Get the IT scalability and flexibility necessary to move fast. HPE GreenLake Flex Capacity allows you to choose the technology and services you need and pay only for what you use. Read more about HPE GreenLake here.Related links:https://h20195.www2.hpe.com/V2/getpdf.aspx/A00030327ENW.pdfTo read this article in full, please click here
Simplify the development, management, and security of your hybrid cloud. This quick video showcases five reasons why HPE ProLiant for Microsoft Azure Stack delivers a true hybrid cloud experience. Read more information about HPE ProLiant for Azure Stack here.To read this article in full, please click here
In this short video, partners from HPE, The Sourcing Company, and Interxion describe how they provide customers with increased agility, enhanced innovation, and cost control with the right mix of private and public cloud to handle all workloads. Read more information about HPE ProLiant for Azure Stack here.To read this article in full, please click here
Many hyperconverged solutions only focus on software-defined storage. However, many networking functions and technologies can be consolidated for simplicity and scale in the data center. This video describes how HPE SimpliVity with Composable Fabric gives organizations the power to run any virtual machine anywhere, anytime. Read more about HPE SimpliVity here.
Related links:To read this article in full, please click here
Business must move fast today to keep up with competitive forces. That means IT must provide an agile — anytime, anywhere, any workload — infrastructure that ensures growth, boosts productivity, enhances innovation, improves the customer experience, and reduces risk.A composable infrastructure helps organizations achieve these important objectives that are difficult — if not impossible — to achieve via traditional means, such as the ability to do the following:
Deploy quickly with simple flexing, scaling, and updating
Run workloads anywhere — on physical servers, on virtual servers, or in containers
Operate any workload upon which the business depends, without worrying about infrastructure resources or compatibility
Ensure the infrastructure is able to provide the right service levels so the business can stay in business
In other words, IT must inherently become part of the fabric of products and services that are rapidly innovated at every company, with an anytime, anywhere, any workload infrastructure.To read this article in full, please click here
As hybrid cloud deployments enfold, organizations can expect to encounter some long-term challenges. In a recent podcast, Dana Gardner, Principal Analyst at Interarbor Solutions and John Abbott, Vice President of Infrastructure and Co-Founder of The 451 Group, discussed the growth of hybrid cloud and the challenges enterprises are facing.Solving the complexity problem
As organizations seek a mix of hybrid and multi-cloud infrastructure, they are implementing cloud in a way that wasn’t anticipated years ago. “CAPEX to OPEX, operational agility, complexity, and costs have all been big factors,” explained Abbott. “Also, on-premises deployments continue to remain a critical function. You can’t just get rid of your existing infrastructure investments that you have made over many, many years.”To read this article in full, please click here
Today’s travelers expect all the technology amenities of home while on the road. That includes, by a wide margin, better Wi-Fi than hotels typically offer, according to a recent YouGov/ALICE survey. The survey found that 59% of guests want better Wi-Fi and that 34% of them would trade a business center for better in-room tech.That’s not surprising in the digital age. But how can hotels—particularly those built when push-button phones were state of the art in telecommunications—keep up with rising consumer expectations around technology?The answer lies in flexible, easy-to-install-and-manage software-defined networking (SD-WAN), in this case from Cisco Meraki.To read this article in full, please click here
Healthcare adds up to nearly 18% of the U.S. gross domestic product, employing 11% of the national workforce, according to McKinsey & Company. Even so, the industry has been slow to adopt digital technologies. Now, organizations are racing to catch up with a range of digital solutions for care providers, patients, and those who support them.Helping them rise to the challenge is a new breed of cloud-based networking technologies that let providers easily and securely share data while protecting client privacy under the Health Insurance Portability and Accountability Act (HIPAA) requirements.To read this article in full, please click here
With SpaceX’s successful launch of an initial tranche of proposed broadband-internet-carrying satellites last week, and Amazon’s surprising posting of numerous satellite engineering-related job openings on its job board this month, one might well be asking if the next-generation internet space race is finally getting going — I first wrote about OneWeb’s satellite internet plans it was concocting with Airbus four years ago.To read this article in full, please click here
With SpaceX’s successful launch of an initial array of broadband-internet-carrying satellites last week, and Amazon’s surprising posting of numerous satellite engineering-related job openings on its job board this month, one might well be asking if the next-generation internet space race is finally getting going. (I first wrote about OneWeb’s satellite internet plans it was concocting with Airbus four years ago.)This new batch of satellite-driven internet systems, if they work and are eventually switched on, could provide broadband to most places, including previously internet-barren locations, such as rural areas. That would be good for high-bandwidth, low-latency remote-internet of things (IoT) and increasingly important edge-server connections for verticals like oil and gas and maritime. Data could even end up getting stored in compliance-friendly outer space, too. Leaky ground-based connections, also, perhaps a thing of the past.To read this article in full, please click here
It’s no secret that if you have a cloud-based e-mail service, fighting off the barrage of security issues has become a maddening daily routine.The leading e-mail service – in Microsoft’s Office 365 package – seems to be getting the most attention from those attackers hellbent on stealing enterprise data or your private information via phishing attacks. Amazon and Google see their share of phishing attempts in their cloud-based services as well. [ Also see What to consider when deploying a next generation firewall. | Get regularly scheduled insights by signing up for Network World newsletters. ]
But attackers are crafting and launching phishing campaigns targeting Office 365 users, wrote Ben Nahorney, a Threat Intelligence Analyst focused on covering the threat landscape for Cisco Security in a blog focusing on the Office 365 phishing issue.To read this article in full, please click here
