Archive

Category Archives for "Network World Wireless"

IDG Contributor Network: 4 ways data science services is helping businesses reach IoT goals, faster

Data scientists are an essential part of an IoT deployment. They fill a critical need to interpret data and provide valuable context around machine learning. However, as IoT initiatives expand and mature in a business, in-house data science resources can become thinly stretched. This creates a data pile-up that is a surefire way to set your deployment back.Hiring more data scientists is typically not an option either as there is a significant shortage in the market. Demand is only going up too: Gartner predicts that a shortage of data scientists will hinder 75% of organizations from reaching their full potential with IoT through 2020. Because hiring is difficult, time consuming and expensive, many organizations are turning to data science services to fill in resource gaps. Outsourcing data scientists has the dual benefit of helping keep IoT initiatives moving forward while freeing up internal resources to focus on other areas of the business.To read this article in full, please click here

BrandPost: 5G. More than just a wireless upgrade.

Ciena Brian Lavallée Senior Director of Portfolio Marketing with global responsibility for Ciena’s 5G, Packet, and Submarine networking solutions. 5G is the hottest topic in the wireless industry these days, but as Ciena’s Brian Lavallee explains, it means a massive upgrade to wireline network infrastructure as well. That’s why today Ciena has unveiled new capabilities to help network operators prepare for 5G.To read this article in full, please click here

Geeky ways to celebrate Friday the 13th

You're in luckWe've cobbled together a slew of things for the geeky among you to do on July 13 -- Friday the 13th that is. And we suggest you do it up because you won’t get another chance until Sept. 13, 2019.Don’t miss the day!Mobile apps exist solely for the purpose of reminding you when Friday the 13th is coming up. Pocketkai’s free iOS app will remind you of the one to three Friday the 13ths coming up each year for the next 50 years. The Bogeyman’s Android app will do likewise, for the next 10 Friday the 13ths.To read this article in full, please click here

OPAQ enables total network security from the cloud

Today’s threat landscape has led organizations to defend their networks with numerous point solutions, most of which are complex and require significant attention to operations and ongoing maintenance. While large enterprises often have sufficient skilled resources to support the security infrastructure, small- to medium-sized businesses sometimes struggle in this area.For the SMB market in particular, Network Security-as-a-Service is an attractive offering. It allows companies to get the very best security technology at an affordable price point while having someone else maintain the complex infrastructure.This has given rise to a genre of service provider that builds its own network backbone in the cloud and embeds network security as an integral service. More and more players are starting to offer this kind of service. They generally start with a global network backbone and software-defined wide-area networking (SD-WAN), add a full security stack, and connect to various cloud services from Amazon, Google, Microsoft, etc. Customers connect their data centers, branches, end users, and cloud apps to this network, and away they go. It’s networking, plus network security, all in one place, and all managed as a service.To read this article in full, please click here

IDG Contributor Network: Protecting iOS against the aLTEr attacks

Researchers from Ruhr-Universität Bochum & New York University Abu Dhabi have uncovered a new attack against devices using the Long-Term Evolution (LTE) network protocol. LTE, which is a form of 4G, is a mobile communications standard used by billions of devices and the largest cellular providers around the world.In other words, the attack can be used against you.The research team has named the attack “aLTEr” and it allows the attacker to intercept communications using a man-in-the-middle technique and redirect the victim to malicious websites using DNS spoofing.To read this article in full, please click here

The aftermath of the Gentoo GitHub hack

Gentoo GitHub hack: What happened? Late last month (June 28), the Gentoo GitHub repository was attacked after someone gained control of an admin account. All access to the repositories was soon removed from Gentoo developers. Repository and page content were altered. But within 10 minutes of the attacker gaining access, someone noticed something was going on, 7 minutes later a report was sent, and within 70 minutes the attack was over. Legitimate Gentoo developers were shut out for 5 days while the dust settled and repairs and analysis were completed.The attackers also attempted to add "rm -rf" commands to some repositories to cause user data to be recursively removed. As it turns out, this code was unlikely to be run because of technical precautions that were in place, but this wouldn't have been obvious to the attacker.To read this article in full, please click here

BrandPost: CTO Notes from the Road: 3 take-aways from customers in 6 countries across Asia Pacific

