5G can make for cost-effective private backhaul

Equipment vendors and carriers have talked a great game about 5G's promise. Its ability to handle the high-density wireless environments created by IoT deployments and provide gigabit speeds to smartphones has been trumpeted from the rooftops. 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling CBRS can bring private 5G to enterprises But it's important to realize that the most eye-catching capabilities of 5G technology aren't here yet, as many of them depend on the 5G New Radio (NR) technology operating at high, millimeter-wave frequencies, which isn't yet widely available. Nor are the vast majority of endpoints currently on the market able to communicate on those sorts of networks.To read this article in full, please click here

IBM Brings An Architecture Gun To A Chip Knife Fight

For the past several years here at The Next Platform, as we have been pondering what IBM might do with the future Power10 processor, we have been feinting here and there with our analytical pen, trying to suss out precisely what Big Blue might be up to, particularly with the unique memory architecture that it has been working on for more than a decade.

IBM Brings An Architecture Gun To A Chip Knife Fight was written by Timothy Prickett Morgan at The Next Platform.

COVID-19: Weekly health check of ISPs, cloud providers and conferencing services

As COVID-19 continues to spread, forcing employees to work from home, the services of ISPs, cloud providers and conferencing services a.k.a. unified communications as a service (UCaaS) providers are experiencing increased traffic.ThousandEyes is monitoring how these increases affect outages and the performance challenges these providers undergo. It will provide Network World a roundup of interesting events of the week in the delivery of these services, and Network World will provide a summary here. Stop back next week for another update, and see more details here.To read this article in full, please click here

History of Networking: An African Perspective of the Internet

Dawit Bekele began his journey with the Internet while at college—but on returning to Africa, he discovered there was very little connectivity. While he was not involved in the initial stages of engineering the Internet in Africa, he began as an early user and proponent of connecting his home continent, and is now part of the Internet Society, helping to grow connectivity.

download

VMware cloud-management suite features Kubernetes, automation upgrades

VMware this week bolstered the on-premise and service-monitoring capabilities of its core cloud-management software with improved automation, Kubernetes and troubleshooting features.The features come in a new release of VMware’s vRealize Suite which is the company’s wide-ranging package of tools for helping customers manage virtual infrastructure and applications. Its features include artificial intelligence, machine learning, and DevOps tools such as Infrastructure as Code to provision, orchestrate, optimize and govern hybrid-cloud environments.[Get regularly scheduled insights by signing up for Network World newsletters.] “The overarching idea of vRealize is to help customers centrally control and govern cloud resources whether they be private, hybrid or SAAS and mitigate the risk of those rapidly growing virtual workloads,” said Ken Lee  senior director of product marketing for VMware. To read this article in full, please click here

How open networking can make supply chains more resilient

Supply chains are fragile things. They’re a web of suppliers and distributors, of storage and shipping facilities, and of resellers, all working at just the right speeds and with just the right margin of error to keep things flowing smoothly. But any fragile system is inevitably vulnerable to world events.

With the increasing requirement to support remote work, a robust, adaptable network is a business necessity. But it can be a challenge to source the networking equipment you need when global trade is disrupted. Open networking—where you’re not locked into specific network components—gives you many supplier and platform options to choose from, increasing your flexibility to deal with sudden and substantial change.

The lean supply chain

Lean manufacturing has become a common business practice. An IndustryWeek survey in 2016 ranked lean manufacturing systems as one of the most important technological advancements (second only to quality management systems).

Lean companies prioritize efficiency and work to reduce waste. This often means that they don’t stockpile components or keep a large inventory of completed products, which keeps money from being tied up in excess goods or unused warehouse space.

Companies source parts and labor from across the globe in an effort to trim Continue reading

Knowledge Sharing and Meaningful Conversation at InterCommunity 2020: Securing Global Routing

Recently, five routing security experts shared how they’ve been working to protect the Internet from the most common routing threats – by implementing and promoting the actions called for in Mutually Agreed Norms for Routing Security, or MANRS. They were all participants in InterCommunity, which gives the Internet Society community a way to connect for meaningful conversations about the issues that matter most to the Internet.

Want to join the InterCommunity conversation? Become an Internet Society member today!

This session of InterCommunity, “Securing Global Routing,” set out to increase awareness of MANRS, share good routing practices, and encourage more network operators to take the MANRS actions to make the Internet more secure for us all.

The speakers shared their network operations and capacity building knowledge while more than 200 participants participated live in the informative conversation.

Special thanks to Melchior Aelmans of Juniper Networks who moderated the discussion skillfully!

Here’s what the panelists had to say:

Abdul Awal, Bangladesh National DataCentre
Awal spoke about his goals in building technical capacity around Resource Public Key Infrastructure (RPKI) and raising awareness of MANRS principles in South Asia. He also discussed how we can help networks validate their routing Continue reading

The CloudVision Journey

Traditional networking has been transformed by cloud-networking principles. These principles drive an open, software-first approach to efficient automation, granular telemetry, and proactive analytics that have simplified traditional network operations. At Arista, we align our product strategy to these cloud networking principles and build our products based on modern software approaches. One such approach is the network-wide state and inference-driven architecture to manage networks with CloudVision. Arista’s strategic approach to automation, analytics, and change control has made CloudVision one of the favorite choices in the menu for our enterprise customers.

The CloudVision Journey

Traditional networking has been transformed by cloud-networking principles. These principles drive an open, software-first approach to efficient automation, granular telemetry, and proactive analytics that have simplified traditional network operations. At Arista, we align our product strategy to these cloud networking principles and build our products based on modern software approaches. One such approach is the network-wide state and inference-driven architecture to manage networks with CloudVision. Arista’s strategic approach to automation, analytics, and change control has made CloudVision one of the favorite choices in the menu for our enterprise customers.

Managing process accounting on Linux

Process accounting is a method of recording and summarizing commands and processes. It's an option on Linux systems, but you have to enable it and use a particular command to view the details collected. This post covers the commands involved and offers some suggestions on making the views even more useful.To start, understand that process accounting is different than what you see when running the ps command. It shows details on commands that have completed –- not those that are currently running. It also shows a lot more details than you would see by looking at your users' command history files and keeps all the collected data in a single file on the system.To read this article in full, please click here

IBM details next-gen POWER10 processor

IBM on Monday took the wraps off its latest POWER RISC CPU family, optimized for enterprise hybrid-cloud computing and artificial intelligence (AI) inferencing, along with a number of other improvements.Power is the last of the Unix processors from the 1990s, when Sun Microsystems, HP, SGI, and IBM all had competing Unixes and RISC processors to go with them. Unix gave way to Linux and RISC gave way to x86, but IBM holds on.This is IBM's first 7-nanometer processor, and IBM claims it will deliver an up-to-three-times improvement in capacity and processor energy efficiency within the same power envelope as its POWER9 predecessor. The processor comes in a 15-core design (actually 16-cores but one is not used) and allows for single or dual chip models, so IBM can put two processors in the same form factor. Each core can have up to eight threads, and each socket supports up to 4TB of memory.To read this article in full, please click here