Archive

Category Archives for "Network World Wireless"

Cisco’s ThousandEyes can peer into SaaS performance

Cisco has broadened the scope of its ThousandEyes network-intelligence gathering software to let customers watch over their growing expanse of software-as-a-service applications.In addition to its existing Internet Insights platform, ThousandEyes has a new program called Application Outages that promises to provide views into the availability of the SaaS applications employees are using.Internet Insights gathers data from what Cisco says are tens of thousands of ThousandEyes Cloud Agents and Enterprise Agents spread across the internet and enterprise networks globally. ThousandEyes’ technology warns when a user’s experience is less than ideal and can pinpoint failures.To read this article in full, please click here

AMD launches big data-center push vs. Intel, Nvidia

AMD has emerged from its long defensive crouch to taking the fight directly to Intel and Nvidia, a bold move but one backed by a company that's been racking up wins lately.Coming on the heels of a record-setting quarter, AMD announced new EPYC server CPUs, a new line of Instinct brand GPUs it says are faster in than Nvidia’s best, the next generation of its CPU architecture, and a deal with Meta, formerly known as Facebook.[Get regularly scheduled insights by signing up for Network World newsletters.] EPYC Milan-X CPU AMD CEO Lisa Su introduced the EPYC Milan-X processors, an iteration of its third-generation server processors with a 3D-stacked L3 cache called 3D V-Cache. One problem with increasing cache is you get transistor sprawl and the die gets progressively bigger. 3D stacking reduces the physical size while increasing density.To read this article in full, please click here

Juniper’s marketing lags its technology

Like a lot of other people, I remember the Juniper ads of decades ago that used cartoons to poke fun at competitors. It was in-your-face marketing, and it seemed to pay off for Juniper in visibility.Then they got quiet, and while Juniper continued to innovate at the product level, they didn’t make news like they used to. Then they held their Nov. 2 analyst event, and they got in their competitors’ faces again. Why, and how?The why is related to a principle of marketing I’ve talked about for decades: trajectory management. All sales processes these days aim at converting “suspects” into “customers” through a series of steps. First you get mentioned in tech news articles and analyst briefs. Second, those who see those mentions go to your website for more information, which leads them to the third step—a request to talk to a salesperson. In-your-face marketing gets good ink, and Juniper got more coverage of its event than it’s gotten for anything else in years.To read this article in full, please click here

A $1.9B FCC fund to replace banned 5G telco gear might be too little

The Federal Communications Commission has opened up a $1.9 billion fund to help smaller, rural US telcos replace the 5G and other gear in their networks that is made by China-based Huawei and ZTE, whose equipment has been banned since the telecom providers bought it.The Secure and Trusted Communications Networks Reimbursement Program will help service providers remove, replace, and dispose of the equipment, but it's not likely to cover all their costs. “It’s hard to say what the gap is, but what I’m hearing from the rural wireless carriers and the others impacted by this, it won’t be enough,” said IDC research manager Patrick Filkins.The fund is open only to carriers with 10 million or fewer subscribers, and that means mostly rural providers who were attracted to the Chinese companies at least in part because of their less expensive product lines.To read this article in full, please click here

ITRenew integrates Pluribus Networks software with its hyperscale servers

ITRenew, the reseller of slightly used hyperscalar servers, has partnered with Pluribus Networks to add Pluribus’s Netvisor ONE operating system and Adaptive Cloud Fabric controllerless SDN cloud networking software to its hardware.ITRenew resells servers it buys from hyperscalers like Amazon and Google that are retiring them, typically after a year or so. It refurbishes them, offers a warrantee, and sells them to enterprises for half the price of new hardware.ITRenew sells the servers under the Sesame brand, which will now include Pluribus’s open networking software with their hyperscale-grade compute, storage and networking infrastructure for a fully integrated hardware and software solution.To read this article in full, please click here

Cisco tool makes it easier to meld SD-WAN, security domains

Cisco has upgraded two of its core software programs to make it easier for enterprise customers to secure data-center and WAN-connected resources.https://www.networkworld.com/article/3599213/what-are-data-centers-how-they-work-and-how-they-are-changing-in-size-and-scope.htmlCisco has introduced what it calls Integrated Domain, which combines the domain controllers of Cisco DNA Center and Cisco SD-WAN vManage to tie together network connectivity between the two domains as well as ensuring security-policy consistency end-to-end, according to Justin Buchanan, Cisco director of product management, security policy and access.To read this article in full, please click here