Ciena Anup Changaroth, of Ciena’s CTO Office in APAC, highlights a few insights from Ciena’s recent six-country roadshow he participated in across the Asia-Pacific region. Over the last couple of weeks, I have been on the road supporting our annual Ciena Drive Roadshows in Australia, New Zealand, South Korea, Japan, Vietnam and finishing up with Hong Kong. We had the opportunity to share Ciena’s Adaptive Network vision with both customers and partners, as well as an opportunity to discuss with them their top priorities, challenges and investment plans.To read this article in full, please click here

Most Enterprise of Things initiatives are a waste of money

The Internet of Things (IoT) has captured much attention recently as more devices like wearables, AR/VR headsets and sensor-based products make their way to market. But off-the-shelf consumer-oriented devices are not always what enterprises need. Rather, most companies need a more specialized approach than just deploying things all over the place.As a result, the more specialized Enterprise of Things (EoT) is becoming a significant part of nearly all companies' plans for the next three to five years. Indeed, we expect EoT to become a top 3 item on most organizations' strategic initiatives in the coming two to three years. EoT will partner with ongoing enterprise cloud and security initiatives as organizations look to transform how they do business and run more efficient and user-responsive operations. But research shows that for many companies currently deploying or planning deployments of EoT, it’s a waste of money.To read this article in full, please click here

IDG Contributor Network: 4 considerations when replacing managed WAN services with SD-WAN

The enterprise wide area networks are mission-critical resources for most enterprises. And when it came to managing and running the WAN, enterprises could choose between two distinct models: Do it Yourself (DIY) or managed WAN services. But with the evolution of SD-WANs, we’re seeing a new type of telco solution that merges elements of both capabilities.Traditional WAN management models With DIY, enterprise IT procures last-mile access at a location and deploys routers, WAN optimization, and network security appliances from several vendors. Continuous monitoring and management is done in house or via a managed service provider. In short, enterprise IT owns the complex task of maintaining, configuring and monitoring the WAN for availability and optimal performance.To read this article in full, please click here

IDG Contributor Network: Networking anomalies

Recently, I had the great opportunity to discuss network security over dinner with one of the world’s best security practitioners. I learned that keeping bad actors from eventually getting inside a network is nearly impossible. While we maintain our vigilance at our borders over time we should assume our network would be penetrated, so the key to preventing exfiltration (which generally follows) is to look for networking anomalies.Look for network uses that are abnormal, unusual, or different in some way from the norm. Techniques for doing this “hunting” are expensive to implement and hard to interpret with frequent false positives but are a necessary evil.To read this article in full, please click here

IDG Contributor Network: Solving for serverless: How do you manage something that’s not there?

Function-as-a-service (FaaS) technologies, including AWS Lambda, Azure Functions and IBM/Apache OpenWhisk, are experiencing mass adoption, even in private clouds, and it’s easy to see why. The promise of serverless is simple: developers and IT teams can stop worrying about their infrastructure, system software and network configuration altogether. There’s no need to load-balance, adjust resources for scale, monitor for network latency or CPU performance. Serverless computing can save you a lot of time, money and operational overhead, if you play your cards right.Say goodbye to the idle instance There’s also less waste with serverless computing. You only pay for infrastructure in the moment that code gets executed (or, each time a user processes a request). It’s the end of the server that just sits there. But with all these advantages, IT practitioners are also faced with an avalanche of complexity and new challenges.  To read this article in full, please click here

Q&A: Bill Hoffman of the Industrial Internet Consortium talks AI, IoT and more

Bill Hoffman, president of the Industrial Internet Consortium, has worked with artificial intelligence (AI) for decades. He's been with the IIC since its inception, and he worked with IIC executive director Richard Soley at various AI firms for years before that. Hoffman recently sat down with Network World's Jon Gold for a chat about IoT and the role of automation and AI.NWW: Is this what you guys expected to be working on 20-30 years ago?BF: For us it’s fascinating to see, three decades later, that the term AI actually has a good connotation. It’s funny, but a lot of the systems that we were involved with, which were primarily renamed “decision support systems” – for liability reasons, they didn’t want to call them “expert” systems – a lot of those are still functioning today. So it never really went away, it just went somewhat underground, and people said “OK, that works.”To read this article in full, please click here

