By: Nav Chander, Head of Service Provider SD-WAN/SASE Product Marketing at HPE Aruba Networking.
In this first of a three-part blog series on SD-WAN, SSE, and multi-cloud networking (MCN), where we will highlight how these three technology areas are analogous to three different musical instruments that can be played separately. However, when these three technologies are “synchronized,” much like a musical ensemble of the three instruments blends the music to create a perfect harmony and an enjoyable listening experience.
To read this article in full, please click here
//m.banksfrench.com/article/3705368/what-do-music-and-multi-cloud-networking-mcn-have-in-common.html tk.rss_allVersa is bolstering the AI security management features of its integrated Secure Access Service Edge (SASE) package to include improved malware detection for Advanced Threat Protection, network microsegmention and generative AI protection to help customers better detect and quickly mitigate threats to their networked service and applications.
The vendor supports AI in its integrated Versa SASE package that includes SD WAN, a next-generation and web application firewall, intrusion prevention, zero trust support and data loss prevention.
The reliability of services delivered by ISPs, cloud providers and conferencing services (such as unified communications-as-a-service) is critical for enterprise organizations. ThousandEyes monitors how providers are handling any performance challenges and provides Network World with a weekly roundup of interesting events that impact service delivery. Read on to see the latest analysis, and stop back next week for another update. Additional details available here.
Internet report for August 14-20
ThousandEyes reported 147 global network outage events across ISPs, cloud service provider networks, collaboration app networks and edge networks (including DNS, content delivery networks, and security as a service) during the week of August 14-20. That’s down 14% from 171 outage events the week prior. Specific to the U.S., outages increased from 59 to 62, up 5%. Here’s a breakdown by category:
The heavy buzz around all things AI got louder in the financial reports of networking vendors this quarter, even though AI hasn’t made a significant impact on most vendors’ financial performance and supply chain challenges remain a more immediate concern.
Vendors such as Cisco, Arista, Juniper, Extreme and HPE’s Aruba report that they are shipping more products, thanks to multi-month efforts that include significant product redesigns and relentless efforts by their supply-chain teams to address component shortages. But the situation is still challenging, and some enterprise customers still face order delays.
Companies trying to deploy generative AI today have a major problem. If they use a commercial platform like OpenAI, they have to send data up to the cloud, which may run afoul of compliance requirements and is expensive. If they download and run a model like Llama 2 locally, they need to know a lot about how to fine-tune it, how to set up vector databases to feed it live data, and how to operationalize it.
VMware's new partnership with Nvidia aims to solve these issues by offering a fully integrated, ready-to-go generative AI platform that companies can run on premises, in colocation facilities, or in private clouds. The platform will include Llama 2 or a choice of other large language models, as well as a vector database to feed up-to-date company information to the LLM.
Combining things to make them easier to manage and secure is a recurring theme at this week's VMware Explore conference in Las Vegas. To that end, VMware is announcing a single console for its SASE platform and edge stack to enable unified management of edge networking, security and compute infrastructure.
SASE – secure access service edge – is a way to provide security and networking to end users and manage it in the cloud. It's grown in popularity since the pandemic as employees were sent home to work and companies scrambled to figure out how to get them connected.
VMware customers that have both on-prem and cloud-based architecture can now manage networking and security for both in a single management console. Unveiled at this week's VMware Explore conference in Las Vegas, NSX+ is new cloud-managed service that’s geared for multicloud environments and is designed to enable consistent network and security operations, centralized security policy management, network and application visibility, and network detection and response.
This latest evolution of VMware's core networking package will be available to current NSX customers as an upgrade and to new customers as both a free trial and a paid offering effective today. By the end of the year, NSX+ will also extend to businesses running their cloud infrastructure natively in public clouds, says Rob Markovich, who leads product marketing for multicloud networking and network virtualization for VMware.
VMware announced a raft of improvements to its VMware Cloud platform at this week's VMware Explore conference in Las Vegas.
