Archive

Category Archives for "Network World SDN"

IDG Contributor Network: What the storage industry’s inevitable transition to the cloud means for your business

Just a few weeks ago, Microsoft made a relatively unheralded acquisition of a company named Avere Systems. Avere’s raison d’etre is enterprise storage. In their own words, “Avere Systems was created by file systems experts determined to reinvent storage by changing the way enterprises thought about and bought storage resources.” Ostensibly, Microsoft purchased this firm to add cloud-based storage capabilities to its ever-expanding portfolio.To read this article in full, please click here

IDG Contributor Network: 6 steps to engage and manage a vendor who isn’t meeting your standards

During the sales process, every vendor sounds great. They have case studies, they have great-looking material, they talk like experts and everything is good. But nothing is as simple as it looks in the beginning.There are always additional challenges. The true test of a service provider, or any vendor, is how they respond to those changes and challenges. Do they put you, the customer, first or do they get slow and unresponsive? If you have a vendor who isn’t meeting your needs, but you’re locked into a contract that makes it cost-prohibitive to leave, these steps will help you reduce some of the friction in the relationship, while providing a better outcome for your company.To read this article in full, please click here

Configuration errors in Intel workstations being labeled a security hole

Security researchers at an antivirus company have documented another potentially serious security hole in an Intel product, this time in the mechanism for performing system updates. The good news, however, is that it is limited to desktops, is a configuration error, and does not appear to impact servers.Last June, researchers at F-Secure found a flaw in Intel’s Active Management Technology (AMT), a feature used to perform remote updates to advanced desktops using Intel vPro or workstation platforms using Core desktop chips and certain Xeon CPUs. Xeon is primarily a server processor but there are some low-end chips used in high-performance workstations, such as those used in a CAD environment.To read this article in full, please click here

IoT security needs a white knight

Thanks to the Mirai botnet attacks, few people in the world of tech need a reminder that IoT devices remain a serious threat to enterprise networks. Still, more than a year after the botnet made headlines worldwide, IoT security remains mostly an idea, rather than a reality.Such is the scope of the problem that Frost and Sullivan IoT research director Dilip Sarangan argues for governmental intervention. Sarangan says that, because the responsibility for IoT security is diffused across device manufacturers, network providers, software developers and many others, it’s difficult for the industry to make progress on all-encompassing standards.To read this article in full, please click here

Facebook and Amazon are causing a memory shortage

If you’ve noticed a considerable increase in the price of memory in the last few months, you can thank (or blame) Amazon, Facebook, and Google. The explosion in growth among hyperscale data centers is great if you are a supplier of components to these companies, not so great if you are buying those same components.According to DRAMeXchange, a division of market researcher TrendForce, the price of server DRAM will continue to rise as the supply remains tight in the first quarter of this year. The server DRAM market has seen tight supply since the third quarter of last year due to massive construction projects by the data center market, especially the hyperscale data centers, data centers that are bigger than a football field.To read this article in full, please click here

Wi-Fi Alliance announces WPA3 to secure modern networks

The Consumer Electronics Show (CES) is an odd place to announce an enterprise product, but the Wi-Fi Alliance used the massive trade show — which has more or less taken over where Comdex left off — to announce a major upgrade to Wi-Fi security.The alliance announced the Wi-Fi Protected Access 3 (WPA3), a new standard of Wi-Fi security that greatly increases the security capabilities of the wireless standard. WPA2, which is the current standard in wireless security, has been around for 14 years, so this is way overdue.To read this article in full, please click here

2018 state of resilience: The pressure is on

As we swerve onto the runway in 2018, IT leaders are finding themselves under increased pressure to ensure security, high availability and disaster recovery for the applications and systems under their care. The results of several surveys underscore the concerns of nearly 6,000 IT professionals around the globe.These surveys, conducted in 2017 by Vision Solutions, now part of Syncsort, collected responses from 5,632 professionals to determine their key business continuity concerns and their strategies for addressing high-profile hacking attacks, data breaches, disruptive natural disasters, and escalating storage and data accessibility needs. The results highlight their areas of greatest concern and the key initiatives they are putting into place for moving forward.To read this article in full, please click here

IDG Contributor Network: Will China start blocking SD-WAN traffic…today?

