Archive

Category Archives for "Network World SDN"

Arista embraces segmentation as part of its zero-trust security

Arista has expanded its security software to let customers control authorized network access and communication between groups from the data center to the cloud.The new software, Macro-Segmentation Service (MSS)-Group, expands the company’s MSS security-software family, which currently includes MSS Firewall for setting security policies across customer edge, data-center and campus networks. Additionally, the company’s MSS Host focuses on data-center security policies.See how AI can boost data-center availability and efficiency MSS software works with Arista Extensible Operating System (EOS) and its overarching CloudVision management software to provide network-wide visibility, orchestration, provisioning and telemetry across the data center and campus. CloudVision’s network information can be utilized by Arista networking partners including VMware, Microsoft and IBM’s Red Hat.To read this article in full, please click here

Dell partners to provide 5G networking, edge solution

Dell Technologies, its VMware subsidiary, and SK Telecom have partnered to provide OneBox MEC, a single-box approach that provides enterprises with an integrated, private-5G and edge-computing platform. 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises Consulting giant Deloitte believes private 5G networks will become the preferred choice of networks for many of the world’s largest businesses, especially for industrial environments such as manufacturing plants, logistics centers, and ports.To read this article in full, please click here

Factorials and unscrambling words with bash on Linux

In this post, we examine a bash script that takes a string of letters, rearranges them in every possible way and checks each permutation to identify those that are English words. In the process, we'll take a close look at the script and calculate how hard it might have to work.Note that, in the algorithm used, each letter arrangement must use all of the letters in the string provided. Words formed by substrings are not considered.How to loop forever in bash on Linux First, the script expects the scrambled string to be provided as an argument and prompts for it if none is provided. It then checks out each arrangement of letters to find those that exist in the system's words file – in this case, that's /usr/share/dict/words. Here are the first lines in the script:To read this article in full, please click here

Nvidia launches program for certified AI servers

Nvidia is offering a certification program to steer customers and partners to buy GPU servers specifically tailored for artificial intelligence (AI) workloads from top-tier OEMs and ODMs.The program, called Nvidia-Certified Systems, is similar to those offered by Intel and AMD. It tells customers that these servers with these configurations are best optimized for running AI workloads at peak performance and in large-scale deployments. READ MORE: How AI can create self-driving data centersTo read this article in full, please click here

Will carriers use 5G to provide edge services?

US mobile carriers see an opportunity to broaden their role in the enterprise marketplace as the rush to deploy 5G continues, but it’s unclear whether their strategy will be sufficient to achieve that goal, according to industry analysts. 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises Verizon, AT&T and T-Mobile are cornerstones of America’s Internet infrastructure, but their role has been largely restricted to data transport for most of their history. The provide data pipelines, but efforts to monetize their networks beyond the simple provision of transport for other companies’ data have met with mixed success, at best.To read this article in full, please click here

Ethernet innovation pits power against speed

While the move to 400G Ethernet has so far been a largely hyperscaler and telco-network event, the ambition for those users, as well as data-center customers is ultimately to  move to at least 800Gbps and possibly 1.6Tbps.And while 800Gbps seems to be a solid goal for Ethernet networking visionaries, the challenges—such as the optics, power, and architecture required to make the next speed leap—seem formidable.The need for increased speed in data centers and cloud services is driven by myriad things including the continued growth of hyperscale networks from players like Google, Amazon and Facebook, but also the more distributed cloud, artificial intelligence, video, and mobile-application workloads that current and future networks will support.To read this article in full, please click here

ExaGrid updates and streamlines its backup appliances

I'm a sucker for the underdog, so shame on me for focusing on the big guys for so long. It's time to change that with some news from ExaGrid, a competitor of Dell EMC and HP Enterprise in the data backup appliance market.Earlier this month, ExaGrid announced it has increased the capacity of its Tiered Backup Storage appliances while also reducing its offerings from nine systems to seven. Appliances of any size can be mixed and matched in a cluster of up to 32 appliances.ExaGrid also changed the naming convention of the appliances to better reflect their capacity. For example, the discontinued bottom-of-the-line EX3000 had 3TB of full backup capacity, while the new bottom-end appliance is the EX6, with 6TB of full backup capacity storage.To read this article in full, please click here

Serious 10-year-old flaw in Linux sudo command; a new version patches it

Linux users should immediately patch a serious vulnerability to the sudo command that, if exploited, can allow unprivileged users gain root privileges on the host machine.Called Baron Samedit, the flaw has been “hiding in plain sight” for about 10 years, and was discovered earlier this month by researchers at Qualys and reported to sudo developers, who came up with patches Jan. 19, according to a Qualys blog. (The blog includes a video of the flaw being exploited.)To read this article in full, please click here

Using the vim editor in Linux to quickly encrypt and decrypt files

Any time you have a text file on a Linux system that you want to keep private regardless of the privileges that other users with accounts on the system may have, you can resort to encryption. One easy way to do this is to use a feature that is built into the vim editor. You will have to provide a password that will you then need to remember or store in a password safe, but the process is straightforward. The file name will not be changed in any way, and the content of the file can be recovered in much the same way that it was encrypted.To begin, let's say that we have a file that begins like this:$ head -3 mysecret I feel the need to put my deepest darkest secret into a text file on my Linux system. While this likely isn't common practice, I'm not sure that I can trust anyone with it. But a penguin? That's a different story! So here goes ... Now, not wanting to risk your deepest darkest secret to fellow users, you use vim with its -x (encryption) option.To read this article in full, please click here

