Archive

Category Archives for "Network World Wireless"

AI tackles workload management challenges in the data center

As data center workloads spiral upward, a growing number of enterprises are looking to artificial intelligence (AI), hoping that technology will enable them to reduce the management burden on IT teams while boosting efficiency and slashing expenses.AI promises to automate the movement of workloads to the most efficient infrastructure in real time, both inside the data center as well as in a hybrid-cloud setting comprised of on-prem, cloud, and edge environments. As AI transforms workload management, future data centers may look far different than today's facilities. One possible scenario is a collection of small, interconnected edge data centers, all managed by a remote administrator.To read this article in full, please click here

Checking Linux system performance with sar

Sar is a system utility that gives us many ways to examine performance on a Linux system. It provides details on all aspects of system performance including system load, CPU usage, memory use, paging, swapping, disk usage, device load, network activity, etc.The name "sar" stands for "system activity report," and it can display current performance, provide reports that are based on log files stored in your system's /var/log/sa (or /var/log/sysstat) folder, or be set up to automatically produce daily reports. It's part of sysstat – a collection of system performance monitoring tools.To check if sar is available on your system, run a command like this:To read this article in full, please click here

Sparking the next cycle of IT spending

Who, in the entire IT space, wouldn’t like to see an uptick in tech spending?  Enterprises would see new purchases easier to make, vendors would make more money, and technologists in general would have a new sense of excitement and mission.  It seems like we’ve been stuck in a do-more-for-less rut, but the past offers us some evidence of how we could get out of it.If you were to plot of the growth in enterprise IT spending versus GDP growth for the US over the entire life of information technology, you’d see not a hockey stick but a series of peaks and valleys.  You would see that there are three clear periods or cycles where IT spending has significantly outstripped GDP growth, and that we’ve been in a trough ever since the last one ended in about 2000.  We’ve never had two decades pass without another cycle, so what’s wrong?  Answer: Nothing’s driving one now.To read this article in full, please click here

Intel unveils new type of network accelerator chip

Intel on Monday expanded its network processor roadmap with the announcement of the Infrastructure Processing Unit (IPU). Think of it as the next step in the SmartNIC market, because Intel does.The announcement was made at the Six Five Summit 2021, where Navin Shenoy, the head of Intel's Data Center Group, announced its intention to create the new processor family specifically for cloud workloads.There has been a move toward dedicated networking chips, called SmartNICs, that offload the work of network traffic processing from the CPU, thus freeing up the CPU to do its primary task. Mellanox released one in 2019 and was soon bought by Nvidia. Xilinx released one a year later and will soon be under the ownership of AMD.To read this article in full, please click here

Cisco bolts together enterprise and industrial edge with new routers

Cisco has extended its family of Catalyst networking gear with routers designed to integrate remote, industrial-edge network resources.The new Catalyst 5G Industrial Router family includes three modular routers and a gateway that run Cisco's core operating system, IOS XE, and support a variety of network access technologies such as SD-WAN, Wi-Fi 6, 5G, 4G, Private LTE, FirstNet and Wi-SUN. The ultimate goal is to let customers tie together enterprise networks and SD-WANs with remote operations so IT can build, secure and manage a unified edge.To read this article in full, please click here

IoT cloud services: How they stack up against DIY

Eager to cash in on the massive potential for IoT-based data storage and analytics, public-cloud vendors are diving headlong into the IoT market, offering enterprises everything from individual building blocks to fully managed services and every combination in between. Tech Spotlight: Cloud Computing Cloud or bust: IT leaders go all in on cloud computing (CIO) Migrating to hosted Exchange: Do’s and don’ts (Computerworld) AWS, Google Cloud Platform and Azure: How their security features compare (CSO) From legacy to the cloud: The 3 stages of enterprise modernization (InfoWorld) IoT cloud services: How they stack up against DIY (Network World) The amount of data that is expected to be generated by IoT devices is staggering. IDC predicts that by 2025, there will be 55.9 billion connected devices worldwide, 75% of which will be connected to an IoT platform. IDC estimates the amount of data generated from IoT devices will be 79.4 zettabytes by 2025.To read this article in full, please click here

