Archive

Category Archives for "Network World Wireless"

Private 5G/LTE growing more slowly than expected

Private 5G/LTE networks for the enterprise are becoming increasingly common, but a new forecast from tech analyst firm IDC has found that several headwinds exist for the technology, which could slow its adoption over the next 18 to 24 months.The report, authored by IDC research manager Patrick Filkins, predicted that private cellular networking infrastructure sales will grow from $2.4 billion in global revenue this year to $5.3 billion in 2027.The use cases for private cellular networks are numerous and varied, according to IDC, encompassing everything from wide-area applications like grid networks for utility systems and transport networks to local networks for manufacturing facilities or warehouses.To read this article in full, please click here

Networking, security initiatives dominate IT spending priorities

Network connectivity and security are key areas for IT investment as well as potential barriers to global success, according to new research.Nearly half of CIOs claim that establishing and managing connectivity in new markets is the single most critical factor when it comes to ensuring successful global expansion, according to Expereo, which surveyed 650 large enterprise and mid-market CIOs across Asia, Europe and North America for its research. In addition, 49% of CIOs report that their board views global connectivity as “a business-critical asset to growth.”To read this article in full, please click here

AI requirements exceed infrastructure capabilities for many IT teams, study finds

As adoption of artificial intelligence (AI) technology accelerates, IT organizations are concerned that their existing infrastructure isn’t powerful enough to keep up.AI hardware – especially training hardware – is becoming more and more power hungry, according to Equinix, which just released its 2023 Global Tech Trends Survey.The power draw from traditional racks in a data center is between 5 kW and 10 kW per rack. But, increasingly, newer generations of GPU-based racks are pushing power draws north of 30 kW per rack, and in some cases as high as 72 kW per rack, according to Kaladhar Voruganti, senior technologist at Equinix. “So, definitely, it's very hard to host this type of infrastructure in private data centers,” he said.To read this article in full, please click here

Recovery options: Copy-on write vs redirect-on-write snapshots

Snapshots are a very popular way to create virtual copies of an entire system in order to facilitate very quick (or even instant) recovery.  A properly designed snapshot-based recovery system can recover very large volumes in just minutes and can often do so to a point in time just minutes ago. In contrast, a typical restore of such size would likely take many hours and would typically lose at least a day’s worth of data.There are two distinct approaches when it comes to creating snapshots: copy-on-write and redirect-on-write. Let’s talk about the advantages and disadvantages associated with each method, as they will greatly determine the impact on system performance, and therefore your ability to keep snapshots for a long time.To read this article in full, please click here

BrandPost: Enable workplace transformation with SASE in four use cases

By: Gabriel Gomane, Sr Product Marketing Manager, HPE Aruba Networking.The advent of digital transformation has brought about a complete overhaul in the workplace and revolutionized the way we access applications. This transformation can be attributed to four pivotal factors: the emergence of hybrid working, the migration of business applications to the cloud, the rapid proliferation of IoT devices, and the growing concerns surrounding cybersecurity risks.To enable this transformation, organizations can deploy SASE and tailor their SASE journey to align with their specific security and business goals. They can start their SASE journey by securing remote workers with ZTNA or they can begin by addressing application performance issues in branches with SD-WAN. There are no right or wrong choices, but it’s rather a matter of prioritizing specific use cases.To read this article in full, please click here

Cisco to buy network-monitoring firm SamKnows for better last-mile visibility

Cisco again opened its checkbook this week and snatched up privately held broadband-network monitoring company SamKnows for an undisclosed amount.Founded in 2008, the London-based firm uses a global network of software agents located in everything from home systems to mobile devices and service provider netoworks to get a real-time measurement of internet performance and customer experience. Through a central dashboard the  company can analyze the results and identify faults and the root cause of problems to help with remediation.SamKnows technology will be integrated into Cisco’s ThousandEyes cloud-based network intelligence software that analyzes everything from the performance of local and wide-area networks to ISP, cloud, and collaboration-application performance to the health of the internet.To read this article in full, please click here

