Archive

Category Archives for "Network World SDN"

Netskope boosts digital experience monitoring with Kadiska buy

Netskope this week acquired digital experience monitoring firm Kadiska in a move that the SASE provider says will expand Netskope’s DEM capabilities for networking and infrastructure professionals who need greater visibility across their SD-WAN, secure service edge, and cloud environments.“The founding vision of Kadiska matches uncannily well with the Netskope platform vision. Both technologies have been built to recognize the new world where data, users, cloud infrastructure, and applications are all dispersed, leaving blind spots and challenges for organizations seeking to control and optimize experience and security,” said Sanjay Beri, CEO and co-founder of Netskope said in a statement. “We already share some very large global customers and seeing the appetite for integration—bringing together the capabilities of both companies—really proved to use the rationale for this acquisition.”To read this article in full, please click here

Netskope boosts digital experience monitoring with Kadiska buy

Netskope this week acquired digital experience monitoring firm Kadiska in a move that the SASE provider says will expand Netskope’s DEM capabilities for networking and infrastructure professionals who need greater visibility across their SD-WAN, secure service edge, and cloud environments.“The founding vision of Kadiska matches uncannily well with the Netskope platform vision. Both technologies have been built to recognize the new world where data, users, cloud infrastructure, and applications are all dispersed, leaving blind spots and challenges for organizations seeking to control and optimize experience and security,” said Sanjay Beri, CEO and co-founder of Netskope said in a statement. “We already share some very large global customers and seeing the appetite for integration—bringing together the capabilities of both companies—really proved to use the rationale for this acquisition.”To read this article in full, please click here

10 questions to ask about secure service edge (SSE)

In 2019, Gartner created the term secure access service edge (SASE) to describe a cloud-based service that combines networking and security in order to give remote workers safe access to internet-based resources.Gartner had put its finger on a new set of challenges that enterprise IT faced as employees shifted to remote work during Covid and applications migrated to the cloud. But Gartner overshot the runway a bit; vendors were caught flatfooted and scrambled to cobble together full suites of SASE features.On the customer side, a recent Gartner survey of CISOs revealed that “a majority of buyers are planning for a two-vendor strategy for SASE,” with security and networking teams making separate buying decisions rather than opting for single-vendor SASE.To read this article in full, please click here

10 questions to ask about secure service edge (SSE)

In 2019, Gartner created the term secure access service edge (SASE) to describe a cloud-based service that combines networking and security in order to give remote workers safe access to internet-based resources.Gartner had put its finger on a new set of challenges that enterprise IT faced as employees shifted to remote work during Covid and applications migrated to the cloud. But Gartner overshot the runway a bit; vendors were caught flatfooted and scrambled to cobble together full suites of SASE features.On the customer side, a recent Gartner survey of CISOs revealed that “a majority of buyers are planning for a two-vendor strategy for SASE,” with security and networking teams making separate buying decisions rather than opting for single-vendor SASE.To read this article in full, please click here

BrandPost: Always-on networking for always-on SMBs

By: Amol Mitra, Vice President and General Manager, Global Small and Medium Business at HPE Aruba Networking.Soaring user expectations for mobile connectivity no matter where individuals live, work, educate, shop, recreate, or dine has many small and mid-sized businesses searching for fast, reliable, flexible, and secure Wi-Fi solutions that are delivered affordably and require little or no technology expertise to manage.Until recently, finding such a solution was a challenge. Fortunately, there are now options that provide entities like yours with modern networking infrastructure to fit SMB requirements, ensuring you can mobilize employees, deliver guest Wi-Fi to customers, and stay competitive in today’s rapidly evolving marketplace.To read this article in full, please click here

BrandPost: Always-on networking for always-on SMBs

By: Amol Mitra, Vice President and General Manager, Global Small and Medium Business at HPE Aruba Networking.Soaring user expectations for mobile connectivity no matter where individuals live, work, educate, shop, recreate, or dine has many small and mid-sized businesses searching for fast, reliable, flexible, and secure Wi-Fi solutions that are delivered affordably and require little or no technology expertise to manage.Until recently, finding such a solution was a challenge. Fortunately, there are now options that provide entities like yours with modern networking infrastructure to fit SMB requirements, ensuring you can mobilize employees, deliver guest Wi-Fi to customers, and stay competitive in today’s rapidly evolving marketplace.To read this article in full, please click here

