Digital Realty Trust, one of the largest data center operators in the U.S., has agreed to acquire European data center provider Interxion for $8.4 billion. The deal will put DRT ahead of Equinix in terms of size and give the San Francisco company a massive move into Europe as well as the Middle East and AsiaThe deal is strategic and complementary. DRT has about 200 data centers, mostly in the U.S but with some foreign locations as well. Interxion is a major European player, with 53 data centers in 13 of the biggest European markets, including London, Paris, Frankfurt, and Amsterdam.
READ MORE: Gartner’s top 10 strategic technology trends for 2020To read this article in full, please click here
Intel is relaunching the Xeon E-2200 line, which it first introduced in May for workstations, as a low-end server processor for simpler tasks. The new chips are socket-compatible with the older E-2100 line so existing servers can be upgraded.Intel makes no bones about it, the Xeon E-2200 processors are for entry-level servers, coming in 4-core and 6-core designs as well as a new 8-core product capable of hitting 5.0 GHz with Intel’s Turbo Boost Technology 2.0.[Get regularly scheduled insights by signing up for Network World newsletters.]
The Xeon E-2288G and E-2278G CPUs are the new high-end models with eight cores and 16 threads, a boost over the six-core count of the E-2100. The E-2200 is meant for single-socket systems with a maximum memory capacity of 128GB.To read this article in full, please click here
The saying goes that China is the world’s factory. For many companies around the world, their products or components of their products are produced in mainland China. At the same time, China’s population of more than a billion people makes it one of the world’s largest consumer markets. Thus, for either production or sales, many companies want to do business in China and have established facilities there.On the networking front, this means that multinational companies need to extend their wide area network into China to support their large or rapidly growing operations—and that’s easier said than done.[Get regularly scheduled insights by signing up for Network World newsletters.]
Many organizations had done this using VPNs, but in early 2018, the Chinese government placed restrictions on IPsec traffic to basically block it from going in and out of the country. The Ministry of Industry and Information Technology (MIIT) said these restrictions are in accordance with the China Cross-border Data Telecommunications Industry Alliance (CDTIA), which was created to regulate cross-border data communication.To read this article in full, please click here
The saying goes that China is the world’s factory. For many companies around the world, their products or components of their products are produced in mainland China. At the same time, China’s population of more than a billion people makes it one of the world’s largest consumer markets. Thus, for either production or sales, many companies want to do business in China and have established facilities there.On the networking front, this means that multinational companies need to extend their wide area network into China to support their large or rapidly growing operations—and that’s easier said than done.[Get regularly scheduled insights by signing up for Network World newsletters.]
Many organizations had done this using VPNs, but in early 2018, the Chinese government placed restrictions on IPsec traffic to basically block it from going in and out of the country. The Ministry of Industry and Information Technology (MIIT) said these restrictions are in accordance with the China Cross-border Data Telecommunications Industry Alliance (CDTIA), which was created to regulate cross-border data communication.To read this article in full, please click here
The Universal Quest for Speed
Business innovation has always been key to the success of organizations, especially for those willing to adopt new solutions. From the first abacus and the invention of double entry bookkeeping to the introduction of the ticker tape to copy machine, technology has one thing in common – it has always enabled business to function faster and more efficiently, saving money and increasing productivity.Today’s digital innovation is no different. Applications and device functionality continue to accelerate business. And underlying those functions is the need for performance. Organizations literally spend trillions of dollars upgrading their networks and devices to generate more computing capacity to accommodate evolving business solutions. As a result, a single end user device today has more processing power, generates more data, and requires access to more digital resources than existed in the entire world just a handful of decades ago.To read this article in full, please click here
Micron Technology partnered with Intel back in 2015 to develop 3D XPoint, a new type of memory that has the storage capability of NAND flash but speed almost equal to DRAM. However, the two companies parted ways in 2018 before either of them could bring a product to market. They had completed the first generation, agreed to work on the second generation together, and decided to part after that and do their own thing for the third generation.Intel released its product under the Optane brand name. Now Micron is hitting the market with its own product under the QuantX brand. At its Insight 2019 show in San Francisco, Micron unveiled the X100, a new solid-state drive the company claims is the fastest in the world.To read this article in full, please click here
There’s no shortage of IT jobs out there, especially since new tech-companies launch each year. That means that a career in IT can be stable and even lucrative. However, you’ll need to earn an IT certification before you can enter the field, and vendor-neutral CompTIA certifications are some of the most sought-after because they’re so versatile. If a career in IT sounds interesting to you, you can prepare for the CompTIA certification exams with this $69 training bundle.To read this article in full, please click here
Women are exiting IT in droves, as companies struggle to hire and engage these valuable employees. The first step to change? Listening to what women want.(Insider Story)
The Internet of Things promises a transformative impact on a wide range of industries, but along with that promise comes an enormous new level of complexity for the network and those in charge of maintaining it. For the major mobile data carriers in the U.S., that fact suggests an opportunity.The core of the carriers’ appeal for IoT users is simplicity. Opting for Verizon or AT&T instead of in-house connectivity removes a huge amount of the work involved in pulling an IoT implementation together.[Get regularly scheduled insights by signing up for Network World newsletters.]