10 limitations of MU-MIMO in Wi-Fi

Multi-user MIMO allows multiple Wi-Fi devices to simultaneously receive multiple data streams. For example, a wireless access point (AP) can send data to four different Wi-Fi devices at the same time. MU-MIMO can greatly increase the network's throughput and is a real asset for high density networks.MIMO – which stands for multiple input multiple output – technology has evolved over the years since the debut of the single-user mode (SU-MIMO), which was introduced more than a decade ago with the 802.11n wireless standard. Learn more about MU-MIMO and Wi-Fi 6To read this article in full, please click here

Kyndryl has spun off from IBM as a $19B managed service firm

Kyndryl, formerly IBM’s Managed Infrastructure Services unit, is officially an independent company.From the start the spinoff will be big, with more than 90,000 employees, $19 billion in annual revenue, operations in over 60 countries, and a customer base that includes 75% of the Fortune 100. Its goal of modernizing customer infrastructure will remain at the center of its strategy, but it wants to expand.[Get regularly scheduled insights by signing up for Network World newsletters.] Company executives say by spinning out of IBM, Kyndryl will have more freedom to partner with other major tech companies and cloud hyperscalers such as Google, AWS, and Microsoft. Plus it can invest in its workforce as well as focus on developing services for hot markets such as 5G, edge computing, cloud, and security.To read this article in full, please click here

Red Hat Enterprise Linux 9 drops in beta version

Red Hat Enterprise Linux version 9 released today as a beta, bringing about a dozen major new features focused on security and compliance, simplified management and automation. But the biggest news might be the lack of changes to the management and administration tools from the previous version, which could make adoption fairly painless.The key new management features include enhanced web-console performance metrics for easier diagnosis of problems, live kernel patching without the need for downtime, and an easier way to create new OS images.[Get regularly scheduled insights by signing up for Network World newsletters.] Many of those features make RHEL 9 better-suited to use in edge environments, according to IDC vice president Dave McCarthy, who noted that automation seemed to be a particularly important focus in the new version.To read this article in full, please click here

Cisco NaaS study: IT pros are interested but wary

As IT pros evaluate the role of network-as-a-service, they weigh the upsides of quicker access to new technologies and faster incident-response times against loss of control over security and potential disruptions caused by transitioning away from traditional networking, according to a new Cisco report.These are among the results from Cisco’s survey of 1,534 IT professionals in 13 countries as well as interviews with 20 IT leaders that are compiled in the company’s “2022 Global Networking Trends Report: The Rise of Network as a Service (NaaS)”To read this article in full, please click here

Using the cheat command on Fedora Linux

The term "cheat sheet" has long been used to refer to listings of commands with quick explanations and examples that help people get used to running them on the Linux command line and understanding their many options.Most Linux users have, at one time or another, relied on cheat sheets to get them started. There is, however, a tool called "cheat" that comes with a couple hundred cheat sheets and that installs quickly and easily on Fedora and likely many other Linux systems. Read on to see how the cheat command works.Finding installed packages on Fedora Linux systems First, to install cheat on Fedora, use a command like one of these:To read this article in full, please click here

How PowerShell can find features and roles on Windows servers

The PowerShell Get-WindowsFeature command—or, more properly, cmdlet—can retrieve a list of Windows features, including server roles, that are installed on a server or workstation running Windows, making it a handy tool for server admins.Learning about it can point up its value and how a broader knowledge of PowerShell commands may lead to more efficient administration of Windows servers.[Get regularly scheduled insights by signing up for Network World newsletters.] Tim Ferrill By default, the output of the Get-WindowsFeature cmdlet provides something of a hierarchical view with individual features having boxes checked or not depending on their installation status. (Click to expand the image at left.) This is great for quickly eyeballing a single server to get an idea of what functions it provides, but as the list contains upwards of 250 roles and features, it starts to lose practicality when you are looking for a specific set of features or want to inventory multiple servers in a single pass.To read this article in full, please click here

Juniper service provides AI-based network management

Juniper Networks has rolled out a cloud-based service that uses AI to manage everything from network inventory and configuration details to device status and contract information.Juniper Support Insights securely gathers network information from Juniper’s Junos switching and routing portfolio, including ACX, EX, MX, PTX, QFX, and SRX Series platforms and provides it to the Juniper cloud. Learn more about 5G and WiFi 6 What is 5G? How is it better than 4G? How to determine if WiFi 6 is right for you What is MU-MIMO? Why do you need it in your wireless routers? When to use 5G, when to use WiFi 6 How enterprises can prep for 5G networks The Junos devices can connect directly to the cloud or via Lightweight Collector, an on-premises appliance that can link up to 20,000 devices to the cloud.To read this article in full, please click here

