Archive

Category Archives for "Network World Wireless"

New Cisco/Intel feature provides troubleshooting data from Intel Wi-Fi endpoints

Cisco and Intel have extended their technology relationship to enable Cisco Wi-Fi gear to gather data from Intel-based PCs in order to troubleshoot and optimize wireless connections for end-user machines.The companies announced Intel Connectivity Analytics, a feature that helps to evaluate Wi-Fi connectivity and for IT teams to monitor wireless resources.[Get regularly scheduled insights by signing up for Network World newsletters.] The feature is supported by Intel-based PCs deployed with Wi-Fi 6/6E chipsets and Cisco Wi-Fi offerings including the Cisco Catalyst 9800 series wireless-controller family, its Embedded Wireless Controller, and the full range of Meraki cloud-managed access points.To read this article in full, please click here

New Cisco/Intel feature provides troubleshooting-data from Intel Wi-Fi endpoints

Cisco and Intel have extended their technology relationship to enable Cisco Wi-Fi gear to gather data from Intel-based PCs in order to troubleshoot and optimize wireless connections for end-user machines.The companies announced Intel Connectivity Analytics, a feature that helps to evaluate Wi-Fi connectivity and for IT teams to monitor wireless resources.[Get regularly scheduled insights by signing up for Network World newsletters.] The feature is supported by Intel-based PCs deployed with Wi-Fi 6/6E chipsets and Cisco Wi-Fi offerings including the Cisco Catalyst 9800 series wireless-controller family, its Embedded Wireless Controller, and the full range of Meraki cloud-managed access points.To read this article in full, please click here

Nvidia announces new InfiniBand networking hardware

Networking equipment was the news of the day at Nvidia’s GPU Technology Conference (GTC), with new hardware for improved end-to-end performance.Nvidia announced the Quantum-2 platform, a 400Gbps InfiniBand networking platform consisting of the Quantum-2 switch, ConnectX-7 network adapter, BlueField-3 data processing unit (DPU), and all the software to support the new architecture.[Get regularly scheduled insights by signing up for Network World newsletters.] At 400Gbps, NVIDIA Quantum-2 InfiniBand doubles the network speed and triples the number of network ports over the Quantum-1 product. With a three-fold performance increase in performance, data-center fabric switches can be reduced by six-fold, cutting data center power consumption and reducing the overall data center space by 7%, the company says.To read this article in full, please click here

Rethinking the WAN: Zero Trust network access can play a bigger role

The WAN as initially conceived was about one simple job: the WAN was the network that “connects my sites to each other.” That is, the network connecting users in corporate sites to corporate IT resources in other corporate sites or perhaps colocation facilities. It was all inside-to-inside traffic.Over the past decade so much has changed that, just before COVID-19 work-from-home mandates took hold, only about 37% of a typical WAN’s traffic was still inside-to-inside, according to Nemertes’ “Next Generation Networks Research Study 2020-2021”. The rest touched the outside world, either originating there as with remote work against data-center systems or terminating there as with SaaS use from a company site or both as with VPNing into the network only to head back out to a SaaS app.To read this article in full, please click here

3 steps to improve collaboration between networking and security pros

(Enterprise Management Associates finds that enterprises are trying to improve collaboration between their network-infrastructure and operations teams and their information-security and cybersecurity teams. This article discusses challenges faced by these teams based on a survey of 366 IT and security professionals detailed in the report “NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transformation”, by EMA Vice President of Research Networking Shamus McGillicuddy.)To read this article in full, please click here

Monitoring Linux system resources with bpytop

The bpytop tool is similar to other performance monitoring tools available for Linux systems like top, iotop, htop, bashtop etc. It’s a terminal-based resource monitor that works efficiently and is visually appealing.The tool was ported from bashtop and rewritten in Python, so you need to have Python—version 3.6 or later—installed on your system to use it. (The “bpy” portion of the name undoubtedly stands for “bash Python”.)If you already have Python installed on your system, you can check the version using one of these sets of commands:Fedora Linux Mint ====== ========== $ which python $ which python3 /usr/bin/python /usr/local/bin/python3 $ python -V $ python3 -V Python 3.9.7 Python 3.8.10 Both systems shown are running Python3, but the Fedora system has /usr/bin/python set up as a symbolic link to python and the other system does not. So, they’re both using Python3.To read this article in full, please click here

3 steps to better collaboration between networking and security pros

(Enterprise Management Associates finds that enterprises are trying to improve collaboration between their network-infrastructure and operations teams and their information-security and cybersecurity teams. This article discusses challenges faced by these teams based on a survey of 366 IT and security professionals detailed in the report “NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transformation”, by EMA Vice President of Research Networking Shamus McGillicuddy.)To read this article in full, please click here