Incrementing and decrementing numeric variables in bash

When preparing scripts that will run in bash, it’s often critical to be able to set up numeric variables that you can then increment or decrement as the script proceeds. The only surprising part of this is how many options you have to choose from to make the increment or decrement operation happen.Incrementing numeric variables First, to increment a variable, you first need to set it up. While the example below sets the variable $count to 1, there is no need to start at 1.$ count=1 This would also work:$ count=111 Regardless of the initial setting, you can then increment your variable using any of the following commands. Just replace $count with your variable name.To read this article in full, please click here

3 types of incremental forever backup

A traditional backup starts with an initial full backup and is followed by a series of incremental or cumulative incremental backups (also known as differential backups). After some period of time, you will perform another full backup and more incremental backups. However, the advent of disk-based backup systems has given rise to the concept of the incremental forever approach, where only one backup is performed followed by a series of incremental backups. Let’s take a look at the different ways to do this.File-level incremental forever The first type of incremental forever backup is a file-level incremental forever backup product. This type of approach has actually been around for quite some time, with early versions of it available in the ‘90s. The reason why this is called a file-level incremental is that the decision to backup an item happens at the file level. If anything within a file changes, it will change its modification date (or archive bit in Windows), and the entire file will be backed up. Even if only one byte of data was changed within the file, the entire file will be included in the backup.To read this article in full, please click here

Incrementing and decrementing numeric variables in bash

When preparing scripts that will run in bash, it’s often critical to be able to set up numeric variables that you can then increment or decrement as the script proceeds. The only surprising part of this is how many options you have to choose from to make the increment or decrement operation happen.Incrementing numeric variables First, to increment a variable, you first need to set it up. While the example below sets the variable $count to 1, there is no need to start at 1.$ count=1 This would also work:$ count=111 Regardless of the initial setting, you can then increment your variable using any of the following commands. Just replace $count with your variable name.To read this article in full, please click here

3 types of incremental forever backup

A traditional backup starts with an initial full backup and is followed by a series of incremental or cumulative incremental backups (also known as differential backups). After some period of time, you will perform another full backup and more incremental backups. However, the advent of disk-based backup systems has given rise to the concept of the incremental forever approach, where only one backup is performed followed by a series of incremental backups. Let’s take a look at the different ways to do this.File-level incremental forever The first type of incremental forever backup is a file-level incremental forever backup product. This type of approach has actually been around for quite some time, with early versions of it available in the ‘90s. The reason why this is called a file-level incremental is that the decision to backup an item happens at the file level. If anything within a file changes, it will change its modification date (or archive bit in Windows), and the entire file will be backed up. Even if only one byte of data was changed within the file, the entire file will be included in the backup.To read this article in full, please click here

Microsoft blames Aussie data center outage on staff strength, failed automation

Microsoft has blamed staff strength and failed automation for a data center outage in Australia that took place on August 30, disabling users from accessing Azure, Microsoft 365, and Power Platform services for over 24 hours.In a post-incident analysis report, Microsoft said the outage occurred due to a utility power sag in Australia’s East region, which in turn “tripped a subset of the cooling units offline in one data center, within one of the Availability Zones.”As the cooling units were not working properly, the rise in temperature forced an automated shutdown of the data center in order to preserve data and infrastructure health, affecting compute, network, and storage services.To read this article in full, please click here

Microsoft blames Aussie data center outage on staff strength, failed automation

Microsoft has blamed staff strength and failed automation for a data center outage in Australia that took place on August 30, disabling users from accessing Azure, Microsoft 365, and Power Platform services for over 24 hours.In a post-incident analysis report, Microsoft said the outage occurred due to a utility power sag in Australia’s East region, which in turn “tripped a subset of the cooling units offline in one data center, within one of the Availability Zones.”As the cooling units were not working properly, the rise in temperature forced an automated shutdown of the data center in order to preserve data and infrastructure health, affecting compute, network, and storage services.To read this article in full, please click here