Searching through compressed files on Linux

There are quite a few ways to search through compressed text files on Linux systems without having to uncompress them first. Depending on the format of the files, you can choose to view entire files, extract specific text, navigate through file contents searching for content of interest, and sometimes even edit content. IFirst, to show you how this works, I compressed the words file on one of my Linux systems (/usr/share/dict/words) using these commands:$ cp /usr/share/dict/words . $ 7z a words.7z words $ bzip2 -k words $ gzip -k words $ xz -k words $ zip words.zip words How to use the grep command on Linux   The -k options used with the bzip2, gzip, and xz commands kept these commands from removing the original file, which they would by default. The resultant files then looked like this:To read this article in full, please click here

It’s official: VMware and Dell have split

VMware is once again a standalone company as it has officially split with its parent firm, Dell and untied the knot that has held them together since 2016.The move is widely seen as a way for both companies to work with new partners and expand their respective technologies while keep close ties to each other.[Get regularly scheduled insights by signing up for Network World newsletters.] It also has financial impacts. According to the Financial Times, Dell Technologies will shed its 81% stake in publicly traded VMware, creating an independent software company with a stock market value of nearly $64 billion. Dell’s remaining hardware operations have an implied value of $33 billion, based on its latest share price. To read this article in full, please click here

Software-defined perimeter is a good place to start a rollout of Zero Trust network access

Zero Trust relies on continuously re-authorizing users, applications, and devices to establish myriad “perimeters of one” in the environment, but the name isn’t quite accurate.Zero Trust doesn’t literally mean zero trust; it means zero implicit trust. You—whether that means a person, or a software or hardware system—are not to be trusted simply by virtue of where you are on the network; there is no network perimeter within which you are automatically trusted to connect to services. And you are not to be trusted now just because you were trusted when you first gained access to the network; gaining admission once is not the same thing as ongoing trust. And you are not to be trusted to make the new service connection you are trying to make now just because you were trusted to make the previous one.To read this article in full, please click here

How to choose an edge gateway

There could be as many as 15 billion IoT devices connected to enterprise infrastructure by 2029, according to Gartner. These devices will generate massive amounts of operational data that needs to be translated from their original protocols, aggregated, and analyzed in order to deliver real-time actionable alerts as well as longer-term business insights.For organizations with significant IoT deployments, edge computing has emerged as an effective way to process sensor data closest to where it is created. Edge computing reduces the latency associated with moving data from a remote location to a centralized data center or to the cloud for analysis, slashes WAN bandwidth costs, and addresses security, data-privacy, and data-autonomy issues.To read this article in full, please click here

BrandPost: Connectivity Shouldn’t Limit Industry 4.0 Acceleration

When the coronavirus pandemic forced shutdowns across the world, industries faced a disaster unlike ever before. Facilities and IT systems were operational, yet people could not physically access them. According to a 2021 McKinsey survey, Industry 4.0 technologies were a lifesaver, with 94% of respondents saying they helped keep operations running and more than half (56%) reporting they were critical to doing so.COVID-19 put Industry 4.0 and digital transformation into third gear, while preparing enterprises for the post-pandemic era. However, these technologies depend on connectivity, and legacy solutions such as wired connections or WiFi are not up to the challenge. To read this article in full, please click here

NetApp overhauls cloud storage lineup

NetApp used its virtual NetApp Insight 2021 conference as the launchpad for several new technologies and enhancements to existing products, as well as to announce an acquisition. All are meant to bolster the on-prem storage supplier’s cloud offerings.First up, NetApp introduced ONTAP 9.10 Enterprise Data Management software, which includes upgrades that protect against ransomware and enhanced detection and recovery capabilities. The new software also features expanded data management capabilities and NVMe/TCP support.NVMe traditionally works over a network fabric, but there are bottlenecks – namely, you have to build the fabric. NVMe/TCP allows the same storage devices to be shared among data centers through the Internet protocol over the existing network.To read this article in full, please click here

Startup gives IT control of GPU pools to maximize their use

Among the greatest component shortages bedeviling everyone is that of GPUs, both from Nvidia and AMD. GPUs are used in Bitcoin farming, and with massive farms around the world gobbling up every GPU card, getting one is nigh impossible or prohibitively expense.So customers need to squeeze every last cycle out of the GPUs they have in service. An Israeli company called Run:AI claims it has a fix with a pair of technologies that pool GPU resources and maximize their use.The technologies are called Thin GPU Provisioning and Job Swapping. Not the most creative of names but they describe what the two do in tandem to automate the allocation and utilization of GPUs.To read this article in full, please click here