Mirai – the software that has hijacked hundreds of thousands of internet-connected devices to launch massive DDoS attacks – now goes beyond recruiting just IoT products; it also includes code that seeks to exploit a vulnerability in corporate SD-WAN gear.That specific equipment – VMware’s SDX line of SD-WAN appliances – now has an updated software version that fixes the vulnerability, but by targeting it Mirai’s authors show that they now look beyond enlisting security cameras and set-top boxes and seek out any vulnerable connected devices, including enterprise networking gear.
More about SD-WANTo read this article in full, please click here
Western Digital has announced a project called the Zoned Storage initiative that leverages new technology to create more efficient zettabyte-scale data storage for data centers by improving how data is organized when it is stored.As part of this, the company also launched a developer site that will host open-source, standards-based tools and other resources.The Zoned Storage architecture is designed for Western Digital hardware and its shingled magnetic recording (SMR) HDDs, which hold up to 15TB of data, as well as the emerging zoned namespaces (ZNS) standard for NVMe SSDs, designed to deliver better endurance and predictability.To read this article in full, please click here
We have seen hype about whether 5G cellular or Wi-Fi 6 will win in the enterprise, but the reality is that the two are largely complementary with an overlap for some use cases, which will make for an interesting competitive environment through the early 2020s.The potential for 5G in enterprises
The promise of 5G for enterprise users is higher speed connectivity with lower latency. Cellular technology uses licensed spectrum which largely eliminates potential interference that may occur with unlicensed Wi-Fi spectrum. Like current 4G LTE technologies, 5G can be supplied by cellular wireless carriers or built as a private network . To read this article in full, please click here
If you follow the news surrounding the internet of things (IoT), you know that security issues have long been a key concern for IoT consumers, enterprises, and vendors. Those issues are very real, but I’m becoming increasingly convinced that related but fundamentally different privacy vulnerabilities may well be an even bigger threat to the success of the IoT.In June alone, we’ve seen a flood of IoT privacy issues inundate the news cycle, and observers are increasingly sounding the alarm that IoT users should be paying attention to what happens to the data collected by IoT devices.[ Also read: It’s time for the IoT to 'optimize for trust' and A corporate guide to addressing IoT security ]
Predictably, most of the teeth-gnashing has come on the consumer side, but that doesn’t mean enterprises users are immune to the issue. One the one hand, just like consumers, companies are vulnerable to their proprietary information being improperly shared and misused. More immediately, companies may face backlash from their own customers if they are seen as not properly guarding the data they collect via the IoT. Too often, in fact, enterprises shoot themselves in the foot on privacy issues, with practices that Continue reading
While President Trump wants to ban sales of Huawei networking gear in the U.S., the acting head of the Office of Management and Budget recommends putting that action off for two years because it would place too great a burden on U.S. companies supplying Huawei and using its equipment.If the ban goes through it will put the squeeze on the Chinese vendor, and the U.S. action could influence its allies to follow suit, further pressuring the company.To read this article in full, please click here
Cloud computing gained popularity for its ease-of-deployment and flexible resource consumption, and while that works for many critical applications, it is not a panacea for every app an enterprise supports. That’s why as cloud adoption continues to rise, some companies are opting to bring workloads back on-premise in certain scenarios.To read this article in full, please click here(Insider Story)
IoT devices are proliferating on corporate networks, gathering data that enables organizations to make smarter business decisions, improve productivity and help avoid costly equipment failures, but there is one big downside – security of the internet of things remains a problem.To read this article in full, please click here(Insider Story)
SAN DIEGO—Cisco injected a number of new technologies into its key networking control-point software that makes it easier to stretch networking from the data center to the cloud while making the whole environment smarter and easier to manage.At the company’s annual Cisco Live customer event here it rolled out software that lets customers more easily meld typically siloed domains across the enterprise and cloud to the wide area network. The software enables what Cisco calls multidomain integration that lets customers set policies to apply uniform access controls to users, devices and applications regardless of where they connect to the network, the company said.To read this article in full, please click here
There’s little question that the internet of things (IoT) holds enormous potential for the enterprise, in everything from asset tracking to compliance.But enterprise uses of IoT technology are still evolving, and it’s not yet entirely clear which use cases and practices currently make economic and business sense. So, I was thrilled to trade emails recently with Rob Mesirow, a principal at PwC’s Connected Solutions unit, about how to make enterprise IoT implementations as cost effective as possible.To read this article in full, please click here
The business advantages of IPv6 are many, including direct customer access to websites, faster end-user experiences with Internet applications, and the opportunity to gather data about visitors to applications as well as measure visitors’ engagement and conversion.To read this article in full, please click here(Insider Story)
Like most charitable organizations, The Salvation Army relies on volunteer help. Volunteers around the world serve people in need at service centers, retail stores, and satellite offices in metropolitan cities, rural communities, and at the scene of disaster areas. All of these locations have to stay online, connected, and sharing data, but with such a wide range of sites, networking is a challenge. Add in staff with varying levels of expertise and locations ranging in size from with one person at a small satellite office to hundreds at international headquarters, and you quickly have a very complicated situation on your hands.The wide variety of spaces and available talent to manage IT infrastructure has created a nightmare for network administrators trying to keep data flowing where it needs to go. That is, until the organization began upgrading to next-level networking, making configuration, setup, and maintenance of networks at each location far easier, and freeing up personnel—volunteer and otherwise—for more productive work.To read this article in full, please click here
This decade saw the spectacular rise of mobile devices as the platform of choice for everything from social media and gaming to customer service and online payments. Now it’s time for a new platform to revolutionize the way consumers and businesses engage with digital content. It’s time for the world to be introduced to the next generation of entertainment, shopping, healthcare, and more: augmented reality (AR) and virtual reality (VR).According to research firm McKinsey, immersive computing could actually replace mobile devices. While it’s difficult to imagine anything approaching today’s ubiquity of smartphones, Goldman Sachs estimates that the emerging AR and VR industry could see up to $182 billion in annual revenue by 2025 – a figure that far surpasses the current $88 billion in combined in-home entertainment and movie box office revenues.To read this article in full, please click here
The digital economy is here, and the ability to innovatively meet ever evolving customer expectations has become the new reality. For most organizations accomplishing this goal starts with digital transformation.In order to realize digital transformation benefits, companies need to move beyond a legacy network and invest in next generation components, according to participants in a recent IDG TechTalk Twitter chat.Unfortunately, past investments in legacy technology are still serving as a significant road block.
