Archive

Category Archives for "Network World SDN"

SolarWinds roundup: Fixes, new bad actors, and what the company knew

The SolarWinds Orion security breach is unfolding at a rapid pace, and the number of vendors and victims continues to grow. Each day brings new revelations as to its reach and depth. Of particular concern are the rate of infection and impact on government systems.In case you missed it, a backdoor was found in the SolarWinds Orion IT monitoring and management software. A dynamic link library called SolarWinds.Orion.Core.BusinessLayer.dll, a SolarWinds digitally-signed component of the Orion software framework, was found to contain a backdoor that communicates via HTTP to third-party servers.[Get regularly scheduled insights by signing up for Network World newsletters.] After an initial dormant period of up to two weeks, the Trojan retrieves and executes commands, called jobs, that include the ability to transfer files, execute files, profile the system, reboot, and disable system services. In short, a total takeover of the machine.To read this article in full, please click here

Cisco takes additional steps to fight counterfeit network gear

Looking to counter the growing sophistication of counterfeit networking products, Cisco recently added new layers to protect customers.“Counterfeiting hardware and software is an illegal and lucrative trade which leads to an estimated $100B loss of revenue annually across IT industries. As one of the largest and most reputable brands in the world, Cisco is often a target of counterfeiters,” said Al Palladin, legal director and  head of Global Brand Protection at Cisco.Counterfeiting presents serious risks to network quality, performance, safety, and reliability. It is dangerous because counterfeit products are not designed or built to meet the same safety standard certifications that genuine Cisco products attain, he said.To read this article in full, please click here

Lenovo unveils hybrid-cloud management tools

Lenovo Data Center Group has released new storage and data-management tools designed to boost performance and improve monitoring and analytic capabilities across enterprise systems that span the edge, data center and cloud.The enhancements include a new all-flash storage array with end-to-end NVMe support, an updated cloud-based management platform, and a new fibre channel switch. READ MORE: HP Enterprise expands GreenLake to cover HPC systems Lenovo ThinkSystem DM5100F The new Lenovo ThinkSystem DM5100F is high-performance, low-latency, all-NVMe storage at an affordable price point, designed to enhance analytics and AI deployments while accelerating applications' access to data. It's capable of delivering up to 45% improved performance compared to prior models, according to Lenovo.To read this article in full, please click here

SolarWinds Trojan: Affected enterprises must use hot patches, isolate compromised gear

Hot patching and isolating potentially affected resources are on the IT response schedule as enterprises that employ SolarWinds Orion network-monitoring software look to limit the impact of the serious Trojan unleashed on the platform.The supply-chain attack, reported early this week by Reuters and detailed by security researchers at FireEye and Microsoft involves a potential state-sponsored, sophisticated actor gained access to a wide variety of government, public and private networks via Trojanized updates to SolarWind’s Orion network monitoring and management software. This campaign may have begun as early as spring 2020 and is ongoing, according to FireEye and others.To read this article in full, please click here

Multcloud management: Challenges for technology, people, processes

When it comes to managing hybrid and multicloud environments there are many options but no easy path nor lack of challenges. Tech Spotlight: Multicloud Are you ready for multicloud? A checklist (InfoWorld) 5 challenges every multicloud strategy must address (CIO) How to manage multiple cloud collaboration tools in a WFH world (Computerworld) Building stronger multicloud security: 3 key elements (CSO) While cloud computing has been around in some form for more than a decade, tools to manage its current enterprise iterations from private, on-premises, or public locations are still evolving at a rapid rate. Gartner says that more than 90 vendors—including IBM/Red Hat, VMware, CloudBolt, Flexera, Scalr, Cisco, and Nutanix—offer varying degrees of cloud-management capabilities.To read this article in full, please click here

