Archive

Category Archives for "Network World Wireless"

Equinix’s fix for high power bills? Hotter data centers

Data-center giant Equinix has found a low-tech solution to high data-center electric bills: turn up the thermostat.Guidance from the American Society of Heat, Refrigerating, and Air Conditioning Engineers (ASHRAE) recommends a temperature range for data-center servers from 59°F (15°C) to as high as 89°F (31.6°C). Equinix is looking at setting the temperature at 80°F (26.6°C), up from the current setting of 73°F (22.7°C).To read this article in full, please click here

Intel Xeons to offer on-demand special functionality

Intel has a new program called Intel On Demand that will allow customers of its new Xeon Scalable Processors to unlock specialty processing engines for an extra fee.Intel has not disclosed what it will cost to access the On Demand features, which are activated through Intel Software Defined Silicon (SDSi), a newly added function using authentication keys to activate the additional features.For most customers, the standard Xeon core is all they need. But some may want the specialty processing engines included in the latest Xeon generation, codenamed Sapphire Rapids. The chips are available now to OEMs but will have a formal launch Jan. 10, 2023.To read this article in full, please click here

Gartner: Top trends to know for infrastructure and operations in 2023

Two networking technologies – secure access service edge (SASE) and wireless— lead a  list of six core trends that will impact enterprise infrastructure and operations activity in 2023, according to new research revealed by Gartner analysts at its IT Infrastructure, Operations & Cloud Strategies Conference this week.Implementing SASE, a term coined by Gartner, has been ongoing but is expected to grow substantially in the next year. Gartner forecasts that worldwide SASE spending will hit $9.2 billion in 2023, a 39% increase from 2022.To read this article in full, please click here

SONiC builds muscle for enterprise-network service in 2023

The coming year could be a very big one for the open-source network operating system SONiC as it garners start-up support and increasing interest from major networking vendors.The Linux-based Software for Open Networking in the Cloud decouples network software from the underlying hardware and lets it run on hundreds of switches and ASICs from multiple vendors while supporting a full suite of network features such as Border Gateway Protocol (BGP), remote direct memory access (RDMA), QoS, and Ethernet/IP. It was developed and then open-sourced by Microsoft, which in April turned the project over to the Linux Foundation and its 450,000 developers. The vendor community supporting SONiC has been growing, too, and includes Dell, Arista, Nokia, Alibaba, Comcast, Cisco, Broadcom, Juniper Apstra, Edgecore, Innovium, Nvidia-Mellanox, Celetica and VMware.To read this article in full, please click here

How to combat counterfeit network gear

In today challenging business and economic environment, everybody's looking for a deal. Yet there is one "bargain" that network managers should avoid at all costs – low-priced network devices that turn out to be counterfeit.No competent network manager would intentionally purchase a faux network component, but that doesn't mean it never happens. "If signs of counterfeit parts were obvious, this issue would probably be resolved quickly," says John Loucaides, senior vice president of strategy at security technology provider Eclypsium.Virtually every type of network device is shadowed by one or more unauthorized doppelgängers. Fake drop-in replacements are particularly prevalent. "This enables a wide variety of cheaper parts to be used in a non-obvious way, maximizing the benefit of providing a counterfeit device," Loucaides says. Sometimes, however, only a single component within a device is counterfeited. "Given a financial motive, this is likely the most expensive part being substituted for a cheaper part," he says.To read this article in full, please click here

Converting numbers on Linux among decimal, hexadecimal, octal, and binary

You might not be challenged very often to convert numbers from one numbering system to another but, when you are, you can do it with either of two fairly easy commands on the Linux command line.Converting in your head can be taxing, especially for longer numbers. While the decimal numbering system allows any digit in a number to have any of ten values (0-9), digits in hexadecimal numbers can have 16 (0-F), digits in octal numbers only eight (0-7) and digits in binary numbers only two (0-1).And, whether you like it or not, from time to time you are likely to run into numbers displayed in hex or octal, and knowing how to convert them from one number base to another can come in handy.To read this article in full, please click here

Surviving a Mastodon stampede

By now you’ve probably heard about Mastodon, the open-source microblogging platform that’s been gaining popularity since Elon Musk took over Twitter.A major feature of the platform is it’s de-centralized, distributed architecture that provides resilience, but a downside is that it can cause congestion and increase latency for the unprepared.Here’s how Mastodon works. Its servers (instances) operate semi-independently of each other, and users register with servers geared toward communities that interest them. But users can follow and interact with others from across the Fediverse—users hosted on other Mastodon instances as well as other services utilizing the open-source ActivityPub protocol from the Worldwide Web Consortium.To read this article in full, please click here

Is SASE right for your organization? 5 key questions to ask

Secure access service edge (SASE) is a network architecture that provides a security-focused alternative to SD-WAN. First outlined by Gartner in 2019, SASE converges SD-WAN services with a range of Security-as-a-Service offerings. Gartner now forecasts that by 2024 at least 40% of enterprises will consider adopting SASE.The leading SASE vendors are a mix of networking incumbents and well-funded startups. These include Cato Networks, Cisco, Fortinet, HPE, Palo Alto Networks, Perimeter 81, Versa, VMware, and Zscaler.To read this article in full, please click here

