The term Wi-Fi is synonymous with wireless LANs, despite the fact it’s a specific trademark owned by the Wi-Fi Alliance, a group dedicated to certifying that products meet the IEEE’s wireless standards.In the IEEE’s naming convention, all standards that specify protocols for implementing wireless LANs fall under the 802.11umbrella. Individual standards are assigned alphabetically, 802.11a, 802.11b, etc. Thanks to the widespread acceptance of wireless LANs, new standards continue to be developed at a rapid pace, creating a confusing alphabet soup.To read this article in full, please click here
Internet shutdowns by governments across the world impacted 1.89 billion citizens globally in the first half of 2022, a 22% increase when compared with the second half of 2021.A recent report compiled by VPN service provider Surfshark found there were 66 state-mandated internet blackouts imposed across six countries and territories during the period: Burkina Faso, India, Jammu and Kashmir, Kazakhstan, Pakistan, and Sudan. Local shutdowns were observed in India, Jammu and Kashmir region, and Pakistan, while Burkina Faso, Kazakhstan, and Sudan chose to cut down internet connections nationwide.While there was an overall decrease in the number of internet shutdowns during the period—72 cases in the first half of 2022 compared with 84 reported in the second half of 2021—the number of people impacted was much higher, as reliance on the internet has increased globally.To read this article in full, please click here
One of the more unusual Linux commands is named “yes”. It’s a very simple tool intended to help you avoid having to answer a lot of questions that might be asked when you run a script or a program that needs a series of responses to do its work.If you type “yes” by itself at the command prompt, your screen is going to start filling up with the just the letter “y” (one per line) until you hit control-C to stop it. It’s also incredibly fast. Unlike what you see displayed below, yes will likely spit out more than a million y’s in the time it likely takes you to reach down and press control-C. Fortunately, that’s not all that this command can do.To read this article in full, please click here
Arista Networks has acquired Pluribus Networks with an eye toward bolstering its own Unified Cloud Networking service.There were no details such as cost of the acquisition nor what the deal means for the 140 Pluribus employees most based in Los Altos, Calif. What is SDN and where it's going
Pluribus is a software-defined networking pioneer, founded in 2010 and has morphed its original Netvisor One, a virtualized Linux-based NOS that provides Layer 2 and Layer 3 networking and distributed fabric intelligence into its Adaptive Cloud Fabric software-defined networking package.To read this article in full, please click here
Optane, the memory technology pioneered and championed by Intel, has seen its last days. Intel has decided to wind down the technology as part of a refocusing effort.The news came on an earnings call with analysts to discuss Intel’s rocky second quarter. Since Pat Gelsinger has taken the reigns at Intel, the company has divested itself of McAfee (although that process began before Gelsinger arrived) as well as shed its drone business, NAND products, RealSense visual sensors, and Intel Sports.
Read more: Intel’s $20 billion bet on advanced fabricationTo read this article in full, please click here
You’ve done everything to secure your network, and you still face threats. That’s what most enterprises say about their network security, and they’re half right. Yes, they still face threats, but they’ve not done everything to address them. In fact, most enterprises haven’t really implemented the two foundations on which real network security must be based.When I ask enterprises whether they’ve done a top-down analysis of network security, they usually say they do it every year. When I ask what’s involved in that assessment, they say they look for indications that their current strategies have failed. They build another layer, which is kind of like putting a second Band-Aid on a cut.To read this article in full, please click here
Life on the command line on Linux is clearly something most of us enjoy, but typing the same command again and again can become tiresome. To avoid that boredom, this post explains a number of ways that you can make repeating commands – or repeating commands but with some changes – a lot easier than you might expect.Rerunning the previous command
First, the easiest way to repeat a command is simply by typing !!. If you were logged into a Linux server and waiting for a coworker to log in, for example, you might want to repeat the who command shown below until you see your coworker’s username. Typing !! after the initial who command will do this for you.To read this article in full, please click here
Data center operators are weighing new approaches to thermal management as they deal with growing compute requirements and strive to achieve sustainability goals. They’re not alone in prioritizing sustainability: Enterprise IT buyers are increasingly looking for data centers with sustainability credentials and are making purchasing decisions based on the presence of practices that reduce greenhouse gas emissions.That’s the crux of findings from research and advisory firm Omdia, which last week unveiled its Data Center Thermal Management and Sustainability Intelligence Service. The service is aimed at analyzing sustainable data-center best practices and strategies, with a focus on new technologies such as liquid cooling and energy storage systems.To read this article in full, please click here
Release 9 of Rocky Linux just made its public appearance on July 14, and the big news is something called Peridot, which anyone (yes, anyone) can use to reproduce Rocky Linux 9 from scratch on their own. This is a truly exciting turn for the Linux community.If you’re not familiar with Rocky Linux, don’t be too surprised that it made it to Release 9 and you’re just now tuning in. “Release 9” doesn’t mean that Rocky has gone through eight prior major releases. Instead, the name indicates its connection to RHEL 9. Rocky Linux began life as Release 8.3 in April 2021 as a replacement for CentOS, which was EOL’ed in December 2020.To read this article in full, please click here
From incorporating cloud services to keeping the hybrid workforce humming, network execs and architects face myriad challenges every day.The main goals of large organizations are to prioritize those challenges, adjust the network architecture to handle widely distributed applications, services and users, and keep corporate resources secure, according to Neil Anderson, area vice president with World Wide Technology, a $14.5 billion global technology services provider.