A1) Issues such as technical debt, legacy security problems, poor/inconsistent Ops & maintenance, and a long list of infrastructure/bandwidth inadequacies can hold back #DigitalTransformation. #IdgTechTalkTo read this article in full, please click here
Tiny, intelligent microelectronics should be used to perform as much sensor processing as possible on-chip rather than wasting resources by sending often un-needed, duplicated raw data to the cloud or computers. So say scientists behind new, machine-learning networks that aim to embed everything needed for artificial intelligence (AI) onto a processor.“This opens the door for many new applications, starting from real-time evaluation of sensor data,” says Fraunhofer Institute for Microelectronic Circuits and Systems on its website. No delays sending unnecessary data onwards, along with speedy processing, means theoretically there is zero latency.To read this article in full, please click here
You probably already know that end user technology is exploding and are feeling the effects of it in your support organization every day. Remember when IT sanctioned and standardized every hardware and software instance in the workplace? Those days are long gone. Today, it’s the driving force of productivity that dictates what will or won’t be used – and that can be hard on a support organization.Whatever users need to do their jobs better, faster, more efficiently is what you are seeing come into the workplace. So naturally, that’s what comes into your service desk too. Support organizations see all kinds of devices, applications, systems, and equipment, and it’s adding a great deal of complexity and demand to keep up with. In fact, four of the top five factors causing support ticket volumes to rise are attributed to new and current technology.To read this article in full, please click here
Enterprises are introducing cloud services to improve productivity, increase business agility, and accelerate the pace of innovation. But adopting this new paradigm while delivering the right level of visibility and control can overtax resources and impact existing governance, risk, compliance, and cost strategies. In addition, organizations often lack a holistic view of their security posture and state of controls to satisfy internal and/or external regulators.This guide will help you discover ways to fine-tune oversight and operations of your hybrid cloud solution.Click here to download the white paper.To read this article in full, please click here
Artificial Intelligence and machine learning are expected to be some of the big topics at next week’s Cisco Live event and the company is already talking about how those technologies will help drive the next generation of Intent-Based Networking.“Artificial intelligence will change how we manage networks, and it’s a change we need,” wrote John Apostolopoulos Cisco CTO and vice president of Enterprise Networking in a blog about how Cisco says these technologies impact the network. [ Now see 7 free network tools you must have. ]
AI is the next major step for networking capabilities, and while researchers have talked in the past about how great AI would be, now the compute power and algorithms exist to make it possible, Apostolopoulos told Network World. To read this article in full, please click here
Data centers are becoming more complex and still run the majority of workloads despite the promises of simplicity of deployment through automation and hyperconverged infrastructure (HCI), not to mention how the cloud was supposed to take over workloads.That’s the finding of the Uptime Institute's latest annual global data center survey (registration required). The majority of IT loads still run on enterprise data centers even in the face of cloud adoption, putting pressure on administrators to have to manage workloads across the hybrid infrastructure.To read this article in full, please click here
As with any technology whose use is expanding at such speed, it can be tough to track exactly what’s going on in the IoT world – everything from basic usage numbers to customer attitudes to more in-depth slices of the market is constantly changing. Fortunately, the month of May brought several new pieces of research to light, which should help provide at least a partial outline of what’s really happening in IoT.To read this article in full, please click here(Insider Story)
HPE GreenLake takes IT consumption in a new direction. It offers a catalog of pre-designed, end-to-end solutions, such as Big Data, Backup, and Database with EDB Postgres, that simplify the IT experience by delivering a cloud-like consumption model managed for your on-premises environment.Outcome-based IT consumption delivers a range of benefits that you can’t get from solutions solely built from scratch or bought from the public cloud. Delivering the best of both worlds, HPE GreenLake enables:
Faster time to value with solutions that are ready quickly and evolve ahead of your needs
Better economics with a flexible, pay-per-use model that offers simplicity and financial clarity
On-premises for proper control over compliance, performance, and security
Simplified IT that’s operated for you to free up resources and add business value
Because pre-designed workload solutions do not fit every business, HPE also offers fully customizable infrastructure modules that deliver greater technology choice depending on IT preferences. With HPE GreenLake Flex Capacity, you design your own infrastructure solutions, selecting from a broad range of HPE and partner technologies, as well as optional services that span your infrastructure to your apps and workloads.To read this article in full, please click here