More than a decade ago, I launched the forerunner to SD-WAN Experts, MPLS Experts, on a project to China. Back then finding out telecom services in another country, let alone another continent, seemed like a mission impossible. China was among the most difficult.Much has changed in our industry. MPLS has given way to SD-WAN, but some things remain the same. We still need global connectivity and China continues to remain a mystery. My story about China blocking VPN traffic – and potentially SD-WAN traffic – caused quite a stir in the industry, in large part because, like so many things when dealing with China, concrete information remains scarce (particularly for non-native speakers).To read this article in full, please click here

Get 33% Off H&R Block’s Federal & State Tax Software, Plus a 5% Amazon Bonus

If you're a tax time do-it-yourselfer, this is a deal that will save you money, and potentially make you some money as well.H&R Block's popular tax software is fully updated for 2018 and designed to make your 2017 tax prep easier and more convenient. Step-by-step interviews guide you through a customized experience relevant to your tax situation, so you know everything is accounted for. This version contains everything you need to prepare your federal and state taxes in one complete program, and everything can be handled electronically (including the PC or Mac software download).To read this article in full, please click here

Dell EMC patches vulnerabilities in its data protection products

Researchers have discovered several vulnerabilities in Dell EMC's data protection products that would allow an attacker to gain full control of the system. Fortunately, a fix is available now for download.The vulnerabilities, three in all, were disclosed on Jan. 4 by the security technology and services firm Digital Defense. They effect Dell EMC's Avamar Server, NetWorker Virtual Edition, and Integrated Data Protection Appliance, which use a common component called Avamar Installation Manager. This is the problematic app.In addition to this, a related problem in the VMware vSphere Data Protection backup product has also been uncovered, but it has already been patched.To read this article in full, please click here

IDG Contributor Network: 5 things analytics could tell you about your network in 2018

1. Whether your users are happy (without having to talk to them) It’s not always cool to admit, but the ultimate goal of every networker is to have happy users. Like many other thankless jobs, we only hear about problems. When we do, we react. But that isn’t ideal. What we really want is to know about problems as they are developing, before users complain. They don't even have to know.  But we do.A Network Management System (NMS) has been the traditional go-to solution to sniff out these sorts of problems. But most were designed for just one view of a certain part of the network using antiquated technology that doesn't provide any sort of predictive problem solving based on what the user is actually experiencing. It's like trying to figure out San Francisco traffic based on the status of the traffic signals. Just because the signals are working properly doesn’t mean the drivers (users) are having a good experience.To read this article in full, please click here

How Cisco’s newest security tool can detect malware in encrypted traffic

Cisco’s Encrypted Traffic Analytics (ETA), a software platform that monitors network packet metadata to detect malicious traffic, even if its encrypted, is now generally available.The company initially launched ETA in June, 2017 during the launch of its intent-based network strategy and it’s been in a private preview since then. Today Cisco rolled ETA out beyond just the enterprises switches it was originally designed for and made it available on current and previous generation data center network hardware too.+MORE AT NETWORK WORLD: What is intent based networking? | Why intent based networking could be a big deal +To read this article in full, please click here

Anker’s Twin USB High Speed Car Phone Charger Is Just $8.99 Right Now

The PowerDrive 2 Elite from Anker is super compact, and can simultaneously charge 2 devices with the fastest possible charge of up to 2.4 amps per port. A soft blue LED light makes it easier to navigate in the dark. 10 safety mechanisms are built in to protect your devices from surge and temperature fluctuations, and an 18-month warranty is included for additional peace of mind.Although we haven't reviewed this model, our PCWorld team test drove the beefier PowerDrive Speed 2 model and found that it delivered on its promises (See: "Anker PowerDrive Speed 2 car charger review: Anker lights the way").To read this article in full, please click here

Is Cisco’s Mobility Express right for you?

