Archive

Category Archives for "Network World SDN"

Cisco adds proactive problem solving to data-center software

Proactively fixing a network problem before it becomes a full-blown nightmare is the goal of new software Cisco has added to its Data Center Network Assurance and Insights suite.Cisco Assurance is a key component of the company’s intent-based networking initiative that maintains a continuous validation and verification that the network is doing what the customer expects.  [Get regularly scheduled insights by signing up for Network World newsletters.] Network Insights is software Cisco customers use to monitor and record hardware and software telemetry data over time to identify anomalies in the fabric and help automate troubleshooting, root-cause analysis, capacity planning and remediation, according to Cisco. For example, Network Insights can watch over network component usage patterns and audit logs, events, and faults as well as latency conditions from Cisco Application Centric Infrastructure or Data Center Network Manager (DCNM) network fabrics.To read this article in full, please click here

BrandPost: SASE: What It Is, What It Isn’t, and Why Should You Even Care

For years, enterprise networking and security leaders have had to weather the complaints and consternation of IT and business executives. IT costs too high? Blame that MPLS network.  Web taking too long to load? It’s that darn VPN client again. Now a new product category, Secure Access Service Edge (SASE), is supposed to put networking and security teams firmly ahead of the game. So impactful is this new sector that Gartner’s termed it “transformational,” a lofty status that not even SD-WAN, with all of its market impact, ever achieved. Within four years, Gartner expects 40% of enterprises will have strategies to adopt SASE.To read this article in full, please click here

BrandPost: Why Your SD-WAN Deployment is Failing

I’m going to say something you may not want to hear, or you may already know: implementing SD-WAN is hard. Among the promise and hype of automation, dynamic path selection, zero-touch provisioning and a cloud-ready WAN, lies a trail of failed SD-WAN projects, with many others struggling on life support. For many, the WAN of the future has failed to manifest into anything more than another hard-to-manage, costly IT project that has failed to deliver on its promises (or, has failed to live up to your expectations), but why?The problems SD-WAN solutions address are not incremental change or gradual evolution, they are the result of industry megatrends that have upended the way we consume applications and connect our users, all in a very short period of time. These megatrends, such as Digital Transformation and the move to SaaS, IaaS and Cloud have placed new demands on network infrastructure, IT staff and application owners; requiring a complete rethink of how they are connecting locations, delivering applications and services and securing their networks. The sheer gravity of these changes, and scope of what needs to be done to support them, cannot be undertaken in an additive approach. Rather, they must be Continue reading

BrandPost: The Zettabyte Era is Coming – Are you Ready?

It’s no secret that data growth is at an all-time high. IDC expects 103 zettabytes of data to be generated worldwide by 20231. Yes, zettabytes. With the proliferation of IoT devices, 5G-enabled technologies, and the massive growth of video, we’re just scratching the surface of how companies will store and extract value from data.Machine data will play a leading role, as it is expected to outpace commercial/consumer data. By 2023, more than 90% of data will be generated by machines2 (i.e. smart cities, IoT, endpoints, autonomous cars, etc.). In addition, video, surveillance footage, and large AI/ML data sets – this “natural streaming” or sequential data – will be everywhere. To read this article in full, please click here

Beyond Moore’s Law: Neuromorphic computing?

With the conceivable exhaustion of Moore’s Law – that the number of transistors on a microchip doubles every two years – the search is on for new paths that lead to reliable incremental processing gains over time.One possibility is that machines inspired by how the brain works could take over, fundamentally shifting computing to a revolutionary new tier, according to an explainer study released this month by Applied Physics Reviews.[Get regularly scheduled insights by signing up for Network World newsletters.] “Today’s state-of-the-art computers process roughly as many instructions per second as an insect brain,” say the paper’s authors Jack Kendall, of Rain Neuromorphics, and Suhas Kumar, of Hewlett Packard Labs. The two write that processor architecture must now be completely re-thought if Moore’s law is to be perpetuated, and that replicating the “natural processing system of a [human] brain” is the way forward.To read this article in full, please click here

Windows Server vulnerability disclosed by NSA; Don’t wait to patch

Microsoft’s monthly Patch Tuesday included a hefty haul of fixes: 49 total, and one of them is more than just critical. For enterprises running Windows Server 2016 and Server 2019, it's vital you implement the patch ASAP.The National Security Agency (NSA) disclosed the Windows vulnerability on Tuesday, the same day the fix was issued. That means the NSA found the flaw likely months ago but held off on public notification until Microsoft could come up with a fix. It would be irresponsible for the NSA, or anyone else, to announce a vulnerability and not give the software maker time to patch it.The vulnerability was spotted in "crypt32.dll," a Windows module that has been in both desktop and server versions since NT 4.0 more than 20 years ago. Microsoft describes the library as handling certificate and cryptographic messaging functions in the CryptoAPI.To read this article in full, please click here

Windows Server vulnerability disclosed by NSA; don’t wait to patch

Microsoft’s monthly Patch Tuesday included a hefty haul of fixes: 49 total, and one of them is more than just critical. For enterprises running Windows Server 2016 and Server 2019, it's vital you implement the patch ASAP.The National Security Agency (NSA) disclosed the Windows vulnerability on Tuesday, the same day the fix was issued. That means the NSA found the flaw likely months ago but held off on public notification until Microsoft could come up with a fix. It would be irresponsible for the NSA, or anyone else, to announce a vulnerability and not give the software maker time to patch it.The vulnerability was spotted in "crypt32.dll," a Windows module that has been in both desktop and server versions since NT 4.0 more than 20 years ago. Microsoft describes the library as handling certificate and cryptographic messaging functions in the CryptoAPI.To read this article in full, please click here