Nvidia jumps into Zero Trust

Nvidia has announced a Zero Trust platform built around its BlueField data-processing units and Nvidia software.Zero Trust is an architecture that verifies every user and device that tries to access the network and enforces strict access control and identity management that limits authorized users to accessing only those resources they need to do their jobs.[Get regularly scheduled insights by signing up for Network World newsletters.] “You cannot just rely on the firewall on the outside, you have to assume that any application or any user inside your data center is a bad actor,” said Manuvir Das, head of enterprise computing at Nvidia. “Zero Trust basically just refers to the fact that you can't trust any application or user because there are bad actors.”To read this article in full, please click here

Kyndryl weds Microsoft to grow cloud services

IBM spin-off Kyndryl has made the first of what likely will be many strategic cloud partnerships with a pact with business software giant Microsoft.Under the agreement the companies will develop new products built on Microsoft Cloud and aimed at facilitating digital transformation, Kyndryl stated. Microsoft has also become Kyndryl’s only Premier Global Alliance Partner.[Get regularly scheduled insights by signing up for Network World newsletters.] Microsoft will sell products developed by the two companies through its global enterprise sales force and will develop a Microsoft Cloud training ground for employees called Kyndryl University for Microsof. The companies said they will focus on data modernization and governance, AI-driven innovations for industries, cyber security and resiliency, and transformation of mission critical workloads to the cloud. Kyndryl will lead with advisory, implementation, and managed services for hybrid environments, Kyndryl stated. To read this article in full, please click here

Cisco’s ThousandEyes can peer into SaaS performance

Cisco has broadened the scope of its ThousandEyes network-intelligence gathering software to let customers watch over their growing expanse of software-as-a-service applications.In addition to its existing Internet Insights platform, ThousandEyes has a new program called Application Outages that promises to provide views into the availability of the SaaS applications employees are using.Internet Insights gathers data from what Cisco says are tens of thousands of ThousandEyes Cloud Agents and Enterprise Agents spread across the internet and enterprise networks globally. ThousandEyes’ technology warns when a user’s experience is less than ideal and can pinpoint failures.To read this article in full, please click here

AMD launches big data-center push vs. Intel, Nvidia

AMD has emerged from its long defensive crouch to taking the fight directly to Intel and Nvidia, a bold move but one backed by a company that's been racking up wins lately.Coming on the heels of a record-setting quarter, AMD announced new EPYC server CPUs, a new line of Instinct brand GPUs it says are faster in than Nvidia’s best, the next generation of its CPU architecture, and a deal with Meta, formerly known as Facebook.[Get regularly scheduled insights by signing up for Network World newsletters.] EPYC Milan-X CPU AMD CEO Lisa Su introduced the EPYC Milan-X processors, an iteration of its third-generation server processors with a 3D-stacked L3 cache called 3D V-Cache. One problem with increasing cache is you get transistor sprawl and the die gets progressively bigger. 3D stacking reduces the physical size while increasing density.To read this article in full, please click here

Juniper’s marketing lags its technology

Like a lot of other people, I remember the Juniper ads of decades ago that used cartoons to poke fun at competitors. It was in-your-face marketing, and it seemed to pay off for Juniper in visibility.Then they got quiet, and while Juniper continued to innovate at the product level, they didn’t make news like they used to. Then they held their Nov. 2 analyst event, and they got in their competitors’ faces again. Why, and how?The why is related to a principle of marketing I’ve talked about for decades: trajectory management. All sales processes these days aim at converting “suspects” into “customers” through a series of steps. First you get mentioned in tech news articles and analyst briefs. Second, those who see those mentions go to your website for more information, which leads them to the third step—a request to talk to a salesperson. In-your-face marketing gets good ink, and Juniper got more coverage of its event than it’s gotten for anything else in years.To read this article in full, please click here

A $1.9B FCC fund to replace banned 5G telco gear might be too little

The Federal Communications Commission has opened up a $1.9 billion fund to help smaller, rural US telcos replace the 5G and other gear in their networks that is made by China-based Huawei and ZTE, whose equipment has been banned since the telecom providers bought it.The Secure and Trusted Communications Networks Reimbursement Program will help service providers remove, replace, and dispose of the equipment, but it's not likely to cover all their costs. “It’s hard to say what the gap is, but what I’m hearing from the rural wireless carriers and the others impacted by this, it won’t be enough,” said IDC research manager Patrick Filkins.The fund is open only to carriers with 10 million or fewer subscribers, and that means mostly rural providers who were attracted to the Chinese companies at least in part because of their less expensive product lines.To read this article in full, please click here