NVMe stands for “non-volatile memory express” and is a host controller interface and storage protocol that was created to accelerate the transfer of data between enterprise and client systems and solid-state drives (SSD). It works over a computer's high-speed Peripheral Component Interconnect Express (PCIe) bus. What I see when I look at this string of letters, however, is “envy me.” And the reason for the envy is significant.Using NVMe, data transfer happens much faster than it does with rotating drives. In fact, NVMe drives can move data seven times faster than SATA SSDs. That’s seven times faster than the SSDs that many of us are using today. This means that your systems could boot blindingly fast when an NVMe drive is serving as its boot drive. In fact, these days anyone buying a new system should probably not consider one that doesn’t come with NVMe built-in — whether a server or a PC.To read this article in full, please click here
A few months ago, I wrote about the managed network services (MNS) market as the evolutionary direction of the network carrier. One of the companies that plays in this space is Teridion, with a service called Teridion for Enterprise. It’s a global WAN service with some unique capabilities to support performance and reliability that enterprises can really appreciate.Teridion for Enterprise is a cloud-centric solution all the way. The network is built in the cloud, and customers use commodity edge devices such as SD-WAN appliances or Cisco ISR boxes to connect. Customers request services, make changes and set policies through an easy and contemporary user interface; they pay only for the capacity they use; and all maintenance and management is completely handled by Teridion.To read this article in full, please click here
Nvidia is launching a new platform called EGX Platform designed to bring real-time artificial intelligence (AI) to edge networks. The idea is to put AI computing closer to where sensors collect data before it is sent to larger data centers.The edge serves as a buffer to data sent to data centers. It whittles down the data collected and only sends what is relevant up to major data centers for processing. This can mean discarding more than 90% of data collected, but the trick is knowing which data to keep and which to discard.“AI is required in this data-driven world,” said Justin Boitano, senior director for enterprise and edge computing at Nvidia, on a press call last Friday. “We analyze data near the source, capture anomalies and report anomalies back to the mothership for analysis.”To read this article in full, please click here
This week SD-WAN vendor Cato Networks announced the results of its Telcos and the Future of the WAN in 2019 survey. The study was a mix of companies of all sizes, with 42% being enterprise-class (over 2,500 employees). More than 70% had a network with more than 10 locations, and almost a quarter (24%) had over 100 sites. All of the respondents have a cloud presence, and almost 80% have at least two data centers. The survey had good geographic diversity, with 57% of respondents coming from the U.S. and 24% from Europe.Highlights of the survey include the following key findings:To read this article in full, please click here
If you use the internet (which you clearly do), you likely know how important it is to protect your data in an increasingly dangerous cyber environment. But like other essential tasks that tend to be tedious (like filing taxes early and brushing your teeth for the full two minutes), most installing and running a VPN can sound unappealing to many: sure, they encrypt your internet traffic and hide your location — but they can also run frustratingly slowly, delaying the way you’d usually use the internet for entertainment and work. That’s where Ivacy VPN is different: not only will the speedy service let you browse and stream lag-free, it also offers real-time threat detection technology, removing malware and viruses at the server level. It ensures that all your downloads and devices stay totally secure, so you can stay safe online without being inconvenienced.To read this article in full, please click here
Network monitoring in the enterprise has never been easy. Even before organizations began moving software and infrastructure to the cloud, a typical enterprise used four to 10 tools just to monitor and troubleshoot their own networks, according to analyst and consulting firm Enterprise Management Associates.The public cloud adds another complex wrinkle to network visibility. Traditional monitoring tools center around the health and performance of individual network elements. Today’s digital business era requires a more holistic view of networks with the ability to glean and correlate data from diverse cloud environments using big data analytics and machine learning. To read this article in full, please click here
In recent years, a significant number of organizations have transformed their wide area network (WAN). Many of these organizations have some kind of cloud-presence across on-premise data centers and remote site locations.The vast majority of organizations that I have consulted with have over 10 locations. And it is common to have headquarters in both the US and Europe, along with remote site locations spanning North America, Europe, and Asia.A WAN transformation project requires this diversity to be taken into consideration when choosing the best SD-WAN vendor to satisfy both; networking and security requirements. Fundamentally, SD-WAN is not just about physical connectivity, there are many more related aspects.To read this article in full, please click here
Aggressive efforts to keep China-based telecom vendor Huawei out of the U.S. market by the Trump administration have thrust a slow-burning debate in the networking space about the security implications of using Chinese-made technology into the limelight over the last two weeks, yet the real-world implications for business users are less than apocalyptic.The basics of the administration's case against Huawei are simple. The company’s close ties to the Chinese government, coupled with China’s history of industrial and political espionage against the U.S., means that its products can’t be trusted not to slip important information back to Beijing. The current crisis is only two weeks old, but these concerns about Huawei and other China-based tech vendors date back years.To read this article in full, please click here
Sometimes you see more than just the ordinary r, w, x and - designations when looking at file permissions on Linux. Instead of rwx for the owner, group and other fields in the permissions string, you might see an s or t, as in this example:drwxrwsrwt
One way to get a little more clarity on this is to look at the permissions with the stat command. The fourth line of stat’s output displays the file permissions both in octal and string format:$ stat /var/mail
File: /var/mail
Size: 4096 Blocks: 8 IO Block: 4096 directory
Device: 801h/2049d Inode: 1048833 Links: 2
Access: (3777/drwxrwsrwt) Uid: ( 0/ root) Gid: ( 8/ mail)
Access: 2019-05-21 19:23:15.769746004 -0400
Modify: 2019-05-21 19:03:48.226656344 -0400
Change: 2019-05-21 19:03:48.226656344 -0400
Birth: -
This output reminds us that there are more than nine bits assigned to file permissions. In fact, there are 12. And those extra three bits provide a way to assign permissions beyond the usual read, write and execute — 3777 (binary 011111111111), for example, indicates that two extra settings are in use.To read this article in full, please click here