Previously, VMware's on-premises private cloud solution, VMware Cloud Foundation, and its public cloud offerings were managed separately. Now, enterprises will be able to manage all their cloud deployments from a single location. In addition, customers will see improved integrations with the major cloud providers as well as faster disaster and ransomware recovery.
Central management
"We're actually bringing together a lot of disparate solutions under a common framework, VMware Cloud," says Rick Walsworth, VMware's director of product marketing for the cloud infrastructure team.
The UK’s Competition and Markets Authority Monday approved the proposed $61 billion megamerger between Broadcom and VMware, saying that the deal would not substantially affect innovation or harm the ability of rivals to compete against the merged company.
While Broadcom said that it expects to receive all regulatory approvals necessary to close the deal VMware deal by the end of October, it acknowledged that it is still working with some authorities to obtain consent, and said in a filing with the US Securities Exchange Commission on Monday that it has agreed with VMware to extend the "Outside Date" for the deadline to conclude the deal. The new date was not immediately specified by Broadcom.
Bugs emerged earlier this month in Intel and AMD processors that affect both client and server processors over multiple generations. Fortunately, the bugs were found some time ago and researchers kept it quiet while fixes were developed.
Google researchers found the Intel bug known as Downfall (CVE-2022-40982) and reported it to Intel more than a year ago, so both parties had plenty of time to work things out. The Downfall bug exploits a flaw in the "Gather" instruction that affected Intel CPUs use to grab information from multiple places in a system's memory. A Google researcher created a proof-of-concept exploit that could steal encryption keys and other kinds of data from other users on a given server.
One of the first things Linux users need to learn is how to move around the Linux file system and, eventually, how to make it even easier to move around the file system. This post describes both the basic commands you need and some smart moves to make navigating easier.
Absolute and relative paths
Before we get moving, it’s important to understand the difference between absolute paths (like /home/jdoe) and relative paths (like images/photos and ..). Absolute paths always begin with a / that, of course, represents the base of the file system. If the specified path doesn’t start with a /, it’s relative. Here are some examples of both relative and absolute paths:
You might have been alarmed to read recently that half of all network problems are due to human error. Well, bad news. That’s true of the number of problems. If you look at the hours of degraded or failed operation, three-quarters of all of it is due to human error. Furthermore, the great majority of degraded or failed operation can be traced to four specific activities:
- Fault analysis and response, which network professionals and their management say creates 36% of error-induced outage time
- Configuration changes (attributed to 27% of error-induced outage time)
- Scaling and failover tasks (attributed to 19% of error-induced outage time)
- Security policies (attributed to 18% of error-induced outage time)
Not surprisingly, network professionals are eager to find remedies for each of the four primary culprits. Before that can happen, it’s important to understand why the human error occurs.
If you’re looking to add more certifications to your resume, don’t forget about wireless. Whether you’re just starting your IT career, have been in IT before Wi-Fi was a thing, or even if you have a non-IT position, there are certifications to help prove your wireless knowledge and skills.
For starters, there are vendor-neutral certifications from Certified Wireless Network Professionals (CWNP), one of the most popular programs in the wireless world. These are great if you aren’t already loyal to a networking brand. And even if you already have a favorite brand, these go deeper into the 802.11 standards and radio frequency (RF) technology without all the proprietary details and brand specifics.
The Linux more command is a fairly obvious command to use when you want to scan through a text file a screen at a time, but there still might be quite a few things you don’t know about this command. For one thing, you don’t have to start at the top of the file if you don’t want to. Add an argument like +20 and you will start with the 20th line in the file with a command like that shown below.
$ man +20 myfile
Note that the more command automatically adjusts itself to the number of lines in your terminal window. In addition, the last line displayed will not be a line from the file by default, but an indication of what percentage of the text has been displayed thus far – at least if there’s more text to follow. It will look like this:
Micron has introduced memory expansion modules that support the 2.0 generation of Compute Express Link (CXL) and come with up to 256GB of DRAM running over a PCIe x8 interface.
