IBM is taking aim at the challenging concept of securely locking-down company applications and data spread across multiple private and public clouds and on-premises locations.IBM is addressing this challenge with its Cloud Pak for Security, which features open-source technology for hunting threats, automation capabilities to speed response to cyberattacks, and the ability integrate customers’ existing point-product security-system information for better operational safekeeping – all under one roof.[ Learn how server disaggregation can boost data center efficiency and how Windows Server 2019 embraces hyperconverged data centers . | Get regularly scheduled insights by signing up for Network World newsletters. ]
IBM Cloud Paks are bundles of Red Hat’s Kubernetes-based OpenShift Container Platform along with Red Hat Linux and a variety of connecting technologies to let enterprise customers deploy and manage containers on their choice of infrastructure, be it private or public clouds, including AWS, Microsoft Azure, Google Cloud Platform, Alibaba and IBM Cloud.To read this article in full, please click here
Third time’s the charm? Intel is hoping so. It released details of its Xe Graphics Architecture, with which it plans to span use cases from mobility to high-performance computing (HPC) servers – and which it hopes will succeed where its Larrabee GPU and Xeon Phi manycore processors failed.It’s no secret Intel wants a piece of the high-performance computing HPC action, given that it introduced the chip and other products at it Intel HPC Developer Conference in Denver, Colo., this week just ahead of the Supercomputing ’19 tradeshow.To read this article in full, please click here
The internet has made it easier than ever for companies to expand their reach and go digital, but by doing so, they’re also at risk of being attacked by hackers and cybercriminals. Luckily, this also means that cybersecurity professionals are in high demand, and if you want to land a career in cybersecurity, there’s no better time! With this eBook bundle, you’ll learn what it takes to become a cybersecurity professional for just $15.To read this article in full, please click here
IDG Insider Pro and CertNexus are partnering to offer business leaders a course and associated credential to boost collaboration and drive informed IoT business decisions.
SD-WAN streamlines how application traffic is routed from the branch, making it easier to create local internet breakout and allowing users to access cloud services directly from the branch. In an ideal SD-WAN scenario, every remote location and device has its own local internet breakout and corresponding security services. Yet, reality looks a lot different for many companies. This is something network professionals have wanted to enable for decades. The problem was that setting up local internet breakout using traditional routers was not trivial and required a tremendous amount of engineering work so most businesses, except for the ones that had high levels of technical talent shied away. The shift to cloud and edge computing has made local internet breakout almost mandatory today, so businesses have turned to SD-WAN as a simpler path to enable it. As this happens, organizations need to understand the security risks. To read this article in full, please click here
Despite the clear cost benefits, white-box switches outfitted with independent network operating systems (NOS) solutions have seen only limited adoption in leading enterprise IT shops. That’s due to the lack of a clear market leader, implementation challenges and concerns about service and support that have steered IT pros toward traditional, branded-box Ethernet switches instead.[Get regularly scheduled insights by signing up for Network World newsletters.]
But maturing technology and new support alliances are making white-box switches an attractive alternative for greenfield deployments and for infrastructure that’s being upgraded to give performance boosts to data centers, campuses and branch offices.To read this article in full, please click here
Data center provider Digital Realty Trust isn't resting after its massive EMEA push via the acquisition of Interxion. The company unveiled PlatformDIGITAL, an initiative designed to provide interconnections to customers and manage big data. Digital Realty made the announcement at its MarketplaceLIVE conference. At the heart of the PlatformDIGITAL strategy is Pervasive Datacenter Architecture (PDx), which offers "fit-for-purpose" data center designs meant to solve scale, configuation and connectivity issues faced by enterprise colocation customers.To read this article in full, please click here
For decades, storage technology progress was measured primarily in terms of capacity and speed. No longer. In recent times, those steadfast benchmarks have been augmented, and even superseded, by sophisticated new technologies and methodologies that make storage smarter, more flexible and easier to manage.Next year promises to bring even greater disruption to the formerly staid storage market, as IT leaders seek more efficient ways of coping with the data tsunami generated by AI, IoT devices and numerous other sources. Here's a look at the five storage technologies that will create the greatest disruption in 2020, as enterprise adoption gains ground.To read this article in full, please click here
Much of the hyperbole around the Internet of Things isn’t really hyperbole anymore – the instrumentation of everything from cars to combine harvesters to factories is just a fact of life these days. IoT’s here to stay.Yet despite the explosive growth – one widely cited prediction from Gartner says that the number of enterprise and automotive IoT endpoints will reach 5.8 billion in 2020 – the IoT market’s ability to address its known flaws and complications has progressed at a far more pedestrian pace. That means ongoing security woes and a lack of complete solutions are most of what can be safely predicted for the coming year.To read this article in full, please click here
DXC Technology, the massive service provider formed in the 2017 merger of HPE Enterprise Services (formerly EDS) and Computer Sciences Corp., has a new CEO who is focused on shedding distraction businesses and focusing on core businesses of IT outsourcing.That means looking at "strategic alternatives," including the possible divesture of three of its businesses it feels are a distraction and slowing the company’s growth. The company feels most IT apps and services will remain on-premises and will focus on supporting that business.Last week’s conference call with financial analysts to discuss Q2 earnings was the first for new CEO Mike Salvino, who joined the company in September after 22 years at Accenture. DXC did not have a good quarter. The company reported non-GAAP earnings of $1.38 per share, which fell short of the consensus estimate of $1.44 and way down from EPS of $2.02 from the same quarter a year ago. Revenue of $4.85 billion fell short of the analyst estimate of $4.92 billion.To read this article in full, please click here
Running apt-get commands on a Debian-based system is routine. Packages are updated fairly frequently and commands like apt-get update and apt-get upgrade make the process quite easy. On the other hand, how often do you use apt-get clean, apt-get autoclean or apt-get autoremove?These commands clean up after apt-get's installation operations and remove files that are still on your system but are no longer needed – often because the application that required them is no longer installed.[Get regularly scheduled insights by signing up for Network World newsletters.]
