please click here

5G base stations could be powered by lasers

Laser-powered 5G base stations could become an operational reality in a few years using technology from Seattle-based PowerLight Technologies. 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises In trials, PowerLight’s system transmitted “hundreds of watts over hundreds of meters through the air” to power up a 5G cellular base station, according to Ericsson, which ran the demo in cooperation with PowerLight using an Ericsson Streetmacro 6701 base station. (It consumes a maximum of 300W.)To read this article in full, please click here

Ananki startup tries to simplify private 5G

A startup using open-source components to offer software-defined private 5G as a service hopes to attract enterprises with an architecture that it says is as simple as Wi-Fi's. 5G resources How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises Called Ananki, the company requires little of enterprises in order to deploy the service: Customers set up small-cell 5G radios on-site, point them toward a cloud network running the Ananki software, install SIMs on the enterprise hardware that will tap into the service, and Ananki’s automation remotely configures the radios and provisions the SIMs.To read this article in full, please click here

Gartner: SD-WAN, SASE biggest drivers of WAN edge infrastructure

The past several years have seen a large-scale shift from traditional MPLS-based customer edge routers to SD-WAN technology, according to Gartner’s 2021 Magic Quadrant for WAN Edge Infrastructure.  Overall spending on WAN edge will grow by 2.6% per year through 2025, according to the report. The increased sales of WAN edge technology in general is driven by SD-WAN equipment designed to support work-from-home and in-office environments are slightly dampened by the fact that sales of traditional branch office routers are sharply down as a consequence, Gartner says. As the world shifts from working from home to working from anywhere, companies have begun to shift away from the VPN as the main tool for keeping remote workers secure, and towards more-fully featured SD-WAN technologies, with the idea of eventually implementing zero-trust network access for maximal security, Gartner’s report noted.To read this article in full, please click here

Report: The chip shortage’s next victim is data-center switching

Enterprise looking to buy data-center switches face longer lead times and lack of stock over the course of the next year or so as demand continues to substantially outpace supply, according to a report from the Dell’Oro Group.Sameh Boujelbene, leader of the analyst firm’s campus and data-center research team, said that one canary in the coal mine was Broadcom’s announcement earlier this year that 90% of its total chip output for 2021 had been spoken for as early as March. That’s the result not just of material shortages that have affected the semiconductor market as a whole, but of human behaviors that arose in response.Chip shortage will hit hardware buyers for months to years Whether they’re smaller enterprises or big hyperscalers building out capacity, IT decision makers tend to rush into pre-orders whenever headlines about shortages appear, Boujelbene said, and Dell’Oro projects that will true in 2022.To read this article in full, please click here

Report: The chip shortage’s next victim is data-center switching

Enterprise looking to buy data-center switches face longer lead times and lack of stock over the course of the next year or so as demand continues to substantially outpace supply, according to a report from the Dell’Oro Group.Sameh Boujelbene, leader of the analyst firm’s campus and data-center research team, said that one canary in the coal mine was Broadcom’s announcement earlier this year that 90% of its total chip output for 2021 had been spoken for as early as March. That’s the result not just of material shortages that have affected the semiconductor market as a whole, but of human behaviors that arose in response.Chip shortage will hit hardware buyers for months to years Whether they’re smaller enterprises or big hyperscalers building out capacity, IT decision makers tend to rush into pre-orders whenever headlines about shortages appear, Boujelbene said, and Dell’Oro projects that will true in 2022.To read this article in full, please click here

What is firewall as a service?

So what’s firewall as a service? Firewall as a service, or FWaaS, relies on technology in the cloud. A user or application connects to the FWaaS via the internet, and the service applies domain rules, URL filtering, and other security that physical firewall appliances use. The idea is to replace the multitude of hardware firewalls you’d need to secure all of your business’ traffic from all of its different operational sites with secure internet connections to the service.What’s wrong with firewall appliances? Possibly nothing. Physical firewalls are still quite popular, particularly for businesses without a lot of different locations and without a lot of remote workers. They even have some advantages over FWaaS, like different cost profiles. On-prem firewalls are a capex expenditure up-front but tend to be cheaper over time. They also have lower latency.To read this article in full, please click here

