Archive

Category Archives for "Network World Wireless"

Protecting the IoT: 3 things you must include in an IoT security plan

With many IT projects, security is often an afterthought, but that approach puts the business at significant risk. The rise of IoT adds orders of magnitude more devices to a network, which creates many more entry points for threat actors to breach. A bigger problem is that many IoT devices are easier to hack than traditional IT devices, making them the endpoint of choice for the bad guys.IoT is widely deployed in a few industries, but it is in the early innings still for most businesses. For those just starting out, IT and security leaders should be laying out their security plans for their implementations now. However, the landscape of security is wide and confusing so how to secure an IoT deployment may not be obvious. Below are three things you must consider when creating an IoT security plan.To read this article in full, please click here

The big picture: Is IoT in the enterprise about making money or saving money?

Everyone knows the Internet of Things (IoT) is a transformative technology for consumers, vendors, and enterprises that’s in the process of becoming a historically huge market—measured in trillions, not billions, of dollars. That’s great, and most likely true, but perhaps a little vague in some respects. For example: What, exactly, do enterprises hope to gain from their investments in the IoT? Are they planning to use the IoT to save money on things they’re already doing, or do they see the technology as a way to create new businesses and boost revenue?To read this article in full, please click here

How to move to a disruptive network technology with minimal disruption

Disruptive network technologies are great—at least until they threaten to disrupt essential everyday network services and activities. That's when it's time to consider how innovations such as SDN, SD-WAN, intent-based networking (IBN) and network functions virtualization (NFV) can be transitioned into place without losing a beat.To read this article in full, please click here

How to adopt a disruptive network technology with minimal disruption

Disruptive network technologies are great—at least until they threaten to disrupt essential everyday network services and activities. That's when it's time to consider how innovations such as SDN, SD-WAN, intent-based networking (IBN) and network functions virtualization (NFV) can be transitioned into place without losing a beat.To read this article in full, please click here

Google on-premises Kubernetes solution enters beta

Google this week announced the beta version of its Cloud Services Platform, an on-premises software product that allows enterprises to deploy Google’s Kubernetes Engine inside their own data centers.Google announced CSP last July at its Cloud Next conference. Enterprises can build an in-house duplicate of Google’s cloud service to deploy Kubernetes containers to build, test, and deploy, and then move parts or all of it to the public Google cloud, all while managing it with centralized software.To read this article in full, please click here

Arm introduces Neoverse high-performance CPUs for servers, 5G

There have been some interesting developments in the Arm-as-a-server processor field, from Cavium’s success to Amazon offering much cheaper instances on its home-brew Arm processors. But now Arm Holdings itself is getting into the fray, and it's offering is a whopper.Last October, Arm announced the Neoverse platform designed specifically for cloud computing and edge network environments. This week it revealed the Neoverse N1 and E1 platforms, and they are impressive. Usually when Intel and AMD introduce new server chips, they are basically the same chips with faster clocks and more cores. But these two chips are very different in design and meant for different use cases.To read this article in full, please click here

Power over Wi-Fi: The end of IoT-sensor batteries?

Harnessing energy inherent in Wi-Fi or Bluetooth radio waves to power remote, wireless, Internet of Things (IoT) sensors — and also communicate with the devices at the same time — is a big-ticket item on IoT want-lists. Advantages include no batteries, thus reducing costs, size and weight.The key to achieving it functionally, some scientists say, is in converting AC waveforms to DC voltage, combined with the use of new materials. Researchers at Massachusetts Institute of Technology, along with some collaborators, say they’ve made a breakthrough in this area. Interestingly, it also includes scaling potential.To read this article in full, please click here

How managed network services are evolving to simplify the global WAN

Fundamentally, the way that carriers (i.e. telcos) deliver managed network services hasn’t changed in decades. The core architecture of this network, known as hub and spoke, consists of branches talking to the data center over a managed network with a separate firewall in the middle. However, this type of legacy WAN can’t support today’s business needs, which include a seminal shift to the cloud, as well as mobile users that need network access from anywhere, not just from the branch.Yishay Yovel, vice president of market strategy at Cato Networks, has followed the carriers’ dilemma for years. According to Yovel, there are numerous catalysts to this evolutionary change in the managed network services market.To read this article in full, please click here

VMware’s ongoing reinvention

VMware’s introduction of x86 server-virtualization technology was a game-changing event in the history of enterprise computing. But if you look at VMware’s corporate messaging today, it’s almost as if server virtualization has been scrubbed from the lexicon. Instead, VMware highlights its multi-cloud strategies, software-defined data centers, networking, hyperconverged infrastructures, security, SD-WAN, containers, blockchain, IoT and more.To read this article in full, please click here

IBM marries on-premises, private- and public-cloud data

IBM has taken the wraps off of a new multi-cloud integration platform it hopes will help customers manage, secure and integrate data no matter where it resides – in on-premise, private-cloud or public-cloud applications.Enterprise customers are faced with the daunting task of bridging legacy applications with latest cloud service, and many can’t just lift and shift, said Juan Carlos Soto, IBM vice president of Hybrid Cloud Integration. On top of that many businesses are already trying to manage five or more cloud environments, often from multiple vendors, and they can’t keep up, he said.To read this article in full, please click here

