Archive

Category Archives for "Networking"

Is the IoT in space about to take off?

Space may not be the final frontier for the Internet of Things, but evidence is mounting that it could be the technology’s next golden opportunity. While we’re still a ways away from the IoT in space becoming a commercially viable mainstream technology, a variety of companies are pushing the envelope in two significant ways.First, companies are working to realize the promise of satellite-powered networks that would bring the Internet of Things everywhere on earth. Second, vendors — and NASA — are exploring actual IoT applications and use cases beyond Earth’s atmosphere, in satellites and rockets.To read this article in full, please click here

Is the IoT in space about to take off?

Space may not be the final frontier for the Internet of Things, but evidence is mounting that it could be the technology’s next golden opportunity. While we’re still a ways away from the IoT in space becoming a commercially viable mainstream technology, a variety of companies are pushing the envelope in two significant ways.First, companies are working to realize the promise of satellite-powered networks that would bring the Internet of Things everywhere on earth. Second, vendors — and NASA — are exploring actual IoT applications and use cases beyond Earth’s atmosphere, in satellites and rockets.To read this article in full, please click here

Oracle Cloud Infrastructure Is Proud to Join the Internet Society

The Internet has become the world’s most powerful tool for commerce, communication, and innovation because of a commitment from its stakeholders to work collaboratively to make it highly performant and more secure.

At Oracle Cloud Infrastructure, we take that commitment to a better Internet seriously and want to align ourselves with other organizations that share a similar vision. That is why I am so proud to announce our partnership with the Internet Society, a global non-profit organization dedicated to the open development, evolution and use of the Internet.

I have spoken previously about how highly I regard the Internet Society’s new CEO, Andrew Sullivan, but my admiration for the work being done extends throughout the organization. This is why it is important to me that our relationship with the Internet Society is more than ceremonial. We want to roll up our sleeves and get to work because there is much work to be done.

One area we feel we can help is in security. The Internet is a trust-based network of networks and it’s consistently under attack by bad actors. We believe there is simply greater strength in the collaboration of the good guys and gals. Security is a Continue reading

Lenovo, Scale partner for hyperconverged edge servers

OEM Lenovo and hyperconverged infrastructure (HCI) platform developer Scale Computing have partnered to offer an out-of-the-box HCI platform specifically for edge computing deployments.Dubbed the Scale Computing HC3 Edge Platform on Lenovo Servers, the solution is an integration of Scale's HC3 software platform — what it calls “a data center in a box” — on Lenovo server hardware. HC3 brings together compute, storage, and virtualization into a comprehensive system with automated management.The Lenovo/Scale solution provides "edge infrastructure that has the capacity to run various IT and OT workloads, is space-conscious, and can be managed at each individual location by generalists," said Wilfredo Sotolongo, vice president and general manager of IoT for Lenovo's data center group, in a statement.To read this article in full, please click here

Lenovo, Scale partner for hyperconverged edge servers

OEM Lenovo and hyperconverged infrastructure (HCI) platform developer Scale Computing have partnered to offer an out-of-the-box HCI platform specifically for edge computing deployments.Dubbed the Scale Computing HC3 Edge Platform on Lenovo Servers, the solution is an integration of Scale's HC3 software platform — what it calls “a data center in a box” — on Lenovo server hardware. HC3 brings together compute, storage, and virtualization into a comprehensive system with automated management.The Lenovo/Scale solution provides "edge infrastructure that has the capacity to run various IT and OT workloads, is space-conscious, and can be managed at each individual location by generalists," said Wilfredo Sotolongo, vice president and general manager of IoT for Lenovo's data center group, in a statement.To read this article in full, please click here

BrandPost: How 802.11ax Improves the Experience for Everyone

The next advance in Wi-Fi, 802.11ax, is fast approaching. As we seek to raise the performance bar yet again for the sixth generation of Wi-Fi, the traditional techniques used in 802.11n and 802.11ac – wider RF channels, more MIMO antennas, higher QAM modulation – have been pushed almost to the limit, and it’s time to look for new ideas.802.11ax introduces techniques for ‘massive parallelism,’ especially OFDMA, multi-user MIMO, and ‘BSS coloring.’ All of these require the access point to make control decisions that have a significant effect on network performance, a new emphasis for Wi-Fi that will move access point networks closer to cellular base station infrastructure in terms of functionality.To read this article in full, please click here

The Easiest Way to go Faster is to go Faster

Why 400G Ethernet? In one sentence, because the easiest way to go faster is to go faster.
Over time, Ethernet speed transitions have been the primary driver for improving both the throughput and price-performance of datacenter networks. 400G Ethernet is the next major transition on this journey. While 100G Ethernet is still ramping up rapidly this year and next, it is projected that by the end of 2021 400G Ethernet will represent the majority of Ethernet bandwidth shipped.

The best enterprise level firewalls: Rating 10 top products

You know you need to protect your company from unauthorized or unwanted access. You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall.Recognizing that you need a firewall is the first – and most obvious -- step. The next crucial step in the decision-making process is determining which firewall features and policies best-suit your company’s needs.Today’s enterprise firewalls must be able to secure an increasingly complex network that includes traditional on-premises data center deployments, remote offices and a range of cloud environments. Then you have to implement and test the firewall once it's installed. Perhaps the only element more complex than configuring, testing and managing a next-generation firewall is the decision-making process regarding which product to trust with your enterprise security.To read this article in full, please click here(Insider Story)

The best enterprise level firewalls: Rating 10 top products

You know you need to protect your company from unauthorized or unwanted access. You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall.Recognizing that you need a firewall is the first – and most obvious -- step. The next crucial step in the decision-making process is determining which firewall features and policies best-suit your company’s needs.Today’s enterprise firewalls must be able to secure an increasingly complex network that includes traditional on-premises data center deployments, remote offices and a range of cloud environments. Then you have to implement and test the firewall once it's installed. Perhaps the only element more complex than configuring, testing and managing a next-generation firewall is the decision-making process regarding which product to trust with your enterprise security.To read this article in full, please click here(Insider Story)

The best enterprise level firewalls: Rating 10 top products

You know you need to protect your company from unauthorized or unwanted access. You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall.To read this article in full, please click here(Insider Story)

The best enterprise level firewalls: Rating 10 top products

You know you need to protect your company from unauthorized or unwanted access. You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall.To read this article in full, please click here(Insider Story)

Figuring Out AWS Networking

One of my friends reviewing the material of my AWS Networking webinar sent me this remark:

I'm always interested in hearing more about how AWS network works under the hood – it’s difficult to gain that knowledge.

As always, it’s almost impossible to find out the behind-the-scenes details, and whatever Amazon is telling you at their re:Invent conference should be taken with a truckload of salt… but it’s relatively easy to figure out a lot of things just by observing them and performing controlled experiments.

Read more ...