ITRenew integrates Pluribus Networks software with its hyperscale servers

ITRenew, the reseller of slightly used hyperscalar servers, has partnered with Pluribus Networks to add Pluribus’s Netvisor ONE operating system and Adaptive Cloud Fabric controllerless SDN cloud networking software to its hardware.ITRenew resells servers it buys from hyperscalers like Amazon and Google that are retiring them, typically after a year or so. It refurbishes them, offers a warrantee, and sells them to enterprises for half the price of new hardware.ITRenew sells the servers under the Sesame brand, which will now include Pluribus’s open networking software with their hyperscale-grade compute, storage and networking infrastructure for a fully integrated hardware and software solution.To read this article in full, please click here

Cisco tool makes it easier to meld SD-WAN, security domains

Cisco has upgraded two of its core software programs to make it easier for enterprise customers to secure data-center and WAN-connected resources.https://www.networkworld.com/article/3599213/what-are-data-centers-how-they-work-and-how-they-are-changing-in-size-and-scope.htmlCisco has introduced what it calls Integrated Domain, which combines the domain controllers of Cisco DNA Center and Cisco SD-WAN vManage to tie together network connectivity between the two domains as well as ensuring security-policy consistency end-to-end, according to Justin Buchanan, Cisco director of product management, security policy and access.To read this article in full, please click here

10 limitations of MU-MIMO in Wi-Fi

Multi-user MIMO allows multiple Wi-Fi devices to simultaneously receive multiple data streams. For example, a wireless access point (AP) can send data to four different Wi-Fi devices at the same time. MU-MIMO can greatly increase the network's throughput and is a real asset for high density networks.MIMO – which stands for multiple input multiple output – technology has evolved over the years since the debut of the single-user mode (SU-MIMO), which was introduced more than a decade ago with the 802.11n wireless standard. Learn more about MU-MIMO and Wi-Fi 6To read this article in full, please click here

Kyndryl has spun off from IBM as a $19B managed service firm

Kyndryl, formerly IBM’s Managed Infrastructure Services unit, is officially an independent company.From the start the spinoff will be big, with more than 90,000 employees, $19 billion in annual revenue, operations in over 60 countries, and a customer base that includes 75% of the Fortune 100. Its goal of modernizing customer infrastructure will remain at the center of its strategy, but it wants to expand.[Get regularly scheduled insights by signing up for Network World newsletters.] Company executives say by spinning out of IBM, Kyndryl will have more freedom to partner with other major tech companies and cloud hyperscalers such as Google, AWS, and Microsoft. Plus it can invest in its workforce as well as focus on developing services for hot markets such as 5G, edge computing, cloud, and security.To read this article in full, please click here

Red Hat Enterprise Linux 9 drops in beta version

Red Hat Enterprise Linux version 9 released today as a beta, bringing about a dozen major new features focused on security and compliance, simplified management and automation. But the biggest news might be the lack of changes to the management and administration tools from the previous version, which could make adoption fairly painless.The key new management features include enhanced web-console performance metrics for easier diagnosis of problems, live kernel patching without the need for downtime, and an easier way to create new OS images.[Get regularly scheduled insights by signing up for Network World newsletters.] Many of those features make RHEL 9 better-suited to use in edge environments, according to IDC vice president Dave McCarthy, who noted that automation seemed to be a particularly important focus in the new version.To read this article in full, please click here

Cisco NaaS study: IT pros are interested but wary

As IT pros evaluate the role of network-as-a-service, they weigh the upsides of quicker access to new technologies and faster incident-response times against loss of control over security and potential disruptions caused by transitioning away from traditional networking, according to a new Cisco report.These are among the results from Cisco’s survey of 1,534 IT professionals in 13 countries as well as interviews with 20 IT leaders that are compiled in the company’s “2022 Global Networking Trends Report: The Rise of Network as a Service (NaaS)”To read this article in full, please click here

Using the cheat command on Fedora Linux

The term "cheat sheet" has long been used to refer to listings of commands with quick explanations and examples that help people get used to running them on the Linux command line and understanding their many options.Most Linux users have, at one time or another, relied on cheat sheets to get them started. There is, however, a tool called "cheat" that comes with a couple hundred cheat sheets and that installs quickly and easily on Fedora and likely many other Linux systems. Read on to see how the cheat command works.Finding installed packages on Fedora Linux systems First, to install cheat on Fedora, use a command like one of these:To read this article in full, please click here

1 33 34 35 36 37 406