CXL is an open interconnect standard with wide industry support that is meant to be a connection between machines allowing for the direct sharing of contents of memory. It is built on top of PCI Express for coherent memory access between a CPU and a device, such as a hardware accelerator, or a CPU and memory.
PCIe is normally used in point-to-point communications, such as SSD to memory, while CXL will eventually support one-to-many communication. So far, CXL is capable of simple point-to-point communication only.
Networking giant Cisco’s final quarter of fiscal 2023 was a surprising success, as an easing of the supply chain crisis enabled the company to fulfill back orders and increase quarterly revenue by 16% year over year, reaching a total of $15.2 billion.
Cisco’s said that total software-related revenue was up 17% year on year, and revenue from software subscription services rose 20%. That’s part of what the company refers to as its business model transformation, as slack overall demand for collaboration technology resulting from the easing of the pandemic creates the need for Cisco to target new types of business.
Net income for the quarter jumped 41% year over year to $4 billion.
By: Gayle Levin, Senior Product Marketing Manager for Wireless at HPE Aruba Networking.
Whether we work from home every day or just occasionally, we’ve grown accustomed to blaming the network for poor performance. There’s an ethos of “we just have to deal with it because it’s part of working remotely.” But dealing with it day after day gets old. That’s why I’m so excited about the new HPE Aruba Networking Access Points, designed to make working from home more efficient. They’re designed to conveniently fit on the desktop and can be managed using HPE Aruba Networking Central’s capabilities. Central includes dashboards that provide WAN health insights, enabling IT to troubleshoot issues whether they are due to the corporate network, applications, or even public ISPs.
Data replication has stood the test of time, providing organizations with a reliable means of safeguarding critical information for decades. Replication creates redundant copies of vital data, ensuring its availability and resiliency in case of disasters or system failures. In this article, I will explore the intricacies of data replication, examining its fundamental components, types, and potential limitations.
Data replication starts with the selection of a source volume or filesystem that needs protection. This source volume might be a virtual disk, often referred to as a LUN (logical unit number), sourced from a storage array or volume manager. It may also take the form of a filesystem. Replication can occur either at the block level, a common practice due to its efficiency, or at the filesystem level, although the latter tends to be less favored for its relatively inferior performance.
Kneron has rolled out a new type of neural processing unit, the KL730, which integrates image signal processing and high energy efficiency for use in edge, security and automotive applications.
The San Diego-based chip designer, in an announcement Tuesday, said that the KL730 is powered by a quad-core ARM Cortex A55 CPU, along with its own-brand, fourth- generation neural processing unit, as well as a host of connectivity options, including SD, USB 2 and 3, and Ethernet. Its image processing technology also packs in the ability to read high-definition inputs at up to 8MP at 90 frames per second, hardware dewarping for full panoramic views, and several other image signal processing features.
As enterprise networks get more complex, so do the firewall deployments.
There are on-premises firewalls to manage, along with firewalls that are deployed in virtual machines and firewalls deployed in containers. There are firewalls for clouds and firewalls for data centers, firewalls for network perimeters, and firewalls for distributed offices. According to Gartner, by 2026, more than 60% of organizations will have more than one type of firewall deployment.
"A firewall used to be a box or a chasse with multiple cards," says Omdia analyst Fernando Montenegro. "Then we had a firewall in a virtual machine. And now we have a container form factor for a firewall because customers are deploying containers. And, oh, we need firewalls-as-a-service to support SASE."
The pandemic forced businesses to send employees home to work, but even in recovery, the workforce trend is going strong. Some remote work measures were considered a temporary fix, and now the hybrid work reality demands IT organizations reassess how they can deliver consistent support, service, and technology to employees wherever they decide to work.
“There have been a lot of conversations about return to work, but it’s not really happening,” said Shamus McGillicuddy, vice president of research at Enterprise Management Associates, during a recent webinar.
