Archive

Category Archives for "Network World Wireless"

Cisco tightens its SD-WAN ties with Microsoft

Cisco has released a new version of it SD-WAN software that adds the ability to reinforce links between remote users and Microsoft Office 365 applications and better support voice and video networks.The new features are part of the latest release of Cisco’s core SD-WAN software that  can control the connectivity, management, and services between data centers and remote branches or cloud instances.  SD-WAN deployments typically include routers and switches or virtualized customer-premises equipment (vCPE) all running some version of software that handles policy, security, networking functions, and other management tools.To read this article in full, please click here

Do new technogies make IT easier?

Software-defined networking, intent-based networking, SD-WAN, and a host of other technologies are focused on making IT work easier through automation. Rather than manually configuring every part of a system, these technologies offer templates, AI assistance, and, in theory, a much lower workload for the IT worker in the field. Whether that theory translates to practice, however, remains a matter of debate.To read this article in full, please click here

Do new technologies make IT easier?

Software-defined networking, intent-based networking, SD-WAN, and a host of other technologies are focused on making IT work easier through automation. Rather than manually configuring every part of a system, these technologies offer templates, AI assistance, and, in theory, a much lower workload for the IT worker in the field. Whether that theory translates to practice, however, remains a matter of debate.To read this article in full, please click here

Startup claims its passive data-center cooling system generates power

A Canadian startup called Infinidium Power claims it has a new data-center cooling system that will generate power from the heat generated by the servers deployed within it.Infinidium claims its Next Generation Datacenter Cooling and Power Supply Infrastructure can reduce both operating and capital costs by as much as 50% through air cooling. It has its own compute containers called the Vortex Vacuum Chamber and a low-voltage direct-current smart Nanogrid, which saves power by not doing AC-to-DC conversion.A video animation on the company's site explains how the Vortex Vacuum Chamber sucks in cold air to a bell-shaped chamber where server boards are arranged in levels of circular racks. It uses a combination of the shape of the chamber and physics (warm air rises, cold air sinks) to generate power. Cool air is pulled into the chamber, and as heat generated by the servers warms the air it rises to a vent in the ceiling where it drives a turbine on its way out, generating power.To read this article in full, please click here

Turn tabs into spaces on Linux and vice versa

The Linux expand and unexpand commands sound like they can make files larger and smaller, but what they actually do is turn tabs into spaces and spaces into tabs.In this post, we’ll use some simple text files to demonstrate what happens when you use expand and unexpand. We’ll also compare how these commands work with some likely more familiar commands—sed and awk—that can provide similar results and offer additional options.[Get regularly scheduled insights by signing up for Network World newsletters.] To begin, let’s take a look at this very simple text file:To read this article in full, please click here

BrandPost: Overcoming Digital Transformation Challenges in Financial Services with SD-WAN

By: Gabriel Gomane, Sr Product Marketing Manager, Aruba, a Hewlett Packard Enterprise company.Whether for customers or employees, the digital transformation occurring at financial institutions has only accelerated in recent years. With that digital transformation, financial services organizations face an increasing array of networking and security challenges. These challenges include: digitization and cloud migration; the increasing percent of the workforce working from home; maintaining a modern and resilient network infrastructure; and last but certainly not least – cybersecurity risks and regulatory compliance.In response, SD-WAN has emerged as a key enabler to tackle and overcome these challenges while accelerating business growth. To illustrate how, below are five SD-WAN use cases from the financial services industry.To read this article in full, please click here

Cato adds fine-grained CASB controls to SASE platform

SASE vendor Cato Networks is adding fine-grained cloud access security broker (CASB) controls to its platforms.When employees working from home or branch locations log into SaaS services such as Office 365 or Dropbox or Salesforce, a CASB gateway can track the applications employees access, where they log in from, and sometimes even what they do when using those applications.Previously, Cato only offered limited CASB controls, enabling companies to allow or prohibit the use of particular SaaS tools, says Dave Greenfield, Cato's director of technology evangelism. Now, individual behaviors can be controlled. For example, users might be allowed to download documents from certain cloud file-sharing providers but can only upload documents to a company's preferred platform.To read this article in full, please click here

Where have all the global network aggregators gone?