apt-get clean
The apt-get clean command clears the local repository of retrieved package files that are left in /var/cache. The directories it cleans out are /var/cache/apt/archives/ and /var/cache/apt/archives/partial/. The only files it leaves in /var/cache/apt/archives are the lock file and the partial subdirectory.To read this article in full, please click here
Capturing solar energy in space and then beaming it down to Earth could provide consistent electricity supplies in places that have never seen it before. Should the as-yet untested idea work and be scalable, it has applications in IoT-sensor deployments, wireless mobile network mast installs and remote edge data centers.The radical idea is that super-efficient solar cells collect the sun’s power in space, convert it to radio waves, and then squirt the energy down to Earth, where it is converted into usable power. The defense industry, which is championing the concept, wants to use the satellite-based tech to provide remote power for forward-operating bases that currently require difficult and sometimes dangerous-to-obtain, escorted fuel deliveries to power electricity generators.To read this article in full, please click here
Three Common Vulnerabilities and Exposures (CVEs) opened yesterday track three flaws in certain Intel processors, which, if exploited, can put sensitive data at risk.Of the flaws reported, the newly discovered Intel processor flaw is a variant of the Zombieload attack discovered earlier this year and is only known to affect Intel’s Cascade Lake chips.[Get regularly scheduled insights by signing up for Network World newsletters.]
Red Hat strongly suggests that all Red Hat systems be updated even if they do not believe their configuration poses a direct threat, and it is providing resources to their customers and to the enterprise IT community.To read this article in full, please click here
To manage moving all your server applications to the cloud in containers, you’ll need to do some container orchestration, that's where Kubernetes comes in.
Learning how to manage your money correctly is a necessary step towards financial freedom. However, we always seem to forget about online subscription services that go unused. Perhaps you haven’t watched Netflix or forgot to cancel a one-month free trial; if you have these services set to autopay, you’ll end up wasting money on them each month. Let’s be honest, though. Who has the time to hunt down every payment or fee that gets charged to them monthly? This is hassle enough for a single bank account, but it’s nearly impossible to do if you manage multiple accounts manually. If you want a refined way to track and manage your finances, you can download Truebill for free and start lowering your monthly payments today.To read this article in full, please click here
It is widely known that enterprises are rapidly migrating many of their back-office business applications and end-user collaboration tools from server-based, private data center hosted services to cloud-hosted services. Commercial software-as-a-service (SaaS) application suites like Office 365, are already some of the most widely deployed SaaS applications, and adoption by enterprises of all sizes continues to grow around the world. In a cloud-first enterprise, end users frequently need to access cloud-hosted applications like Office 365 from any location. Regardless of when and where users access cloud applications, they expect a consistent, high quality of experience.To read this article in full, please click here
Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 70%, with 3 extra months on top. Use our link and see the discount applied when you click "buy now".
Edge computing is transforming the way data is being handled, processed, and delivered from millions of devices around the world. The explosive growth of internet-connected devices – the IoT – along with new applications that require real-time computing power, continues to drive edge-computing systems.Faster networking technologies, such as 5G wireless, are allowing for edge computing systems to accelerate the creation or support of real-time applications, such as video processing and analytics, self-driving cars, artificial intelligence and robotics, to name a few.To read this article in full, please click here
As enterprises rely more on cloud, colocation and hosting providers, they should check whether their services support IPv6, which can provide better experiences for their customers, partners, suppliers, vendors and employees.Here is a look at how three top infrastructure-as-a-service (IaaS) providers – Amazon Web Services, Microsoft Azure and Google Cloud Platform - stack up for IPv6. There are other IPv6-capable public cloud service providers, but we mention these three to show that there is a broad spectrum of IPv6 capabilities even among the behemoth public clouds.To read this article in full, please click here