Private 5G as a service is now a thing

A private 5G platform designed to offer the latest-generation licensed wireless technology to enterprise users as a service was announced today by Japanese telecom giant NTT.The company said its private 5G-as-a-service platform, which it calls P5G, would use CBRS and other licensed spectrum in the U.S. to provide businesses with their own 5G networks. The company said also that its platform is highly flexible, working with a wide variety of software standards and networking partners to ensure availability around the country.To read this article in full, please click here

Feds’ demand for software standards could boost enterprise security

Enterprises can look for more transparency from software vendors after the Biden Administration’s recent mandate that software bills of materials be provided by companies attempting to do business with the federal government.Software bills of materials, frequently abbreviated to SBOMs, aren’t a new concept. The idea comes from the manufacturing sector, where it’s often crucial for buyers to fully understand the components and materials that were used to make a particular piece of equipment.The 10 most powerful companies in enterprise networking 2021 For example, a train engine might contain parts that aren’t rated for certain levels of vibration stress, making it unsuitable for use on a particular type of track. The goal of an SBOM is similar, listing all the proprietary, open source, and licensed components being used in a particular piece of software, so that a buyer can review it and check whether any of those components are outdated or insecure.To read this article in full, please click here

Feds’ demand for software standards could boost enterprise security

Enterprises can look for more transparency from software vendors after the Biden Administration’s recent mandate that software bills of materials be provided by companies attempting to do business with the federal government.Software bills of materials, frequently abbreviated to SBOMs, aren’t a new concept. The idea comes from the manufacturing sector, where it’s often crucial for buyers to fully understand the components and materials that were used to make a particular piece of equipment.The 10 most powerful companies in enterprise networking 2021 For example, a train engine might contain parts that aren’t rated for certain levels of vibration stress, making it unsuitable for use on a particular type of track. The goal of an SBOM is similar, listing all the proprietary, open source, and licensed components being used in a particular piece of software, so that a buyer can review it and check whether any of those components are outdated or insecure.To read this article in full, please click here

Feds’ demand for software standards could boost enterprise security

Enterprises can look for more transparency from software vendors after the Biden Administration’s recent mandate that software bills of materials be provided by companies attempting to do business with the federal government.Software bills of materials, frequently abbreviated to SBOMs, aren’t a new concept. The idea comes from the manufacturing sector, where it’s often crucial for buyers to fully understand the components and materials that were used to make a particular piece of equipment.The 10 most powerful companies in enterprise networking 2021 For example, a train engine might contain parts that aren’t rated for certain levels of vibration stress, making it unsuitable for use on a particular type of track. The goal of an SBOM is similar, listing all the proprietary, open source, and licensed components being used in a particular piece of software, so that a buyer can review it and check whether any of those components are outdated or insecure.To read this article in full, please click here

Wi-Fi 6E: Don’t let hype push you off your refresh cycle

Despite the inarguable advantages of operating Wi-Fi in the 6GHz frequency range, analysts say that the smart time to buy Wi-Fi 6E is whenever an organization would ordinarily make an upgrade – and not before.Wi-Fi 6E is mostly identical to Wi-Fi 6, but the key difference is the 6E standard’s ability to take advantage of the 6GHz spectrum that was made available for unlicensed use by the U.S. last year. It’s a great deal of new bandwidth, enabling larger channels and consequently higher data rates, as well as being a much less busy area of the spectrum compared to the heavily used 2.4GHz and 5GHz bands.To read this article in full, please click here

IoT startup makes battery-free sensors

[Get regularly scheduled insights by signing up for Network World newsletters.] A startup founded by two MIT grads says that it can deploy self-powering sensors to handle low-intensity IoT tasks, eliminating the need for batteries or power cabling and adding a new level of flexibility to IoT deployments.Ben Calhoun and Dave Wentzloff are the founders of Everactive, an IoT-device startup whose sensor modules can create their own power from a variety of sources, including indoor solar that gathers energy from artificial lighting, and thermal-gradient differential using waste heat to generate electricity. These techniques don’t generate a lot of power but don’t need to for Everactive’s purposes.To read this article in full, please click here

A startup makes IoT sensors, no batteries necessary

A startup founded by two MIT grads says that it can deploy self-powering sensors to handle low-intensity IoT tasks, eliminating the need for batteries or wired electrical supplies, adding a new level of flexibility to IoT deployments.Ben Calhoun and Dave Wentzloff are the founders of Everactive, an IoT-device manufacturing startup whose sensor modules can create their own power from a variety of sources, including indoor solar, thermal gradient differential, and vibrations. The sensors can monitor for temperature, humidity, light levels, vibration, movement, sound, pressure and gas, among other things.To read this article in full, please click here