IDG Contributor Network: A taxonomy of Intent-Based Networking (IBN)

You have probably heard all sorts of claims by various vendors and solutions that they are providing or supporting Intent-Based Networking (IBN), yet there is a wide range of capabilities that are all very confusing.One way to make sense of this is to apply a "maturity model" like the one used to classify the maturity level of RESTful web services implementations. The Richardson Maturity Model divides capabilities of RESTful web services into levels, starting from 0 and going up as the maturity of the implementation increases. Just like IBN, REST had received its fair share of hype. While the REST principles were clearly defined in Roy Fielding’s dissertation, in practice the REST label was attached to implementations with wildly varying levels of conformance to the original principles, starting from anything that had the words “HTTP” and “JSON” in it to full blown “hypermedia as the engine of application state.”To read this article in full, please click here

Backup vs. archive: Why it’s important to know the difference

If you want to make a backup person apoplectic, call an old backup an archive.It’s just shy of saying that data on a RAID array doesn’t need to be backed up. The good news is that the differences between backup and archive are quite stark and easy to understand.[ Check out AI boosts data-center availability, efficiency. Also learn what hyperconvergence is and whether you’re ready for hyperconverged storage. | For regularly scheduled insights sign up for Network World newsletters. ] What is backup? Backup is a copy of data created to restore said data in case of damage or loss. The original data is not deleted after a backup is made.To read this article in full, please click here

Qualcomm/Facebook gigabit Wi-Fi field trials to start in 2019

How should a company develop when its growth is dependent on availability of internet? Build out the internet is probably the answer. And that’s just what Facebook intends to do.The social network has just nabbed Qualcomm to help build its 2016-announced 60GHz urban Wi-Fi network, says Qualcomm. The chip maker recently announced that that the companies intend to start trials of the high-speed broadband solution sometime around mid-2019.“This terrestrial connectivity system aims to improve the speed, efficiency, and quality of internet connectivity around the world at only a fraction of the cost of fiber,” Qualcomm says in its release.To read this article in full, please click here

While no one was looking, California passed its own GDPR

The European Union’s General Data Protection Regulation (GDPR) is widely viewed as a massively expensive and burdensome privacy regulation that can be a major headache and pitfall for American firms doing business in Europe. Many firms, including Facebook, have sought ways around the law to avoid having to deal with the burden of compliance.Well, there is no weaseling out now. Last week, with no fanfare, California Governor Jerry Brown signed into law AB375, the California Consumer Privacy Act of 2018, the California equivalent of GDPR that mirrors the EU law in many ways.To read this article in full, please click here

BrandPost: The Growing Role of Network Teams in Security

Network and security are notoriously siloed. That’s understandable as network operations are primarily responsible for ensuring reliable service quality and compute capabilities to run the enterprise, while security is focused on setting up barriers against intruders and cleaning up systems that have been infected. But with the continuing rise in cybersecurity threats, it’s increasingly clear that it’s open season on corporate networks and breaking down the traditional wall separating network and security teams is essential to defending the enterprise.Each team has evolved with different skill sets and different missions: one is expected to facilitate access from anywhere, the other is charged with blocking access to anybody who isn’t authorized. They utilize different tools and may work in separate network operations and security operations centers.To read this article in full, please click here

Pulse Secure VPN enhanced to better support hybrid IT environments

The workplace is changing rapidly as employees embrace mobility, applications are in the cloud, and Internet of Things (IoT) devices are instrumented for continuous connectivity — and this is affecting how organizations must think about secure access. Regardless of the scenario, organizations want solutions that deliver better productivity for whomever (or whatever) is connecting, a consistent user experience, compliance with corporate policies and regulatory requirements, and strong end-to-end security.This is the playing field for Pulse Secure, a company that has built a broad portfolio of access products and services that are available as a unified platform. Pulse Secure has considered practically every use case and has built a range of solutions to solve the secure connectivity challenges that IT organizations face. The company claims to have more than 20,000 customers and a presence in 80 percent of global enterprises — maybe even yours.To read this article in full, please click here

1 88 89 90 91 92 406