Using PuTTY to connect to Linux

PuTTY is a great tool for connecting between systems of different types. In case you’re not familiar with the tool, the name has no connection to Silly Putty. Instead, the capitalization of the TTY part of the name suggests its connection with the acronym tty. It provides an easy way to log into a Linux system from Windows as well as many other systems.Say you want to log into your Linux system from a Windows system. This tool will allow you to set up a connection (IP address, host name, etc.) and control the size, colors and font to be used. This post explains how to set PuTTY up to optimize your view of the Linux command line. PuTTY was actually born on Windows to make this kind of connection possible.To read this article in full, please click here

Cato Networks launches AI-powered tracker for malware command and control

Cato Networks’ new deep learning algorithms are designed to identify malware command and control domains and block them more quickly than traditional systems based on domain reputation, thanks to extensive training on the company’s own data sets.Cato, a SASE provider based in Tel Aviv, announced the new algorithmic security system today. The system is predicated on the idea that domain reputation tracking is insufficient to quickly identify the command servers used to remotely control malware. That’s because most modern malware uses a domain generation algorithm (DGA) to rapidly generate pseudorandom domain names — which the deployed malware also has a copy of.To read this article in full, please click here

How IT pros can benefit from generative AI safely

The enterprise IT landscape is littered with supposedly paradigm-shifting technologies that failed to live up to the hype, and intil now, one could argue that AI fell into that category. But generative AI, which has taken the world by storm in the form of OpenAI’s ChatGPT chatbot, just might be the real deal.Chris Bedi, chief digital information officer at ServiceNow, says the release of ChatGPT last November was “an iPhone moment,” an event that captured the public’s attention in a way that “changed everything forever.” He predicts that generative AI will become embedded into the fabric of every enterprise, and he recommends that CIOs and other IT leaders should begin now to develop their generative AI strategies.To read this article in full, please click here

AMD to spend $135M on chip R&D in Ireland for AI, data center, mobile tech

AMD has unveiled plans to invest $135 million over the next four years in several strategic research and development projects in Ireland. To support its R&D efforts there, targeted at developing technology for data centers, networking, 6G infrastructure, and next generation AI, AMD said it will hire 290 engineers and researchers, in addition to a number of additional support roles.To read this article in full, please click here

Supply-chain constraints spike data-center outages

Shortages due to supply-chain problems has faded from the headlines, but they persist and are actually getting worse in some sectors.A report from AFCOM, an organization of data-center professionals, found that 44% of data-center operators surveyed had suffered downtime or an outage because they couldn’t get needed parts.In the report “State of the Data Center 202,” 94% of respondents said that they have had supply-chain issues of one kind or another. The most commonly cited items in short supply (59%) are basic IT equipment such as servers and switches, followed by power systems (51%) including generators and UPSes.But even acquiring security systems (34%) such as secure doors and cameras and building materials like concrete (35%) were an issue for many respondents.To read this article in full, please click here

Lenovo announces edge servers as part of $1 billion AI push

Lenovo is planning a major push into AI with a $1 billion investment in new hardware and software over the next three years. Its AI focus is not only on the data center, where a lot of the action is, but also on the edge. To that end, it announced two new edge servers specifically designed for AI processing.First up is the new ThinkEdge SE360 V2, an edge server designed to provide advanced computing performance for AI applications such as computer vision, voice AI, and generative AI. The ThinkEdge SE360 V2 is built on Intel and Nvidia processors with support for Nvidia's AI Enterprise software platform and Qualcomm's Cloud AI 100 platform for processing intense workloads at the data source. It features a compact size and ruggedized form factor designed to withstand remote and rugged environments.To read this article in full, please click here

Sharing, compressing and password-protecting files on Linux

Keeping your files private from anyone but those with superuser (root) access is easy on Linux. File permissions provide everything you need. By default, you'll have a username and primary group assigned to your account, and you can use the chmod (change mode) command to control what anyone else can view or change.(If permissions like "750" and "rwxr-x---" don't ring any bells for you, check out these posts for insights into how file permissions work on Linux: A deeper dive into Linux permissions and Unix: beyond group and everyone else)To read this article in full, please click here