Cisco upgrades intent-based-networking performance, security, analytics

Cisco brought new features to its DNA Center network-control platform that promise to improve performance, management analytics and security for its enterprise network customers.The new software features integration of a ThousandEyes agent that bulks-up the platform’s network-intelligence monitoring, a two-fold increase in the number of clients the system can support, and improved security and operational capabilities.NaaS is the future but it's got challenges DNA Center is the heart of Cisco’s intent-based networking strategy and is the vendor’s core-networking control platform supporting myriad services from analytics, network management and automation to assurance setting, fabric provisioning, and policy-based segmentation for wired and wireless enterprise networks. To read this article in full, please click here

New NVMe spec brings new support for hard drives

The new NVM Express 2.0 has been released and with it a surprise: The non-volatile memory express protocol—best known for handling SSD speeds—is now offering full-blown support for traditional hard-disk drives.This is quite unexpected because SSDs are orders of magnitude faster than traditional HDDs. [ Read also: How to plan a software-defined data-center network ] The first flash-based SSDs used SATA/SAS physical interfaces borrowed from existing hard drive-based enterprise server/ storage systems. However, none of these interfaces and protocols were designed for high-speed storage media and the SATA/SAS bus became a bottleneck for the much faster SSD.To read this article in full, please click here

Why the cloud will never eat the data center

Sometimes it’s hard to see gradual changes in technology paradigms because they’re gradual.  Sometimes it helps to play “Just suppose…” and see where it leads. So, just suppose that the cloud did what some radical thinkers say, and “absorbed the network”. That’s sure an exciting tag line, but is this even possible, and how might it come about?Companies are already committed to a virtual form of networking for their WAN services, based on VPNs or SD-WAN, rather than building their own WANs from pipes and routers.  That was a big step, so what could be happening to make WANs even more virtual, to the point where the cloud could subsume them?  It would have to be a data-center change.To read this article in full, please click here

What you can find out asking which, whereis and whatis in Linux

The which, whereis and whatis commands on a Linux system provide information about commands. They provide related but not identical information. In this post, we’ll check out the differences and provide a script for getting information that’s available from all three commands. We’ll also explore some sample commands for looking at secondary (i.e., not section 1) man pages.which The which command will show you the file-system location for a command’s executable. This is the file that is read and run whenever you type the command name.$ which date /usr/bin/date $ which shutdown /usr/sbin/shutdown Summarizing your command-line usage on Linux The which command will also report on your aliases and show you the commands they invoke.To read this article in full, please click here

New Cisco servers embrace hybrid cloud

Cisco has added a new class of servers to its Unified Computing System that are more flexible and outfitted with management software geared to hybrid cloud.The UCS X-Series is the first major redisign since UCS hit the market in 2009. The company says the modular hardware architecture is future-proofed because it can accomodate new generations of processors, storage, nonvolatile memory, accelerators, and interconnects as they come along. Prior UCS chassis were either blade systems for power efficiency or rack systems for expandability, but the UCS X-Series combines both in the same chassis.This means the single server type is able to support a broader range of tasks, from virtualized workloads, traditional enterprise applications, and databases to private cloud and cloud-native applications. The individual modules are interconnected into a fabric that can support IP networking, Fibre Channel SAN, and management connectivity.To read this article in full, please click here

Supermicro launches liquid cooling initiative

Super Micro Computer, a.k.a. Supermicro, is adding a range of liquid cooling solutions to its server products. Working with customers, Supermicro will design, implement and test the latest liquid cooling technologies at the rack level. Customers who implement liquid cooling can improve data center PUE (power usage effectiveness) and TCO by more than 40% by cutting power costs, the company says.The cooling is for new systems coming to market. Like most OEMs that support liquid cooling, Supermicro isn’t recommending retrofits to existing installations. It cites two reasons: One, it would be expensive, as you’d have to drill into the rack and server chassis to make room for the cooling piping. And two, the entire rack or cluster would have to be inactive while the retrofit was being done, and most firms won’t tolerate that.To read this article in full, please click here

Experimental Morpheus CPU is ‘mind-bogglingly terrible’ to crack

To many of us, Morpheus is a character played by Laurence Fishburne in The Matrix movies. To others, Morpheus is the Greek god of sleep and dreams. To others still, Morpheus is a digital synthesizer from the early ‘90s that developed a cult following.The Morpheus we’re discussing today, however, is of far greater relevance to enterprise IT professionals who constantly are searching for ways to protect their networks from the ever-present threat of hackers.Developed by a team at the University of Michigan, this Morpheus is a CPU that ingeniously protects against hacking attempts by using encryption that changes every few milliseconds, which prevents intruders from getting a fix on how a system is set up. This makes cracking the encryption nearly impossible and is sure to drive hackers crazy.To read this article in full, please click here

Could antiferromagnetic chips replace silicon?