That VPN may not be as secure as you think

If you’re a VPN subscriber and have ever wondered just how secure the supposedly encrypted pipe that you’re using through the internet is — and whether the anonymity promise made by the VPN provider is indeed protecting your privacy— well, your hunches may be correct. It turns out several of these connections are not secure.Academics say they’ve discovered a whopping 13 programming errors in 61 separate VPN systems tested recently. The configuration bungles “allowed Internet traffic to travel outside the encrypted connection,” the researchers say.The independent research group, made up of computer scientists from UC San Diego, UC Berkeley, University of Illinois at Chicago, and Spain’s Madrid Institute of Advanced Studies (IMDEA) with International Computer Science Institute, write in the Conversation this month, some of which is redistributed by Homeland Security Newswire, that six of 200 VPN services also scandalously monitored user traffic. That’s more serious than unintended leaks, the team explains — users trust providers not to snoop. The point of a VPN is to be private and not get monitored. VPN use ranges from companies protecting commercial secrets on public Wi-Fi to dissidents.To read this article in full, please click here

Sitting in the Linux Cockpit

If you haven't tried the relatively new Linux Cockpit, you might be surprised by all it can do. It's a user-friendly web-based console that provides some very easy ways to administer Linux systems — through the web. You can monitor system resources, add or remove accounts, monitor system usage, shut down the system and perform quite a few other tasks — all through a very accessible web connection. It's also very easy to set up and use.While many Linux sysadmins spend most of their time on the command line, access to a remote system using a tool like PuTTY doesn't always provide the most useful command output. Linux Cockpit provides graphs and easy-to-use forms for viewing performance measures and making changes to your systems.To read this article in full, please click here

Sitting in the Linux cockpit

If you haven't tried the relatively new Linux Cockpit, you might be surprised by all it can do. It's a user-friendly web-based console that provides some very easy ways to administer Linux systems — through the web. You can monitor system resources, add or remove accounts, monitor system usage, shut down the system and perform quite a few other tasks — all through a very accessible web connection. It's also very easy to set up and use.While many Linux sysadmins spend most of their time on the command line, access to a remote system using a tool like PuTTY doesn't always provide the most useful command output. Linux Cockpit provides graphs and easy-to-use forms for viewing performance measures and making changes to your systems.To read this article in full, please click here

Lentiq combines data lakes with edge computing

It’s a common tactic to combine two technologies for synergy sake, but Lentiq really has a unique idea. It is combining the concept of the data lake with edge computing into what it calls “interconnected micro data lakes,” or data pools.“Data pools” are micro-data lakes that function like a data lake while supporting popular apps such as Apache Spark, Apache Kafka, and Streamsets software, or “everything a data scientist or data engineer needs,” according to the company.The data pools exist independently across different clouds, and governance rules are enforced only when the data moves, so each department will have the tools needed for their use cases and access to the data they need.To read this article in full, please click here

The long, slow death of commercial Unix

In the 1990s and well into the 2000s, if you had mission-critical applications that required zero downtime, resiliency, failover and high performance, but didn’t want a mainframe, Unix was your go-to solution.If your database, ERP, HR, payroll, accounting, and other line-of-business apps weren’t run on a mainframe, chances are they ran on Unix systems from four dominant vendors: Sun Microsystems, HP, IBM and SGI. Each had its own flavor of Unix and its own custom RISC processor. Servers running an x86 chip were at best used for file and print or maybe low-end departmental servers. Learn more about UnixTo read this article in full, please click here

BrandPost: Top Ten Reasons to Think Outside the Router #4: Broadband is Used Only for Failover

Continuing our homage to the iconic David Letterman Top Ten List from his former Late Show, Silver Peak is counting down the Top Ten Reasons to Think Outside the Router. Click for the #5, #6, #7, #8, #9 and #10 reasons to replace conventional branch routers with a business-driven SD-WAN platform.To read this article in full, please click here

Software-defined connectivity planned for colocation data centers

Gartner predicts that by 2025, 80 percent of enterprises will migrate entirely away from their on-premises data centers. Instead they’ll follow the current trend of moving workloads to colocation, hosting and the cloud, leading them to shut down their traditional data centers.I’m sure that colocation centers look forward to the growth in business, but the growth also means the colocation data centers need to become more agile, scalable, and flexible. This is absolutely critical to their business model viability, but the challenge to get there is greater than ever.[ Also read: How to plan a software-defined data-center network and Efficient container use requires data-center software networking ] Colocation providers have long benefitted from offering cross-connect and IT services, as well as Layer 2 WAN connectivity. However, these traditional offerings really aren't meeting the emerging demands from enterprise tenants who want more integrated, more secure and more automated networking solutions. As workloads move across different environments, such as SaaS and public clouds, there are management and operational challenges for colocation providers who are now being asked to support a more diverse portfolio of connectivity solutions.To read this article in full, please click here

Coming soon: On-premises 5G gear for enterprises

With all major mobile carriers expected to offer 5G this year, enterprises that want to take advantage of this next-gen mobile data service need to start thinking about how to support it on site.Anticipation is keen for 5G, given that it promises to deliver faster speeds and lower latency than the current premium wireless technology, 4G LTE. Ideally, 5G networks could deliver fast internet to areas of the country where wired broadband is unavailable, and more reliable connections to a variety of devices including not only computers and smartphones but also appliances, automobiles and security systems. But to use these services as a WAN option, businesses need hardware that can connect it to their existing wired and wireless LANs.To read this article in full, please click here

1 72 73 74 75 76 406