Linux shells like bash have a convenient way of remembering commands that you type, making it easy to run them again without having to retype them. Just use the history command (which is a bash built-in) and then use an exclamation point followed by the number shown in front of the command in the history command output that you want to rerun. Alternatively, you can back up to that command by pressing the up arrow key as many times as needed to reach that command and then press return. Don’t forget, though, that you can also set up commands you are likely to use often as aliases by adding a line like this to your ~/.bashrc file so that you don’t need to search for them in your command history. Here’s an example:
The latest quarterly report from Backblaze on hard drive reliability reveals a rise in failures among certain drives.
Backblaze is a pure storage provider; cloud storage is all they do, and they dig deep into the statistics of hard drive failure and share their data with the industry. The company currently has a massive inventory of 241,297 hard disk drives of varying capacities and from various brands. (In recent quarters, Backblaze has added SSD performance to its measurements, but SSDs are still early in their deployment lifecycle, so patterns over time have yet to fully emerge.)
ECL has announced what it says will be the world’s first modular, sustainable, off-grid data center that uses hydrogen as its primary power source, promising carbon neutral performance and 99.9999% uptime.
Modular data centers are designed to go together like building blocks, allowing companies to start small and grow as their capacity needs increase. The ECL data centers will come in 1 megawatt blocks.
ECL's data-center-as-a-service offering is geared primarily to mid-sized data center operators, as well as large companies with a mix of cloud and on-premises IT environments. It claims its data centers will have a total cost of ownership that's two-thirds of what a traditional colocation data center environment would cost when measured over five years.
Three of Red Hat’s chief enterprise Linux competitors are banding together to create an alternative to Red Hat-based software, after the company made changes to its terms of use earlier this summer, making it more difficult to access its source code.
Oracle, SUSE, and CIQ, in a joint statement issued Thursday, said that the new Open Enterprise Linux Association will “encourage the development” of Linux distributions compatible with Red Hat Enterprise Linux by providing free access to source code.
“With OpenELA, CIQ, Oracle and SUSE join forces with the open source community to ensure a stable and resilient future for both upstream and downstream communities to leverage Enterprise Linux,” said CIQ CEO Gregory Kurtzer, in the statement.
As it previewed in March, IBM is set to deliver an AI-infused, hybrid-cloud oriented version of its z/OS mainframe operating system.
Set for delivery on Sept. 29, z/OS 3.1, the operating system grows IBM’s AI portfolio to let customers securely deploy AI applications co-located with z/OS applications and data, as well as a variety of new features such as container extensions for Red Hat and Linux applications that better support hybrid cloud applications on the Big Iron.
In this release of the mainframe’s OS, AI support is implemented in a feature package called AI System Services for IBM z/OS version 1.1. that lets customers build an AI Framework that IBM says is designed to support initial and future intelligent z/OS management capabilities.
Cisco continued filling its shopping bag with various technology firms – this time saying it intended to acquire cloud native mobile core developer Working Group Two (WG2) for an undisclosed amount.
The WG2 buy is Cisco’s fifth since June and its nineth this year. WG2 is known for its mobile technology that helps public and private service providers and enterprise customers build secure and scalable mobile backbones.
The technology will become part of Cisco’s Mobility Services platform which offers a full-stack cloud-native converged core network and distributed edge support.
Introduced in February, the Mobility Service is designed to simplify how service providers build, manage, and deliver new mobile services globally at scale and supports a variety of technologies to bring 5G, edge, and cloud technologies, Cisco says.
Looking to solidify its position as the dominant global supplier of chips that support generative AI workoads, Nvidia announced new GPUs and servers as well as a range of new software offerings at the SIGGRAPH conference in Los Angeles this week.
On the hardware side, Nvidia announced a new line of servers, the OVX series. The server line is designed to use up to eight of the company’s L40S GPUs. The GPUs are based on the company's Ada Lovelace architecture, which succeeded Ampere as the microarchitecture in use in its main line graphics cards. Each L40S packs 48GB of memory and is designed with complex AI workloads in mind, boasting 1.45 petaflops of tensor processing power.