One of the hottest topics on the minds of our customers for 2018 continues to be their wireless infrastructure. As WLAN 802.11ac wave 2 devices becoming mainstream, Cisco has placed a stake in the ground claiming to be the “value leader.”Cisco's solution to accomplish this is Mobility Express, designed to help companies easily set up wireless LAN (WLAN) networks. What exactly is Mobility Express? And is it right for you?What is Mobility Express? Mobility Express is the ability to use an access point (AP) as a controller. That means a lightweight network without a controller box. Instead one of the APs on the network acts as the controller. Here is how Cisco describes it:To read this article in full, please click here

Hyperconverged secondary storage market heats up

There’s no question that the hyperconverged infrastructure (HCI) has had a huge impact on simplifying technology deployments. Nutantix solutions, Cisco HyperFlex and HPE Simplivity have been widely adopted and have changed the face of the data center.HCI was initially considered niche to simplify the deployment of virtual desktop infrastructure (VDI), but it has seen increased adoption for other workloads. One use case for HCI that has flown under the radar is secondary storage. Late last year, I profiled Cohesity, the vendor that has been leading the emerging hyperconverged secondary storage market.To read this article in full, please click here

IDG Contributor Network: How network verification differs from monitoring, and what it’s good for

In a previous post I discussed network verification, a new area of technology that applies what is known as formal verification – mathematical analysis of a complex system to determine rigorously if it meets the end-to-end goal – to network infrastructure.But what is such verification good for and how is it different from today’s common practice, whereby nearly every organization monitors its network, typically by sampling ongoing flows, events or logs. Isn’t that enough to catch problems as the organization deploys changes?To read this article in full, please click here

Sonos Play:1 Is Discounted $62 Right Now On Amazon

Sonos has designed the Play:1 wireless speaker to look and sound great in any space, whether it's a kitchen counter or the bookshelf in your bedroom. It contains two Class D amplifiers, one 3.5" mid–woofer for mid–range frequencies and deep bass, and one tweeter for crisp and accurate high–frequency response. Pair multiple speakers together in the same room for a more immersive experience, or add speakers in different rooms. When connected to an Amazon Alexa-enabled device, you can control the Sonos experience hands-free using Alexa voice commands. To read this article in full, please click here

Improved telepresence — in your face with the new BeamPro 2

For those of us intrigued by telepresence technology, the new BeamPro 2 might be just what Santa should have left under our trees – except, well, that it wouldn’t have fit. But on other scales, the release of this new and improved device promises more realistic visits with colleagues, customers, patients, and others with respect to video, audio and maneuverability.Available this summer, The BeamPro 2 provides better face-to-face interactions with its enlarged multi-touch display and vertical screen height adjustment. It has been engineered to move more easily around crowded spaces with its wide angle cameras and additional sensors for detecting obstacles. It also provides improved audio and video.To read this article in full, please click here

BrandPost: Silver Peak 2018 CEO Predictions

Enterprises adopt cloud-first WAN architecturesToday, most WAN traffic, to and from branch and remote sites, is destined for the cloud, either to SaaS services or applications hosted in an IaaS environment. The traditional WAN was architected for branch-to-data-center traffic flows, not to efficiently support new cloud-driven traffic patterns. Starting in 2018, most enterprises will adopt a “cloud-first” SD-WAN architecture designed to efficiently and effectively support the ongoing evolution in their application mix.The new WAN edge replaces the traditional branch routerTraditional routers are no longer the default choice for branch deployments. Routers are burdened by three decades of complexity and a cumbersome “CLI-first” device-by-device configuration paradigm. With SD-WAN as a foundation, a new class of centrally-orchestrated, application-driven WAN edge devices will replace traditional routers in the branch.To read this article in full, please click here

Meltdown and Spectre: How much are ARM and AMD exposed?

As the chip vendors wrestle to get their arms around the Meltdown and Spectre vulnerabilities, we’re slowly determining the exposure of AMD and ARM to the exploit. Intel, unfortunately, is totally vulnerable. With AMD and ARM, though, it gets complicated.First, let’s go over the Spectre exploit, which is a second class of attacks similar to Meltdown, the one we all know. Like Meltdown, Spectre exploits speculative execution in order to root out information from a CPU’s cache. Spectre is different because of how it runs.Also read: Meltdown and Spectre exploits: Cutting through the FUD While Meltdown is based on a specific implementation of speculative execution, Spectre exploits a risk to speculative execution that requires more work to exploit but is also considered harder to mitigate. Because it’s more obscure and arcane, it’s not as well understood. That’s why Meltdown is considered the bigger risk.To read this article in full, please click here