Cisco this week identified two “High” security vulnerabilities in its HyperFlex data-center package that could let attackers gain control of the system. HyperFlex is Cisco’s hyperconverged infrastructure that offers computing, networking and storage resources in a single system.
More about edge networking
How edge networking and IoT will reshape data centers
Edge computing best practices
How edge computing can help secure the IoT
The more critical of the two warnings – an 8.8 on Cisco’s severity scale of 1-10 – is a command-injection vulnerability in the cluster service manager of Cisco HyperFlex Software that could let an unauthenticated, attacker execute commands as the root user.To read this article in full, please click here
In honor of President's Day, HP's online store has slashed prices up to 56% on various items, with free shipping included. On the list is the HP Pavilion Laptop - 15T which has been discounted $420 down to $579.99. The budget-friendly 14z laptop is even budget-friendlier at just $189.99, down from $329.99. The HP Probook 640 G4 Notebook PC is slashed 53% from $1310 to just $609. There are many more discounts as well, so browse the full list of deals at HP's online store right here.To read this article in full, please click here
In honor of President's Day, HP's online store has slashed prices up to 56% on various items, with free shipping included. On the list is the HP Pavilion Laptop - 15T which has been discounted $420 down to $579.99. The budget-friendly 14z laptop is even budget-friendlier at just $189.99, down from $329.99. The HP Probook 640 G4 Notebook PC is slashed 53% from $1310 to just $609. There are many more discounts as well, so browse the full list of deals at HP's online store right here.To read this article in full, please click here
Harnessing energy inherent in Wi-Fi or Bluetooth radio waves to power remote, wireless, Internet of Things (IoT) sensors — and also communicate with the devices at the same time — is a big-ticket item on IoT want-lists. Advantages include no batteries, thus reducing costs, size and weight.The key to achieving it functionally, some scientists say, is in converting AC waveforms to DC voltage, combined with the use of new materials. Researchers at Massachusetts Institute of Technology, along with some collaborators, say they’ve made a breakthrough in this area. Interestingly, it also includes scaling potential.To read this article in full, please click here
Harnessing energy inherent in Wi-Fi or Bluetooth radio waves to power remote, wireless, Internet of Things (IoT) sensors — and also communicate with the devices at the same time — is a big-ticket item on IoT want-lists. Advantages include no batteries, thus reducing costs, size and weight.The key to achieving it functionally, some scientists say, is in converting AC waveforms to DC voltage, combined with the use of new materials. Researchers at Massachusetts Institute of Technology, along with some collaborators, say they’ve made a breakthrough in this area. Interestingly, it also includes scaling potential.To read this article in full, please click here
Spending on Internet of Things (IoT) will reach $1.3 trillion by 2020, and the processing of 43 percent of this data will be at the edge, according to IDC projections. The number of “connected things” will reach 30 billion in 2020 and jump to 80 billion in the following 25 years, the research firm predicts. This market demand is driving the need for new solutions like edge computing.Pendulum Swings
Historically, the primary point of IT has swung between the focus on a centralized model and a decentralized one. It started with centralized mainframe computing, then moved to decentralized client-server networks, and then back again to a centralized model in the cloud. Now, the time for the pendulum to swing back to a decentralized model has come in the form of ‘local edge computing.’To read this article in full, please click here
Spending on Internet of Things (IoT) will reach $1.3 trillion by 2020, and the processing of 43 percent of this data will be at the edge, according to IDC projections. The number of “connected things” will reach 30 billion in 2020 and jump to 80 billion in the following 25 years, the research firm predicts. This market demand is driving the need for new solutions like edge computing.Pendulum Swings
Historically, the primary point of IT has swung between the focus on a centralized model and a decentralized one. It started with centralized mainframe computing, then moved to decentralized client-server networks, and then back again to a centralized model in the cloud. Now, the time for the pendulum to swing back to a decentralized model has come in the form of ‘local edge computing.’To read this article in full, please click here
Few technologies have the potential to shake up enterprise networks like Wi-Fi 6 and 5G technologies do in 2019 and beyond.To read this article in full, please click here(Insider Story)
Few technologies have the potential to shake up enterprise networks like Wi-Fi 6 and 5G technologies do in 2019 and beyond.To read this article in full, please click here(Insider Story)