Linux bash tips: Many ways to loop using bash

The bash shell provides a superb functionality when it comes to writing scripts. This includes many ways to loop through a pile of data so that you can get a lot done with one running of a script. Whether you’re looping through a large group of numeric values, days of the week, usernames, words, files, or something else entirely, bash has an option that can make it easy for you.for, while, and until loops The first thing you need to know about looping in bash is that there are several basic commands to use. The while loop will loop as long as some particular condition holds true. The until loop will loop until some condition becomes true, and the for loop will run through a series of values regardless of their origin.To read this article in full, please click here

AWS launches new chips, replacement for TCP

Amazon Web Services has introduced a new CPU customized for high-performance computing (HPC) and the next generation of its Nitro smart networking chip, plus instances that take full advantage of the hardware.The Arm-based CPU is called the Graviton3E and has been optimized for floating point math, key in HPC, the company announced at AWS re:Invent conference. Amazon said Hpc7g instances powered by the new Graviton3E chips offer up to double the floating point and vector performance compared to the current generation of instances.The vast datasets that accompany HPC need to be moved around, so Amazon also introduced the fifth generation of its Nitro smartNICs, offering up to twice the network bandwidth and up to 50% higher packet processing-per-second performance compared to current generation networking-optimized instances.To read this article in full, please click here

Commands for finding out if compressed Linux files are the same

Compressed Linux files are helpful because they save disk space, but what should you do when you have a series of compressed files and want to determine if any are duplicates? The zdiff and zcmp commands can help.To begin, if a directory contains two files like those below, it’s easy to tell just from the listing that they are not identical. After all, the file sizes are a little different. The files look like this:$ ls -l total 200 -rw-r--r--. 1 shs shs 102178 Nov 22 2021 2021.gz -rw-r--r--. 1 shs shs 102181 Nov 22 11:19 2022.gz If you compare the files with the diff command, it will confirm that the files differ:To read this article in full, please click here

5 DNS services to provide a layer of internet security

Having thorough IT security usually means having a layered approach. Basic antivirus, for instance, might catch PC-based malware once a user downloads it, but you could try to block it before it ever reaches the user device, or at least have another security mechanism in place that might catch it if the basic antivirus doesn’t. DNS-based filtering can do this! It can help stop users from browsing to malware and phishing sites, block intrusive advertising to them, and serve as adult content filters.First, a quick primer for those who are unfamiliar with DNS: You utilize the Domain Name System (DNS) every time you surf the Web. Each time you type a site name into the browser, DNS is queried for the IP address corresponding to that particular domain, so the browser can contact the Web server to get the content. The process of converting the domain name to its IP address is called domain-name resolution.To read this article in full, please click here

Schneider Electric, SAP tighten bonds to ease IIoT system integration

ERP giant SAP and industrial automation company Schneider Electric Tuesday announced that they would expand their collaboration in the field of IIoT (industrial IoT) and digital transformation, with a focus on sustainable infrastructure and easy deployment.The two companies plan to create preconfigured deployment options for IIoT customers—so any company looking for, for example, a field service management tool using augmented reality can simply pick up and use the partnership’s preset hardware and software configuration. (Shop floor operational tech integration, using digital twins for lifecycle management, is also planned.)To read this article in full, please click here

Cisco updates SD-WAN to simplify provisioning, management

Cisco is set to unveil a new edition of its SD-WAN software that will extend the system’s reach and include new management capabilities.Among the most significant enhancements to Cisco SD-WAN release 17.10, expected in December, is the ability to use Cisco SD-WAN Multi Region Fabric (MRF) support with existing Software Defined Cloud Interconnect (SDCI) systems to significantly expand the reach and control of the SD-WAN environment. MRF lets customers divide their SD-WAN environments into multiple regional networks that operate distinctly from one another, along with a central core-region network for managing inter-regional traffic, according to Cisco. To read this article in full, please click here

Seagate introduces HDDs as fast as SSDs

Thanks to some engineering wizardry involving existing technologies, Seagate has introduced a new line of hard disk drives that can match the throughput of a solid state drive.The drives are part of Seagate’s Mach.2 line, called Exos 2X18. This is the second generation of the Mach.2, coming in 16TB and 18TB capacity and support either SATA3 6Gbps or SAS 12Gbps interfaces.The drive is essentially two drives in one, with two sets of platters served by two separate actuators, the arms with the drive heads, that work in parallel. So the 16TB/18TB capacity is achieved through two 8TB/9TB drives packed into one 3.5-inch form factor. The Mach.2 line is filled with helium to reduce friction.To read this article in full, please click here

Cisco to gauge user experience with its cloud-management service

Cisco is taking steps to better control the performance and observability of cloud-based enterprise applications.At the AWS re:Invent conference this week, Cisco said it has added a feature called business transaction insights to its AppDynamics Cloud system so it can more easily track performance of applications running on the AWS Cloud including on Kubernetes, microservices, and other AWS infrastructure.Available since June, AppDynamics Cloud is a cloud-native service designed to observe applications and take action to remediate performance problems. It is built on OpenTelemetry, an emerging standard for data collection that helps to visualize and measure application performance from multiple data sources, said AppDynamics Executive CTO Gregg Ostrowski.To read this article in full, please click here

1 14 15 16 17 18 406