Locking and unlocking accounts on Linux systems

If you are administering a Linux system, there will likely be times that you need to lock an account. Maybe someone is changing positions and their continued need for the account is under question; maybe there’s reason to believe that access to the account has been compromised. In any event, knowing how to lock an account and how to unlock it should it be needed again is something you need to be able to do.One important thing to keep in mind is that there are multiple ways to lock an account, and they don't all have the same effect. If the account user is accessing an account using public/private keys instead of a password, some commands you might use to block access to an account will not be effective.To read this article in full, please click here

Serverless computing: Ready or not?

Until a few years ago, physical servers were a bedrock technology, the beating digital heart of every data center. Then the cloud materialized. Today, as organizations continue to shovel an ever-growing number of services toward cloud providers, on-premises servers seem to be on the verge of becoming an endangered species.Serverless computing is doing its share to accelerate the demise of on-premises servers. The concept of turning to a cloud provider to dynamically manage the allocation of machine resources and bill users only for the actual amount of resources consumed by applications is gaining increasing acceptance. A late 2019 survey conducted by technical media and training firm O'Reilly found that four out of 10 enterprises, spanning a wide range of locations and industries, have already adopted serverless technologies.To read this article in full, please click here

Instant, secure ‘teleportation’ of data in the works

Sending information instantly between two computer chips using quantum teleportation has been accomplished reliably for the first time, according to scientists from the University of Bristol, in collaboration with the Technical University of Denmark (DTU). Data was exchanged without any electrical or physical connection – a transmission method that may influence the next generation of ultra-secure data networks.Teleportation involves the moving of information instantaneously and securely. In the “Star Trek” series, fictional people move immediately from one place to another via teleportation. In the University of Bristol experiment, data is passed instantly via a single quantum state across two chips using light particles, or photons. Importantly, each of the two chips knows the characteristics of the other, because they’re entangled through quantum physics, meaning they therefore share a single physics-based state.To read this article in full, please click here

Get this essential cloud security certification training bundle for only $49

Most businesses operate via the cloud. That means now is an ideal time to consider a career keeping them secure. But that doesn’t necessarily mean that you’d have to go back to school for professional training. Instead, you can easily learn from home — and prep to earn valuable credentials that’ll help you land a job — with The Essential Cloud Security Certification Bundle, now just $49.To read this article in full, please click here

BrandPost: SD-WAN Enables Large-Scale Enterprise Deployments Including Mobile & IoT

As global enterprises continue to adopt and deploy SD-WAN as a key enabler of cloud and digital transformation initiatives, they must also consider the importance of infrastructure scalability to accommodate the dynamic nature of connecting users to business applications and services regardless of where they are physically located. This is driving an increased focus on ease-of-use, automation, and orchestration, which industry analyst firm Futuriom cites as one of the top features of SD-WAN functionality.Why is this becoming increasingly important? Many large-scale global enterprises have multiple divisions, business units or subsidiaries that may each require a dedicated SD-WAN fabric to comply with company financial policies, geography, business jurisdiction or regulatory requirements or simply to create independent administrative domains. Each fabric can be individually orchestrated and managed yet still provides centralized network-wide visibility and control, including aggregated observability of the entire network.To read this article in full, please click here

BrandPost: Survey Says End-to-End NVMe™ is in Your Future

There’s always an adoption curve when it comes to new technologies. In today’s digital landscape, where industries are constantly being disrupted by new applications and use cases driven by IoT, machine learning, AI, and analytics, those not on the NVMe™ adoption curve may get left behind. Simply put, IT managers must design for the future.Today, many IT organizations have started embracing NVMe for its high performance and low latency— and as a better alternative to legacy protocols such as SATA for accessing flash storage. But for others, the question is not “if,” but “when” you will bring NVMe into your organization.To read this article in full, please click here

How AppArmor can protect your Linux system

AppArmor is a useful Linux security module that can restrict the file-system paths used by an application.It works differently than Security-Enhanced Linux (SELinux) and cannot run on at the same time on the same system with SELinux, which comes installed on some Linux distributions.The question is when to use AppArmor and what it can do to protect your system.This 2-Minute Linux Tip video below is an introduction to AppArmor and how to get starting using it. YT embed: To read this article in full, please click here

Price of NAND memory chips projected to rise up to 40%

Sources in Asian memory chipmakers are projecting that NAND flash contract prices will rise by 40% in 2020 due to product ramps and increased demand, according to the Taiwanese publication DigiTimes.The article, now locked behind a subscription wall, cited sources at Taiwanese memory makers. However, the biggest makers of NAND flash are not Taiwanese, like Samsung, Toshiba, and Micron. This would impact memory cards, USB flash drives, and solid-state drives. It noted the contract price of SSDs had been falling for a few years and only started to rise after production issues reduced NAND output in the second quarter of 2019.To read this article in full, please click here

1 54 55 56 57 58 366