We probably wouldn’t have a Digital Age without silicon.The second most abundant element in the Earth’s crust (oxygen is No. 1), silicon is cheap and has the ability to conduct electricity and/or act as an insulator. Converted into silicon wafers, it powers the computers, smartphones and other electronic devices we use to work and, importantly, to avoid work. So clearly silicon is indispensable.Or maybe not. Our insatiable demand for more and more data, along with the need to store it, is pushing the limits of what silicon can deliver in terms of speed, density, and security. In a bid to find a worthy successor to silicon-based memory devices, MIT physicists are zeroing in something called antiferromagnets.To read this article in full, please click here

Open-source: Get SLAs to protect network apps with open-source components

The continuous influx of open-source software (OSS) into enterprise IT departments is, in many ways, an enormous boon to both vendors and users. For the former, the ability to use open source components means getting rid of a great deal of duplicative effort—rather than having to design every part of, say, an IoT sensor and monitoring product from scratch, a vendor can adopt a well-understood, well-supported open source library for its networking stack, and focus more of its attention on the sensing and data analysis features that will set the product apart from its competitors.For end-users, one of the chief advantages is—at least in theory—the improved security that’s part of the usual sales pitch for open source software. The idea here is that the open nature of a piece of software—and the fact that anyone can look at it to discover and correct security flaws—means that it’s generally going to be more secure than a proprietary equivalent.To read this article in full, please click here

Make sure your laptop backups can handle ransomware

With increasingly mobile workforces, it’s important to effectively backup corporate data that resides on laptops, which requires a unique set of features not found in traditional backup systems used for desktops attached to corporate LANs.Laptops have all the functionality of desktops, but are readily lost or stolen, have limited bandwidth for connectivity to corporate resources, and can spend unpredictable spans of time disconnected or turned off. So it’s important to find backup options that meet these challenges, which can also include ransomware attacks.Backup lessons from a cloud-storage disaster Backing up laptops properly also makes upgrading them much easier, especially in the world of remote work. A good backup system can restore a user’s profile and data, and makes replacing a laptop much simpler for both the IT department and the person whose laptop is being replaced. With the right system in place, all you have to do is ship them a new laptop.  They can restore their own profile and data without IT intervention, saving time, effort, and a lot of money.To read this article in full, please click here

Troubleshooting your bash scripts

If you run into problems building, testing or running complex bash scripts, don't lose heart. There are many ways you can help ensure that your scripts will work flawlessly. In this post, we'll examine some ways you can lessen the likelihood of errors and how to go about doing some simple but very effective troubleshooting.Through a combination of robust logic that tests for possible problems and some troubleshooting to help detect errors, your scripts are likely to be ready for showtime very quickly.Summarizing your command-line usage on Linux Building the outer edges first One way to avoid syntactical errors in scripts is to start your for and while loops, case statements and if/then commands using the outer logic first. If you start your script logic using a syntactical "skeleton", you won't forget to end it properly.To read this article in full, please click here

Edge devices improve drilling efficiency for energy company

Moving compute and storage resources to edge locations can reduce latency and bandwidth needs, improve performance and save money. At the same time, widespread edge computing deployments can introduce significant management challenges. Servers can be hard enough to maintain when they’re in an on-prem data center. What if they’re deployed in the middle of nowhere?Energy companies know all too well the challenges of remote computing.“When we drill a well, it’s always in the middle of nowhere,” says Dingzhou Cao, senior advisor for data science at independent shale producer Devon Energy, a Fortune 500 company based in Oklahoma City, Okla.To read this article in full, please click here

1 2 3 366