AWS improves SD-WAN-to-cloud connectivity with Cisco, Aruba, Arista and others

Amazon Web Services has rolled out a new, more native way to connect SD-WAN infrastructures with AWS resources.Introduced at its re:Invent virtual event, AWS Transit Gateway Connect promises a simpler, faster, and more secure way for customers to tie cloud-based resources back to data centers, remote office workers or other distributed access points as needed.Thirteen networking vendors including Cisco, Aruba, Arista, Alkira, Fortinet, Palo Alto, and Versa announced support for the technology, which offers higher throughput and increased security for distributed cloud workloads.To read this article in full, please click here

FCC’s 5G-frequency auction prompts $2 billion in bids on the first day

Licenses for premium wireless bandwidth sought by service providers to build out high-performance 5G networks is being auctioned off by the Federal Communications Commission, potentially grossing up to $50 billion and enabling features that enterprises desire most. 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises The spectrum on the block is a piece of what’s known as the C-band, specifically the 280MHz-wide swath of it from 3.7GHz to 3.98GHz. It provides wider channels that support faster connections and lower latency than other ranges available to carriers, analysts say.To read this article in full, please click here

Nutanix expands hybrid-cloud features to support unstructured data

Nutanix has expanded the capabilities of its Objects and Files unstructured-data storage offerings with new hybrid-cloud capabilities for deploying a scale-out storage fabric across their various cloud environments.These new storage services are built on the recently launched Nutanix Clusters, which support Nutanix’s hyperconverged infrastructure (HCI) software running in AWS and, eventually, Microsoft Azure. New features include cloud tiering for object storage, hybrid-cloud file storage, and simplified disaster recovery.“IT teams around the world are quickly moving to hybrid environments, and they’re looking for technology solutions to help them facilitate this transition, to help them manage disparate technologies and simplify operations,” says Rajiv Mirani, chief technology officer of Nutanix in a statement. “We recently extended our hyper-converged-infrastructure software to public cloud with the launch of Nutanix Clusters to help companies do just that. Now the focus is on strengthening the overall platform, including delivering an easy-to-use, scale out storage fabric across their different cloud environments.”To read this article in full, please click here

Using pidof and pgrep to list process IDs

The pidof and pgrep commands provide listings of process IDs (PIDs) for process names that you provide as arguments. This post shows how to use these commands and illustrates the differences between them with a series of examples.pidof There are a number of ways to determine the PID of a process running on a Linux system, but the easiest is probably a command called pidof. Read this as “PID of” and you’ll have an easy time remembering it. Using this command, you can get the PID of a process by typing “pidof” and specifying the process name. For example:$ pidof bash 1262005 If you were to run the ps command without arguments, you will get a list of the processes that you’re running in your current shell. The command below shows where the response above comes from:To read this article in full, please click here

Aruba unveils new data-center orchestration software, switches

Aruba has taken the wraps off new orchestration software and switches that target users looking to build and support distributed data-centers.Aruba Fabric Composer software simplifies leaf-and-spine network provisioning across the company’s CX switches and automates operations across a wide variety of virtualized, hyper-converged, and HPE compute and storage environments.The Fabric Composer runs as runs as a virtual machine and eliminates the need for networking teams to manually configure CX switches. It offers workflow automation and a view of workflows supported by networking fabrics, switches, hosts and other resources, said Steve Brar, senior director of product marketing for Aruba.To read this article in full, please click here

Juniper reinforces its intent-based networking with Apstra buy

Looking to shore-up its intent-based networking software portfolio, Juniper has said it will buy Apstra for an undisclosed amount. Founded in 2014, Apstra’s claim to fame is its flagship Apstra Operating System (AOS) software which was developed from the start to support IBN features. Once deployed, AOS keeps a real-time repository of configuration, telemetry and validation information to constantly ensure the network is doing what the customer wants it to do.AOS also includes automation features to provide consistent network and security policies for workloads across physical and virtual infrastructures. Its intent-based analytics perform regular network checks to safeguard configurations and is hardware agnostic so it can be integrated to work with products from Cisco, Arista, Dell, Microsoft and Nvidia/Cumulus.To read this article in full, please click here

