Network news, trend analysis, product testing and the industry’s most important blogs, all collected at the most popular network watering hole on the Internet.





2,4 položek/den

SUSE releases enterprise Linux for all major ARM processors

SUSE has released its enterprise Linux distribution, SUSE Linux Enterprise Server (SLES), for all major ARM server processors. It also announced the general availability of SUSE Manager Lifecycle. SUSE is on par with the other major enterprise Linux distributions — Red Hat and Ubuntu — in the x86 space, but it has lagged in its ARM support. It’s not like SLES for ARM is only now coming to marke...

Linux systems: Scraping up information about apt updates

When you use the apt command to install new packages or run routine upgrades on your Debian-based Linux system, you might wonder where information about your activities are being recorded. For one, your history file probably retains information on the commands that you use, though history files like ~/.bash_history will only keep the most recent commands that you've run — depending on your $HIS...

Huawei introduces AI-driven data center switch

Chinese telecom giant Huawei introduced a new data center switch powered by an artificial intelligence (AI) chip designed to improve performance and reduce latency to near zero. The new switch follows the announcement of a 64-core ARM server processor. The CloudEngine 16800 series of data center switches use AI to improve network operations and also provide an underlying network foundation for ...

Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

NordVPN promises a private and fast path through the public internet, with no logs, unmetered access for 6 simultaneous devices and access to 5,232 servers worldwide. They are currently running a promotion, but you'll have to use this link to find it. Its typical price has been discounted for 3 years of service -- a good deal at just $2.99 per month. See the $2.99/month NordVPN deal here . To r...

Hook Up Your Business with Award-Winning Video Conferencing For As Little As $19.99/mo

If you’re still using a business landline, you’re likely not doing much business in 2018. Video conferencing is as commonplace as sending an email, and remote team members are increasing by the minute, making internet-based communication systems essential for any rising company. So if you’re finally looking to get your office set up with a state-of-the-art communications system, look no further...

Quantum-embedded chips could secure IoT

Microprocessors that are unique to each Internet of Things (IoT) device is the way forward in the ongoing and tricky quest to secure the IoT, says Crypto Quantique . One idea is that by making each chip one of a kind and unclonable, an application would become almost impossible to hack. The U.K.-based startup says it has introduced “the world's most advanced security product for IoT devices.” T...

IoT for retailers: opportunities and challenges

The rise of the Internet of Things (IoT) is already having a profound impact on the world of retail, both online and in the brick-and-mortar world. But according to Darin Archer, chief marketing officer of ecommerce software vendor Elastic Path , we haven’t seen nothing yet. Via email, I asked Archer about the opportunities and challenges the IoT poses for retailers, and he offered some illumin...

Zipping files on Linux: the many variations and how to use them

Some of us have been zipping files on Unix and Linux systems for many decades — to save some disk space and package files together for archiving. Even so, there are some interesting variations on zipping that not all of us have tried. So, in this post, we’re going to look at standard zipping and unzipping as well as some other interesting zipping options. The basic zip command First, let’s look...

Edge gateways: Flexible, rugged IoT enablers

Edge gateways have emerged as architectural components that improve the performance of IoT networks, and vendors have stepped up with off-the-shelf devices flexible enough to meet the varying demands of individual deployments. To read this article in full, please click here (Insider Story)

IDG Contributor Network: Zero trust: The transition from legacy to cloud-native

Enterprises operating in the traditional monolithic environment may have strict organizational structures. As a result, the requirement for security may restrain them from transitioning to a hybrid or cloud-native application deployment model. In spite of the obvious difficulties, the majority of enterprises want to take advantage of cloud-native capabilities. Today, most entities are consideri...

Why is Intel without a CEO after seven months?

Seven months ago, Intel got a blessing not in disguise when its CEO, Brian Krzanich, was forced out amid a sexual impropriety scandal. Since then, there has been near radio silence and not a hint of who could take the captain’s chair of this $50 billion ship. It stands in stark contrast to the CEO search at Microsoft, where one outsider name after another came up in the press, only for the comp...

Coding, cloud skills are most in demand for network pros

As more companies build their businesses around software, network and data-center pros will also be looking toward software to optimize their skills. While software may not be the first thing to come to mind when dealing with data centers, IT industry watchers say experienced network and infrastructure professionals would be wise to up their code game. Popular technology trends such as public, ...

Cisco targets mobile enterprise apps with geolocation technology

Cisco is rolling out a cloud-based geolocation package it expects will help customers grow mobile location services and integrate data from those services into enterprise analytics and business applications. The package, called DNA Spaces, is comprised of Cisco’s Connected Mobile Experience (CMX) wireless suite and enterprise geolocation technology purchased from July Systems. Cisco CMX is a so...

ICANN housecleaning revokes old DNS security key

The Internet Corporation for Assigned Names and Numbers (ICANN) this week will do some important housecleaning from its successful, first-ever cryptographic key change performed last October. In October, ICANN rolled out a new, more secure root zone Key Signing Key -2017 (KSK-2017) , but the process wasn’t complete because the old key, KSK-2010 remained in the zone. On Jan. 10, ICANN will revok...

Top 10 IoT vulnerabilities

Security questions have dogged the Internet of Things (IoT) since before the name was invented. Everyone from vendors to enterprise users to consumers is concerned that their fancy new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices can be hacked and harnessed into giant botnets that threaten even properly secured networks. But wh...
© 2000-2019 ANNECA s.r.o., Klíšská 977/77, 400 01 Ústí nad Labem, Tel: +420 478571021, Email:, Twitter: @hreader