Open-source: Get SLAs to protect network apps with open-source components

The continuous influx of open-source software (OSS) into enterprise IT departments is, in many ways, an enormous boon to both vendors and users. For the former, the ability to use open source components means getting rid of a great deal of duplicative effort—rather than having to design every part of, say, an IoT sensor and monitoring product from scratch, a vendor can adopt a well-understood, well-supported open source library for its networking stack, and focus more of its attention on the sensing and data analysis features that will set the product apart from its competitors.For end-users, one of the chief advantages is—at least in theory—the improved security that’s part of the usual sales pitch for open source software. The idea here is that the open nature of a piece of software—and the fact that anyone can look at it to discover and correct security flaws—means that it’s generally going to be more secure than a proprietary equivalent.To read this article in full, please click here

Open-source: Get SLAs to protect network apps with open-source components

The continuous influx of open-source software (OSS) into enterprise IT departments is, in many ways, an enormous boon to both vendors and users. For the former, the ability to use open source components means getting rid of a great deal of duplicative effort—rather than having to design every part of, say, an IoT sensor and monitoring product from scratch, a vendor can adopt a well-understood, well-supported open source library for its networking stack, and focus more of its attention on the sensing and data analysis features that will set the product apart from its competitors.For end-users, one of the chief advantages is—at least in theory—the improved security that’s part of the usual sales pitch for open source software. The idea here is that the open nature of a piece of software—and the fact that anyone can look at it to discover and correct security flaws—means that it’s generally going to be more secure than a proprietary equivalent.To read this article in full, please click here

Aruba Wi-Fi 6E access point to launch this fall

Business users looking for an upgrade to the very latest Wi-Fi standard, also known as Wi-Fi 6E, now have the option of Aruba’s new AP 635, the company announced this morning. Wi-Fi resources Test and review of 4 Wi-Fi 6 routers: Who’s the fastest? How to determine if Wi-Fi 6 is right for you Five questions to answer before deploying Wi-Fi 6 Wi-Fi 6E: When it’s coming and what it’s good for Wi-Fi 6E works much the same as Wi-Fi 6, sharing that standard’s improved ability to handle dense client environments, high throughput, and advanced multi-user and multi-antenna functionality. The new feature is the ability to use the 6GHz spectrum that the FCC opened in April 2020 to unlicensed users, representing a two-fold increase in the spectrum available for WI-Fi. That added spectrum means that Wi-Fi users can take advantage of much wider channels, leading to commensurately higher throughput.To read this article in full, please click here

‘FragAttack’ flaws threaten Wi-Fi, but not too seriously

Almost all Wi-Fi is potentially vulnerable to flaws that date back to 1997 when it became commercially available, but even the person who discovered the weaknesses says some of them are difficult to exploit. Wi-Fi resources Test and review of 4 Wi-Fi 6 routers: Who’s the fastest? How to determine if Wi-Fi 6 is right for you Five questions to answer before deploying Wi-Fi 6 Wi-Fi 6E: When it’s coming and what it’s good for Mathy Vanhoef, a post-doctoral student at NYU Abu Dhabi, has created attacks—FragAttacks—that take advantage of the vulnerabilities, but in an academic paper about them, says the most widespread vulnerabilities can be exploited only under specific, rare conditions, and require either user interaction or highly unusual configurations to succeed.To read this article in full, please click here

‘FragAttack’ flaws threaten Wi-Fi, but not too seriously

Almost all Wi-Fi is potentially vulnerable to flaws that date back to 1997 when it became commercially available, but even the person who discovered the weaknesses says some of them are difficult to exploit. Wi-Fi resources Test and review of 4 Wi-Fi 6 routers: Who’s the fastest? How to determine if Wi-Fi 6 is right for you Five questions to answer before deploying Wi-Fi 6 Wi-Fi 6E: When it’s coming and what it’s good for Mathy Vanhoef, a post-doctoral student at NYU Abu Dhabi, has created attacks—FragAttacks—that take advantage of the vulnerabilities, but in an academic paper about them, says the most widespread vulnerabilities can be exploited only under specific, rare conditions, and require either user interaction or highly unusual configurations to succeed.To read this article in full, please click here

1 2 3 27