Arm unveils project to rapidly develop server processors

Arm Holdings unveiled a program that it says will simplify and accelerate the adoption of Arm Neoverse-based technology into new compute solutions. The program, called Arm Neoverse Compute Subsystems (CSS), was introduced at the Hot Chips 2023 technical conference held at Stanford University.Neoverse is Arm’s server-side technology meant for high performance while still offering the power efficiency that Arm’s mobile parts are known for. CSS enables partners to build specialized silicon more affordably and quickly than previous discrete IP solutions.The first-generation CSS product, Arm CSS N2, is based on the Neoverse N2 platform first introduced in 2020. CSS N2 provides partners with a customizable compute subsystem, allowing them to focus on features like memory, I/O, acceleration, and so on.To read this article in full, please click here

Google’s Cross-Cloud Network service aims to simplify multicloud networking

Google Cloud has added a new service that promises to make it easier for enterprise customers to securely network multiple cloud-based resources.The Cross-Cloud Network service consists of new and existing Google Cloud technology and includes a partner ecosystem to help organizations develop, build and support distributed enterprise applications across clouds.“We know that 70-plus percent of our enterprises are going to adopt multicloud. [The] idea behind Cross-Cloud Network is that today many organizations operate bespoke networks with turnkey security to connect to those clouds that are operationally complex to manage and build, thereby resulting in a much higher total cost of ownership and soaring costs,” said Muninder Sambi, vice president and general manager of networking for Google Cloud. “They set up private data centers to connect and secure the hybrid workforce to access cloud and on-prem resources and manage multiple CDN clouds to accelerate web apps. All of this can also lead to an inconsistent security posture and drives up total costs,” Sambi said.To read this article in full, please click here

CompTIA to offer advanced cloud networking certification

A new series of advanced certifications from CompTIA aims to validate IT pros who have multiple years of work experience and expert-level skills in data, cybersecurity, and cloud networking.“Each certification exam will validate deep expertise in job roles recognized as being at the expert level,” said Thomas Reilly, chief product officer at CompTIA, in a statement. “Beyond validating technical skills, IT pros who earn a CompTIA Xpert Series certification will have demonstrated their ability to understand, implement, and articulate advanced technology solutions in any business environment.”To read this article in full, please click here

Fortinet adds wireless and IoT security features to SASE platform

Fortinet continues to enhance its Secure Access Service Edge (SASE) package by adding support for microbranches, extending wireless LAN protections, and improving data loss prevention (DLP) and end-user monitoring capabilities.The vendor added the new features to its FortiSASE offering, which includes SD-WAN, secure web gateway, firewall as a service, cloud access security broker, and zero trust network access (ZTNA), all running on top of its FortiOS operating system. The package can be centrally managed via the firm’s FortiManager software, which sets network and security policies across the Fortinet product line.To read this article in full, please click here

Networking vendors highlight AI opportunities as order backlog challenges begin to subside

The heavy buzz around all things AI got louder in the financial reports of networking vendors this quarter, even though AI hasn’t made a significant impact on most vendors’ financial performance and supply chain challenges remain a more immediate concern.Vendors such as Cisco, Arista, Juniper, Extreme and HPE’s Aruba report that they are shipping more products, thanks to multi-month efforts that include significant product redesigns and relentless efforts by their supply-chain teams to address component shortages. But the situation is still challenging, and some enterprise customers still face order delays.To read this article in full, please click here

VMware Cloud gains faster ransomware recovery, expanded management capabilities

VMware announced a raft of improvements to its VMware Cloud platform at this week's VMware Explore conference in Las Vegas.Previously, VMware's on-premises private cloud solution, VMware Cloud Foundation, and its public cloud offerings were managed separately. Now, enterprises will be able to manage all their cloud deployments from a single location. In addition, customers will see improved integrations with the major cloud providers as well as faster disaster and ransomware recovery.Central management "We're actually bringing together a lot of disparate solutions under a common framework, VMware Cloud," says Rick Walsworth, VMware's director of product marketing for the cloud infrastructure team.To read this article in full, please click here

Bugs in x86 chips force Linux kernel update

Bugs emerged earlier this month in Intel and AMD processors that affect both client and server processors over multiple generations. Fortunately, the bugs were found some time ago and researchers kept it quiet while fixes were developed.Google researchers found the Intel bug known as Downfall (CVE-2022-40982) and reported it to Intel more than a year ago, so both parties had plenty of time to work things out. The Downfall bug exploits a flaw in the "Gather" instruction that affected Intel CPUs use to grab information from multiple places in a system's memory. A Google researcher created a proof-of-concept exploit that could steal encryption keys and other kinds of data from other users on a given server.To read this article in full, please click here

1 4 5 6 7 8 366