One of the key selling points of SD-WAN is the ability to use a variety of network transport options. Enterprises can select MPLS, dedicated Internet access, business broadband, or wireless broadband, for example – whatever makes the most sense, technically and economically, for each site that needs connectivity. Cultivating a mix of suppliers can allow enterprises to significantly reduce transport costs as well as improve the flexibility of their networks.The growth in SD-WAN deployments over the last four or five years created a sweet spot for Internet transport aggregators, which, frankly, had struggled to break into the enterprise market when it was dominated by traditional MPLS providers.To read this article in full, please click here

Gartner: Worldwide IT spending to reach $4.5T in 2022

Research firm Gartner forecasts IT spending will reach nearly $4.5 trillion worldwide this year, with enterprise software, IT services, and data center systems leading the way. The projected $4.45 trillion in spending this year represents an increase of 5.1% compared with 2021.The largest growth segment is enterprise software, which is projected to grow 11% to $672 billion. However, Gartner includes the cloud market in the enterprise software market, and that's where the growth is. Read more: Gartner's top infrastructure and operations trends for 2022To read this article in full, please click here

China finally green lights AMD/Xilinx merger

AMD has been given the green light by the Chinese government to acquire FPGA giant Xilinx. No formal announcement has been made, but eagle-eyed writers spotted the detail in an 8-K filing with the U.S. Securities and Exchange Commission.The deal was first announced in October 2020. The U.S. and EU have already approved the acquisition, but in late December, AMD said it had to delay closing as China's regulators slow-walked the deal. Then came the filing this week:To read this article in full, please click here

China finally green lights AMD–Xilinx merger

AMD has been given the green light by the Chinese government to acquire FPGA giant Xilinx. No formal announcement has been made, but eagle-eyed writers spotted the detail in an 8-K filing with the U.S. Securities and Exchange Commission.The deal was first announced in October 2020. The U.S. and EU have already approved the acquisition, but in late December, AMD said it had to delay closing as China's regulators slow-walked the deal. Then came the filing this week:To read this article in full, please click here

Top 10 outages of 2021

The biggest outages of 2021 had one thing in common: they affected major infrastructure or services providers and, as a result, affected large numbers of enterprises and end users. The lesson? Companies need to be careful about putting all their infrastructure eggs in one basket, or, if they must, to prepare for downtime if that particular service goes down."There needs to be a plan in place," says Angelique Medina, head of product marketing at ThousandEyes, a Cisco-owned network intelligence company that tracks internet and cloud traffic. "Organizations don't need to be at the mercy of the availability of any one particular service."To read this article in full, please click here

How and why to adopt SDN despite its dark side

Five enterprise network operations managers told me they were very concerned about recent cloud outages. Why? Because every one of the outages were caused by network problems. Four of the five managers admitted that in their own containerized data centers, their problems came more often from networks than from servers. Why is this happening? Answer, according to enterprises: more isn’t better.Complexity is the enemy of efficient operations and management. The sheer volume of things going on can swamp management centers and even management tools. If you add in multiple vendors and multiple technologies that create differences in operations practices, you get something very messy. But it’s more than just size or technology scope that’s making network operations complicated, it’s the way networks work.To read this article in full, please click here

Will Nvidia give up on the Arm deal?