Operationally, it’s the same story. The carrier is handling the network management and security functionality, and everything involved in the connectivity piece is available through a centralized management console.To read this article in full, please click here
With the growing use of mobile devices and apps, edge computing,and IoT, the network architect role has become more complex and more important to the success of the enterprise.
The effective range of Wi-Fi, and other wireless communications used in Internet of Things networks could be increased significantly by adding wireless noise, say scientists.This counter-intuitive solution could extend the range of an off-the-shelf Wi-Fi radio by 73 yards, a group led by Brigham Young University says. Wireless noise, a disturbance in the signal, is usually unwanted.To read this article in full, please click here
There is a fundamental, but perhaps a logical evolution in the way networks are being built to handle hybrid cloud applications – resources are moving closer to the edge; data centers are becoming more distributed and cloud hyperscalers are building bigger backbones to handle that traffic.That is the overarching networking landscape laid out by Juniper’s CTO Bikash Koley in an interview this week ahead of the company’s NXTWORK 2019 customer event next month. To read this article in full, please click here
There is a fundamental, but perhaps a logical evolution in the way networks are being built to handle hybrid cloud applications – resources are moving closer to the edge; data centers are becoming more distributed and cloud hyperscalers are building bigger backbones to handle that traffic.That is the overarching networking landscape laid out by Juniper’s CTO Bikash Koley in an interview this week ahead of the company’s NXTWORK 2019 customer event next month. To read this article in full, please click here
The failure to back up data that is stored in a cloud block-storage service can be lost forever if not properly backed up. This article explains how object storage works very differently from block storage and how it offers better built-in protections.What is Object Storage?
Each cloud vendor offers an object storage service, and they include Amazon's Simple Storage Service (S3), Azure’s Blob Store, and Google’s Cloud Storage.Think of object storage systems like a file system with no hierarchical structure of directories and subdirectories. Where a file system uses a combination of a directory structure and file name to identify and locate a file, every object stored in an object storage system gets a unique identifier (UID) based on its content.To read this article in full, please click here
The WAN consists of network and security stacks, both of which have gone through several phases of evolution. Initially, we began with the router, introduced WAN optimization, and then edge SD-WAN. From the perspective of security, we have a number of firewall generations that lead to network security-as-a-service. In today’s scenario, we have advanced to another stage that is more suited to today’s environment. This stage is the convergence of network and security in the cloud.For some, the network and security trends have been thought of in terms of silos. However, the new market category of secure access service edge (SASE) challenges this ideology and recommends a converged cloud-delivered secure access service edge.To read this article in full, please click here
Data breaches are a nightmare for any company. The expenses for mitigation and the loss of trust from customers and clients can be devastating, even putting some companies out of business. That’s why it’s so important to put security at the very core of your enterprise; it shouldn’t be an afterthought. That’s where 1Password Business can help: it’s easy to implement, cost-effective, and can provide a measurable impact on security just days after roll out. 1Password Advanced Protection provides extensive monitoring tools, giving you — and not the malicious actors threatening your business — control of your security.To read this article in full, please click here
When investment bank Bear Stearns collapsed in 2008, there was nothing left of value to auction off except its data centers. JP Morgan bought the company's carcass for just $270 million but the only thing of value was Bear's NYC headquarters and two data centers.Since then there have been numerous sales of data centers under better conditions. There are even websites (Datacenters.com, Five 9s Digital) that list data centers for sale. You can buy an empty building, but in most cases, you get the equipment, too.To read this article in full, please click here
ORLANDO – The pace of technology change is accelerating rapidly, augmented by factors that IT pros need to study-up on, things they never had to deal with before like hyperautomation, multiexperience, and human augmentation that Gartner says will have a significant impact on enterprises."It's been 50 years since the first message was sent across what became the internet. In 50 years we've seen technology transform our enterprises, our relationships, and society itself,” said Val Sribar, senior research vice president at Gartner. “The next five years may bring as much change as those last 50."[Get regularly scheduled insights by signing up for Network World newsletters.]
Looking ahead just on year, Gartner created the “Top 10 Strategic Technology Trends for 2020,” which the consulting firm released at its IT Symposium/XPO 2019 here this week.To read this article in full, please click here
Cisco this week said it issued a software update to address a vulnerability in its Cisco REST API virtual service container for Cisco IOS XE software that scored a critical 10 out of 10 on the Common Vulnerability Scoring System (CVSS) system.With the vulnerability an attacker could submit malicious HTTP requests to the targeted device and if successful, obtain the token-id of an authenticated user. This token-id could be used to bypass authentication and execute privileged actions through the interface of the REST API virtual service container on the affected Cisco IOS XE device, the company said.To read this article in full, please click here