What is a WAN? Wide-area network definition and examples

People want to connect to all of their apps all of the time from all of their devices no matter where they are. And they pretty much can, thanks to wide-area networks (WANs).At its core, a WAN is a network of networks. The Internet itself is a giant WAN, and how you connect to it can be as diverse as through an Ethernet cable, coaxial cable, or a cellular radio signal.Your office network, home Wi-Fi, cellphone, smartwatch, doorbell camera and vehicle-based Internet connection are just endpoints on a vast global WAN that is constantly evolving to carry more traffic, and to carrt that traffic faster as the demands for near-instantaneous access to resources increase.To read this article in full, please click here

What to know about Azure Arc’s hybrid-cloud server management

Azure Arc for servers, a centralized management tool that provides visibility into Azure data services, Kubernetes clusters, and servers running Windows or Linux, has been generally available since September, helping fulfill Microsoft’s stated intent to support enterprise hybrid-cloud architectures.To read this article in full, please click here(Insider Story)

Dell launches its first all-flash object storage appliance

Dell Technologies has introduced its first all-flash object storage appliance, saying the perception that object file storage is "slow, cheap and deep" is changing as the massive growth of unstructured data makes enterprises more inclined to use high-performance storage for object-based applications.The company is adding a new appliance, called the EXF900, to the Dell EMC ECS EX-Series lineup. It claims the EXF900 has the highest performance of the ECS range of appliances, but that's because the rest of the lineup – the low-end EX300, the mid-range EX500 and high-end EX3000 arrays – are all disk based. READ MORE: Gartner's top 9 strategic technology trends for 2021To read this article in full, please click here

Zero trust planning: Key factors for IT pros to consider

Moving away from VPNs as a means to protect corporate networks at the perimeter and moving toward zero-trust network access requires careful enterprise planning and may require implementing technologies that are new to individual organizations.ZTNA employs identity-based authentication to establish trust with entities trying to access the network and grants each authorized entity access only to the data and applications they require to accomplish their tasks. It also provides new tools for IT to control access to sensitive data by those entities that are deemed trusted.To read this article in full, please click here

Startup EdgeQ offers 5G and AI for the edge

A new startup has emerged from stealth mode with a design that converges 5G connectivity and AI compute onto a system-on-a-chip (SoC) that's aimed at edge networks. Founded in 2018, EdgeQ was launched by former executives at Broadcom, Intel, and Qualcomm and has racked up $51 million in funding.EdgeQ's AI-5G SoC is aimed at 5G private wireless networks for the Industrial Internet of Things (IIoT). EdgeQ says its chip will allow enterprises in manufacturing, energy, automotive, telco and other verticals to harness private networking for disruptive applications, intelligent services, and new business models.To read this article in full, please click here

Facts about backup security that should scare you to death

Least privilege—the idea that each person in your organization should have the least number of privileges they need in order to accomplish a given task—is an important security concept that needs to be implemented in your backup system.The challenge here is that network, system, and backup admins all wield an incredible amount of power. If one of them makes a mistake, or worse, intentionally tries to do the company harm, limiting the amount of power they have reduces the amount of damage they can inflict.For example, you might give one network administrator the ability to monitor networks, and another one the ability to create and/or reconfigure networks. Security admins might be responsible for creating and maintaining network-administration users without getting any of those privileges themselves.To read this article in full, please click here

Many ways to sort file content on Linux

The Linux sort command can arrange command output or file content in a lot more ways than you might realize--alphabetically, numerically, by month and randomly are only some of the more interesting choices. In this post, we take a look at some of the more useful sorting options and explain how they differ.The default The default sort might seem fairly straightforward. Digits come first, followed by letters and, for each letter, lowercase characters precede uppercase characters. You can expect to see this kind of ordering:012345aAbBcCdDeEASCII order Looking at the numeric byte values for each of these letters, you may note that what you see above is not the "natural order" as far as ASCII is concerned.To read this article in full, please click here

1 44 45 46 47 48 366