Nvidia may be about to do something it never does: give up.The chip giant is finally ready to throw in the towel on its proposed acquisition of Arm Holdings after vociferous opposition by UK regulators, according to a report from Bloomberg (paywalled).[Get regularly scheduled insights by signing up for Network World newsletters.] First announced in September 2020, the deal has dragged on due to almost immediate opposition from UK entities. Arm Holdings is a British company but owned by Japanese tech giant Softbank. Laden with debt, Softbank wanted to unload Arm to someone better suited to manage the company, and Nvidia stepped forward.To read this article in full, please click here

Hashing out the hash command on Linux

When you type “hash” on a Linux system, you could get one of two very different responses depending on the shell you are using.If you are using bash or a related shell such as ksh, you should see a list of the commands that you have used since your terminal session began, sometimes with a count of how many times each command was used. This can be more useful than using the history command if you just want to see your very recent command activity, but the hash command is not a single executable. Instead, it relies on your shell.How to tell if you're using a bash built-in in Linux hash in bash Here’s an example of the hash command run in bash:To read this article in full, please click here

Dell expands Apex cloud and on-prem storage options

Dell Technologies is charging ahead with its Apex consumption-based sales portfolio with a total of seven new launches, while also expanding its public cloud integration for a broader multi-cloud experience for its customers.Dell sees the writing on the wall and that the future is hybrid and multicloud. Today, 92% of organizations have a multi-cloud strategy in place or underway, and 82% of large enterprises have adopted a hybrid cloud infrastructure. And a new Forrester study commissioned by Dell Technologies found that 83% of organizations have adopted a multi-cloud approach or plan to within the next 12 months.To read this article in full, please click here

5G deployment near US airports slowed for now

5G deployments are proceeding around the country, albeit more slowly, after a partial agreement between the FCC and the FAA about the potential danger of 5G transmissions generated too strong and too close to airports on bandwidths adjacent to the spectrum used by airplane altimeters.President Biden announced that Verizon and AT&T had agreed to slow deployments of 5G around major airports after consultation with the Department of Transportation, in order to assuage concerns over air travel safety.What is 5G? At issue is potential interference between newly opened 5G spectrum in the 3.7GHz range and radioaltimeter equipment on older aircraft. While there’s some separation between the 3.7GHz 5G signals, which top out at 3.98GHz, and the bottom of the 4.2GHz range used by the avionics equipment, the FAA and the airline industry remain concerned over potential interference that, theoretically, could prevent affected aircraft from landing safely in low-visibility conditions.To read this article in full, please click here

6G exploratory group to be led by wireless heavyweights

The FCC has named 44 people to a technological advisory council tasked with exploring the possibilities of 6G wireless connectivity, a large proportion of the council’s members being drawn from the ranks of the country’s biggest networking-technology corporations.The chair of the committee will be a former Qualcomm executive, Dean Brenner. Intel, Cisco, Comcast, Microsoft, Nokia, Ericsson, and all of the major mobile operators are also represented on the commission’s Technological Advisory Council (TAC). Also representatived are large trade associations and academia.6G’s vast promises FCC chairwoman Jessica Rosenworcel said that leadership in the 6G realm has to be a priority for the US.To read this article in full, please click here

BrandPost: FedRAMP Helps Secure Federal and Other Networks as They Transition to Cloud

By: Dolan Sullivan, Vice President of Federal at Aruba, a Hewlett Packard Enterprise company.Recently, it seems like you can’t go more than a few days without hearing about another significant cyberattack. From oil pipelines and meat producers to hospitals and city water supplies, no segment of our nation’s critical infrastructure is immune to hackers. As bad actors become more daring in their targets and more creative with their exploits, securing people, places, and things—wherever they are—has never been more urgent for Federal IT leaders.Against this backdrop of unprecedented cyberattacks on our nation, other factors are contributing to the increased need for more robust security measures and policies to protect our Federal networks. For example, telework continues out of necessity, and in some cases, staff preference. Adoption of smart controls for equipment, physical access to facilities, environmental management, and other uses of IoT, is growing. Improving cybersecurity to protect the Federal government networks is an Executive Order. And, the uptake of cloud apps and services has accelerated.To read this article in full, please click here

1 30 31 32 33 34 406