Cato boasts 5Gbps encrypted tunnel throughput

Cato Networks said today that it has successfully created an encrypted tunnel capable of 5Gbps of throughput, offering reassurance to network administrators worried about traffic overhead created by Secure Access Service Edge (SASE) platforms.The company’s announcement said that increasing uptake of SASE, particularly by large enterprises, has created a need for faster encrypted connections that still support the full array of security technologies present in SASE. The speed boost, Cato said, was made possible by improved performance in the company’s Single Pass Processing Engine, which is the umbrella of services that runs in its various points of presence.To read this article in full, please click here

Using aliases on Linux

Using aliases on Linux systems can save you a lot of trouble and help you work faster and smarter. This post examines the ways and reasons that many Linux users take advantage of aliases, shows how to set them up and use them, and provides a number of examples of how they can help you get your tasks done with less trouble.What are aliases? Aliases are simply one-line commands that are assigned names and generally stored in a startup file (e.g., .bashrc) that is run when you log in using a tool like PuTTY or open a terminal window on your desktop. The syntax is easy. It follows this pattern:$ alias NAME = 'COMMAND' As a simple example, typing a command like that shown below enables you to clear your screen simply by typing “c”.To read this article in full, please click here

Network spending priorities for second-half 2023

OK, it’s not been a great first half for many companies, from end users to vendors and providers. The good news is that users sort of believe that many of the economic and political issues that have contributed to the problem have been at least held at bay.There’s still uncertainty in the tech world, but it's a bit less than before. Most of the companies I’ve talked with this year have stayed guardedly optimistic that things were going to improve. Over the last month, of the nearly 200 companies I’ve emailed with, only 21 were “pessimistic” about the outlook for their tech spending in the second half.Lack of pessimism doesn’t translate to optimism, though, and optimism is a bit non-specific for network and IT planners to build on. What are the user priorities for tech for the rest of the year? Do they think their budgets will shift, and if so from what to what? Are they looking to make major changes in their networks, change their vendors, be more or less open? I thought I knew some of the answers to these questions, but for some I was wrong.To read this article in full, please click here

Data center colocation provider Cyxtera files for bankruptcy

Colocation provider Cyxtera Technologies has filed for Chapter 11 bankruptcy after spending the last few months trying to find a buyer or reduce its debt load. The company will now attempt to restructure through bankruptcy or perhaps a suitor will come along to buy out the company.Meanwhile, the company says it will be business as usual for its customers, but with the reorganization that comes with Chapter 11, it’s hard to say whether that will last, according to Bill Kleyman, an independent consultant to data-center companies.To read this article in full, please click here

What is SDN and where is is going?

Software-defined networking (SDN) is a network management technique that centralizes control of network appliances in software. SDN makes network management easier in two ways: it allows networks to be administered as a whole, rather than on a device-by-device basis, and it allows for administrative work to be automated and conducted on the fly in response to changing network needs and conditions.The first SDN system to gain traction was the open source OpenFlow protocol, which rolled out in 2011. There are now a number of possible SDN models, each providing significant benefits when compared to traditional networking.To read this article in full, please click here

Cisco vision takes networking to the cloud in a big way

Cisco is taking the wraps off an overarching architecture it expects will let enterprise customers manage and control its vast arsenal of networking hardware and software for years to come.The Cisco Networking Cloud, unveiled at this week’s Cisco Live! customer event, will involve a broad range of software and cloud system integration and has as its ultimate, if somewhat vague, goal to converge networking platforms over time, culminating in a unified management platform that works on premises or cloud for improved visibility and enterprise automation, according to Jonathan Davidson, executive vice president and general manager of Cisco Networking.To read this article in full, please click here

Microsoft’s first cloud region in Italy launched in Lombardy

Microsoft is launching its first cloud region in Italy, the company said on Monday.The new region, which will have three data centers, will be located in Lombardy — an administrative area in Northern Italy whose capital is Milan.Enterprises will be able to start using the new region using Microsoft Azure or Microsoft 365 in the coming weeks, the company said, adding that other services such as Dynamics 365 and Power Platform are expected to follow soon.To read this article in full, please click here

1 4 5 6 7 8 406