Fundamentally, the way that carriers (i.e. telcos) deliver managed network services hasn’t changed in decades. The core architecture of this network, known as hub and spoke, consists of branches talking to the data center over a managed network with a separate firewall in the middle. However, this type of legacy WAN can’t support today’s business needs, which include a seminal shift to the cloud, as well as mobile users that need network access from anywhere, not just from the branch.Yishay Yovel, vice president of market strategy at Cato Networks, has followed the carriers’ dilemma for years. According to Yovel, there are numerous catalysts to this evolutionary change in the managed network services market.To read this article in full, please click here
VMware’s introduction of x86 server-virtualization technology was a game-changing event in the history of enterprise computing. But if you look at VMware’s corporate messaging today, it’s almost as if server virtualization has been scrubbed from the lexicon. Instead, VMware highlights its multi-cloud strategies, software-defined data centers, networking, hyperconverged infrastructures, security, SD-WAN, containers, blockchain, IoT and more.To read this article in full, please click here
The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades.To read this article in full, please click here(Insider Story)
The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades.To read this article in full, please click here(Insider Story)
The popularity of mobile devices will continue its dramatic growth over the next four years as new technologies kick in with higher density and bandwidth, according to Cisco’s annual Global Mobile Data Traffic Forecast Update (2017 – 2022) released this week. Perhaps the key forecast: Mobile traffic will be on the verge of reaching an annual run rate of a zettabyte by the end of 2022. In that timeframe, mobile traffic will represent nearly 20 percent of global IP traffic and will reach 930 exabytes annually – nearly 113 times more than all mobile traffic generated globally in 2012. (An exabyte is 1,000,000,000 gigabytes and a zettabyte is 1,000 exabytes.)To read this article in full, please click here
The popularity of mobile devices will continue its dramatic growth over the next four years as new technologies kick in with higher density and bandwidth, according to Cisco’s annual Global Mobile Data Traffic Forecast Update (2017 – 2022) released this week. Perhaps the key forecast: Mobile traffic will be on the verge of reaching an annual run rate of a zettabyte by the end of 2022. In that timeframe, mobile traffic will represent nearly 20 percent of global IP traffic and will reach 930 exabytes annually – nearly 113 times more than all mobile traffic generated globally in 2012. (An exabyte is 1,000,000,000 gigabytes and a zettabyte is 1,000 exabytes.)To read this article in full, please click here
Silver Peak continues to count down the Top Ten Reasons to Think Outside the Router in our homage to the iconic David Letterman Top Ten List from his former Late Show. Click for the #4, #5, #6, #7, #8, #9 and #10 reasons to replace conventional branch routers with a business-driven SD-WAN platform.To read this article in full, please click here
Silver Peak continues to count down the Top Ten Reasons to Think Outside the Router in our homage to the iconic David Letterman Top Ten List from his former Late Show. Click for the #4, #5, #6, #7, #8, #9 and #10 reasons to replace conventional branch routers with a business-driven SD-WAN platform.To read this article in full, please click here
One of the hallmark features of blockchain is that it is supposedly much more secure, adding remarkable levels of transparency that could help better identify and mitigate cyber threats. But, at a time when we’re approaching 2,000 blockchain projects in development worldwide, watching thousands of crypto miners do their thing each day and seeing billions of investment dollars pouring in each year, are we taking warnings about potential threats seriously? Has the greater community taken some aspects of blockchain’s security for granted? The hard truths reveal affirmatives to both questions.To read this article in full, please click here
One of the hallmark features of blockchain is that it is supposedly much more secure, adding remarkable levels of transparency that could help better identify and mitigate cyber threats. But, at a time when we’re approaching 2,000 blockchain projects in development worldwide, watching thousands of crypto miners do their thing each day and seeing billions of investment dollars pouring in each year, are we taking warnings about potential threats seriously? Has the greater community taken some aspects of blockchain’s security for granted? The hard truths reveal affirmatives to both questions.To read this article in full, please click here
“Two years ago, predictive maintenance was forecast to be one of the most promising uses of the industrial Internet of Things (IoT).”That’s the lead of report based on a recent Bain & Company survey of more than 600 high-tech executives (Beyond Proofs of Concept: Scaling the Industrial IoT, by Bain partners Michael Schallehn, Christopher Schorling, Peter Bowen and Oliver Straehle). The report goes on to note that identifying precisely when equipment might fail “seemed like a no-brainer.” And yet, the report concludes, “predictive maintenance has failed to take off as broadly as expected.” In fact, industrial leaders were not as excited about predictive maintenance as they were back in a 2016 survey.To read this article in full, please click here