Gartner: 2021 IT spending rally could hit $3.9T

Gartner projects worldwide IT spending will total $3.9 trillion in 2021, an increase of 6.2% over 2020 when spending declined a little over 3%.All IT spending segments—from data-center systems to communications services—are forecast to return to growth in 2021, according to Gartner . Enterprise software is expected to have the strongest rebound, 8.8%, as remote work environments are expanded and improved. The devices segment will see the second highest growth in, 8%, and is projected to reach $705.4 billion.To read this article in full, please click here

IT workforce suffering under COVID-19, waiting on herd immunity for rebound

For the first year since the dot-com bubble popped, IT salaries were largely flat in 2020, and tens of thousands of jobs were lost in 2020, according to a report from independent management consultants Janco Associates.Hardest-hit were middle management jobs at both large enterprises and smaller companies, where salaries actually dropped by about 0.08%, while executive and staff-level jobs remained steady or grew by a similarly small amount.“What’s been hard hit, mostly, are IT organizations and SMBs,” said Victor Janulaitis, the CEO of Janco, which published the report. “That’s where the majority of the IT jobs are in the marketplace today.”To read this article in full, please click here

VMware takes an executive talent hit but can handle it

The news that Pat Gelsinger is departing as CEO of VMware to take over at Intel generated a positive response for Intel and an equally negative response for VMware. Intel's stock jumped 7% on the day of the news, while VMware's stock fell 7%, and investment bank Piper Sandler slashed its VMware price target from $178 down to $157.Most of the discussion has been around Gelsinger and his return to Intel. VMware, meanwhile, has been overlooked in the process. So what's the outlook for VMware, which has lost more talent than just its CEO in recent months? To read this article in full, please click here

How-to measure enterprise Wi-Fi speeds

There are many ways to evaluate the speed of your wireless LAN (WLAN), whether you’re trying to troubleshoot issues, ensure bandwidth-intensive clients will work well, fine-tune the performance, or just curious about your Wi-Fi speeds. Wi-Fi resources Test and review of 4 Wi-Fi 6 routers: Who’s the fastest? How to determine if Wi-Fi 6 is right for you Five questions to answer before deploying Wi-Fi 6 Wi-Fi 6E: When it’s coming and what it’s good for The simple Internet-speed apps or websites can be useful, but sometimes you need to measure the actual Wi-Fi throughput. For this you usually need a testing platform with a server and clients.To read this article in full, please click here

Test and review of 4 Wi-Fi 6 routers: Who’s the fastest?

One of the most anticipated features of Wi-Fi 6 wireless routers is improved throughput over their Wi-Fi 5 predecessors, and we wanted to check whether they deliver. Wi-Fi resources How to determine if Wi-Fi 6 is right for you Five questions to answer before deploying Wi-Fi 6 Wi-Fi 6E: When it’s coming and what it’s good for Four vendors – Extreme, Cisco, EnGenius and Meraki (owned by Cisco) – provided access points (AP) for our test. Since the routers support both Wi-Fi 5 (802.11ac) and Wi-Fi 6 (802.11ax), we tested them against two Wi-Fi 5 and two Wi-Fi 6 clients and recorded the average throughput and the peak throughput during one-minute tests.To read this article in full, please click here

Wi-Fi 6E: When it’s coming and what it’s good for

This spring the FCC opened up a new swath of unlicensed wireless spectrum in the 6GHz band that’s intended for use with Wi-Fi and can provide lower latency and faster data rates. The new spectrum also has a shorter range and supports more channels than bands that were already dedicated to Wi-Fi, making it suitable for deployment in high-density areas like stadiums.To read this article in full, please click here(Insider Story)

Cisco tags critical security holes in SD-WAN software

Cisco has noted and fixed two critical and a number of high-degree vulnerabilities in its SD-WAN software portfolio.Most of the vulnerabilities could let an authenticated attacker execute command injection attacks against an affected device, which could let the attacker utilize root privileges on the device.The first critical problem–with a Common Vulnerability Scoring System rating of 9.9 out of 10–is  vulnerability in the web-based management interface of Cisco SD-WAN vManage Software. “This vulnerability is due to improper input validation of user-supplied input to the device template configuration,” Cisco stated. “An attacker could exploit this vulnerability by submitting crafted input to the device template configuration. A successful exploit could allow the attacker to gain root-level access to the affected system.”To read this article in full, please click here

Lessons that insurrection selfies hold for legitimate enterprises

The pro-Trump rioters who invaded the Capitol on January 6 came with smartphones to record and celebrate what they thought was a righteous effort to prevent president-elect Joe Biden from taking office two weeks later.Now those electronic devices, along with the GPS data they generated, are being used to track the location of rioters within the building as federal law enforcement officials continue to make arrests and build criminal cases.Among the acts being investigated: breaking through police barriers, smashing windows, and assaulting police officers and media members. Five people died including a Capitol Hill police officer who was bludgeoned with a fire extinguisher.To read this article in full, please click here

Study: Cloud transformation necessary for digital transformation

Cloud migration is a necessary step for digital transformation, which is proceeding faster than planned at many enterprises because of the COVID-19 pandemic, according to research from Cloud Industry Forum (CIF), a cloud computing organization based in the United Kingdom.The cloud is an important steppingstone for getting off legacy on-prem technologies and outfitting today's more flexible, remote workforce. Supporting a remote workforce requires a digital transformation, and to do that, companies need the cloud – public, private, or hybrid. CIF found that in many sectors, remaining productive during lockdown depended on their cloud-readiness.To read this article in full, please click here

Survey: Native SD-WAN monitoring tools are not enough

(Editor’s note: A recent Enterprise Management Associates survey of 303 WAN managers found that native monitoring is an important factor in choosing SD-WAN products, but many respondents say additional third-party monitoring tools are also needed. This article by EMA Vice President of Research Networking Shamus McGillicuddy explores some of the survey results  included in the report “Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic” that is based on the survey.)To read this article in full, please click here

1 42 43 44 45 46 366