Read more: SSE is SASE minus the SD-WANTo read this article in full, please click here
Major chip vendors including Intel are telling customers that they’re set to begin hiking chip prices in the fourth quarter as they deal with increasing costs and supply shortages.The rumor initially started with Intel. Now Qualcomm and Marvell Technologies have also begun informing customers of price increases, according to a report from Taiwanese publication DigiTimes.“On its Q1 earnings call, Intel indicated it would increase pricing in certain segments of its business due to inflationary pressures. The company has begun to inform customers of these changes,” an Intel spokesperson said in a statement to me.To read this article in full, please click here
IBM is expanding its Power10 server lineup with four new midrange and scale-out systems designed for on-premises, data-intensive and business-critical workloads.The new Power S1014, Power S1022, Power S1024 and Power E1050 platforms cover a range of workloads.The E1050 is a four-socket system optimized for data-intensive enterprise workloads. In terms of how it ranks, the E1050 is a step below the top end of the Power10 portfolio, which is the existing E1080 four-socket rack server.The new scale-out systems are the single-socket S1014, described as ideal for entry-level SMBs and remote offices, and the S1022 and S1024 systems, which are two-socket systems aimed at higher-end uses.To read this article in full, please click here
Nvidia, the darling of high performance computing (HPC), is bringing new attention to quantum computing. The company has launched its Nvidia Quantum Optimized Device Architecture, or QODA. This hybrid platform is designed to make quantum computing more accessible by enabling programming of both quantum applications and classical applications in a single, consolidated environment. According to Nvidia, it's aimed at speeding breakthroughs in quantum research and development across AI, HPC, health, finance and other disciplines.To read this article in full, please click here
It’s time to take a hard look at whether you’re devoting enough resources to securing your network infrastructure. Short answer: You’re probably not.If you work for a hyperscaler, your organization is probably doing everything it can to secure the network. For almost everyone else, it is pretty safe to assume that the answer is no.This is not necessarily a blameworthy failing. In many cases it is down to available resources and perceived risk: Given too little money for cybersecurity and too little time from too few people to tackle all possible risks in the network, what should network cybersecurity staff focus on? They tend to focus less on the inward-facing aspects of their networks and more on explicitly outward-facing pieces.To read this article in full, please click here
Juniper Networks has upgraded its cloud-based management platform and introduced a new switch family for campus and branch networks.On the management side, Juniper says the goal is to simplify network operations for organizations with a mix of campus, branch, micro-site, and remote-worker settings, and it is doing that by adding features to its Mist AI/ML cloud-based management platform and its Marvis virtual network assistant.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here
By: Tom Hollingsworth, Networking Expert.Crucial to any user experience is consistency. After all, users can be fickle. They want things now. They might even want it to be fun, but more importantly, they require a consistent experience. Between increased speed or consistency, users most always pick consistency. No matter where they log in or on what device they happen to be using, especially when it comes to real-time communications experiences on an app, they want the same treatment time and time again. It’s crucial to their success.That consistent experience requirement also extends to aspects they may not see or even realize is vital to the capabilities they rely upon. Chief among them is security policy. Policy enforcement should not be predicated or determined by whether they are using a company-issued laptop inside the proverbial corporate firewall or not.To read this article in full, please click here
Chipmakers STMicroelectronics (STM) and GlobalFoundries (GF) have announced plans to build a jointly operated 300mm semiconductor wafer manufacturing facility in France.According to a statement on STM’s website, STM and GF will receive “significant financial support” from the French government to fund the project. The announcement forms part of French president Emmanuel Macron’s efforts to attract more foreign investors to the country.To read this article in full, please click here
RHEL 9.0, the latest major release of Red Hat Enterprise Linux, delivers tighter security, as well as improved installation, distribution, and management for enterprise server and cloud environments.The operating system, code named Plow, is a significant upgrade over RHEL 8.0 and makes it easier for application developers to test and deploy containers.Available in server and desktop versoins, RHEL remains one of the top Linux distributions for running enterprise workloads because of its stability, dependability, and robustness. To read this article in full, please click here