



<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://search.yahoo.com/mrss/">
	<channel>
		<title>Network World</title>
		<link>https://www.networkworld.com</link>
		<description></description>
		<language>en-us</language>
		<pubDate>Wed, 20 Mar 2019 05:09:02 -0700</pubDate>
		<lastBuildDate>Wed, 20 Mar 2019 05:09:02 -0700</lastBuildDate>
		
			<image>
				<url>https://idge.staticworld.net/nww/networkworld510x510.png</url>
				<title>Network World</title>
				<link>www.networkworld.com</link>
				<width>510</width>
				<height>510</height>
			</image>
		
		
			<image>
				<url>https://idge.staticworld.net/nww/networkworld798x288.png</url>
				<title>Network World</title>
				<link>www.networkworld.com</link>
				<width>796</width>
				<height>288</height>
			</image>
		
		

	
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Network issues are causing more data-center outages</title>

		<pubDate>Wed, 20 Mar 2019 03:00:00 -0700</pubDate>

		
		
		
		<author>Ann Bednarz</author>
		<dc:creator>Ann Bednarz</dc:creator>
		

		
		
		<description><![CDATA[<p>Power failures are a common cause of <a href="https://www.networkworld.com/article/3223692/what-is-a-data-centerhow-its-changed-and-what-you-need-to-know.html">data-center</a> outages, but they’re not the only culprit. As enterprise computing environments grow more complex, IT system and network failures are bringing down data centers in greater numbers.<p class="jumpTag"><a href="/article/3373646/network-problems-responsible-for-more-data-center-outages.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.networkworld.com/article/3373646/network-problems-responsible-for-more-data-center-outages.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/03/data-center-network-outage-candle-100791402-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/03/data-center-network-outage-candle-100791402-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Data Center</category>
					
				
				
					
						<category>Networking</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Cisco spreads AI across Webex meetings </title>

		<pubDate>Tue, 19 Mar 2019 11:00:00 -0700</pubDate>

		
		
		
		<author>Michael Cooney</author>
		<dc:creator>Michael Cooney</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Cisco Webex has rolled out a package of AI-based features that brings together recently acquired technologies it says will make business meetings more efficient and intuitive.</p><p>The Webex conferencing tool enhancements, which include faster meeting startup, a better way to know the people attending a meeting and facial-recognition improvements will help customers more effectively collaborate from any location, the company said.</p><aside class="fakesidebar">
<p><strong>Read about SD-WAN</strong></p><ul>
<li><a href="https://www.networkworld.com/article/3323407/sd-wan/how-to-buy-sd-wan-technology-key-questions-to-consider-when-selecting-a-supplier.html"> How to buy SD-WAN technology: Key questions to consider when selecting a supplier </a></li>
<li><a href="https://www.networkworld.com/article/3328488/backup-systems-and-services/how-to-pick-an-off-site-data-backup-method.html"> How to pick an off-site data-backup method </a></li>
<li><a href="https://www.networkworld.com/article/3250664/lan-wan/sd-branch-what-it-is-and-why-youll-need-it.html"> SD-Branch: What it is and why you’ll need it </a></li>
<li><a href="https://www.networkworld.com/article/3285728/sd-wan/what-are-the-options-for-securing-sd-wan.html?nsdr=true"> What are the options for security SD-WAN? </a></li>
</ul>
</aside>
<p>Cisco bought Webex in 2007 for about $3.2 billion with an eye toward competing more effectively with Microsoft and other collaboration software vendors. Today Webex conferencing tools are used by over 130 million customers a month, Cisco says.</p><p class="jumpTag"><a href="/article/3373501/cisco-spreads-ai-across-webex-meetings.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3373501/cisco-spreads-ai-across-webex-meetings.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/08/collaboration_teamwork_team_meeting_hands_diversity-100769154-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/08/collaboration_teamwork_team_meeting_hands_diversity-100769154-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Software</category>
					
				
				
					
						<category>Data Center</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
			
				
			
		
		
	<item>

		<title>IDG Contributor Network: Software-defined perimeter: Identity-centric enforced network perimeter</title>

		<pubDate>Tue, 19 Mar 2019 10:06:00 -0700</pubDate>

		
		
		
		<author>Matt Conran</author>
		<dc:creator>Matt Conran</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>With the introduction of cloud, BYOD, IoT and virtual offices scattered around the globe, the traditional architectures not only hold us back in terms of productivity but also create security flaws that leave gaps for compromise.</p><p>The network and security architectures that are commonly deployed today are not fit for today's digital world. They were designed for another time, a time of the past. This could sound daunting...and it indeed is.</p><h2>What we had in the past?</h2>
<p>Traditionally, we have had a static network and security perimeter with clear network and security demarcation points. In terms of security, the perimeter-based approach never worked. It did, however, create a multi-billion-dollar industry. But the fact is, it neither did, not will it provide competent security.</p><p class="jumpTag"><a href="/article/3368506/software-defined-perimeter-identity-centric-enforced-network-perimeter.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3368506/software-defined-perimeter-identity-centric-enforced-network-perimeter.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/10/ipsecurity-protocols-network-security-vpn3-100775456-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/10/ipsecurity-protocols-network-security-vpn3-100775456-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Network Security</category>
					
				
				
					
						<category>VPN</category>
					
				
				
					
						<category>Networking</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: Deploying highly secure, easy to deploy and cost-effective Micro Data Centers</title>

		<pubDate>Tue, 19 Mar 2019 09:50:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Industry trends such as the Internet of Things (IoT) and content distribution networks (CDNs) are driving the need for edge computing. That’s because these solutions often require low latency, high bandwidth, greater reliability, and strong security.</p><p>It’s a tall order meant for Micro Data Centers (MDCs) to fulfill. An MDC is a self-contained data center architecture that offers complete IT infrastructure within a stand-alone, secure enclosure.</p><p>MDCs offer a number of key advantages beyond today’s server rooms and traditional data centers. First, because they’re distributed closer to bandwidth-intensive content, MDCs can significantly reduce latency and lower costs. Secondly, it’s easy and cost-effective to add data center capacity to them anywhere and anytime it is needed – in both IT room and non-climate-controlled environments. And because MDC IT equipment is pre-installed before shipment in a self-contained and secure enclosure, it can provide physical security and protection of critical business applications.</p><p class="jumpTag"><a href="/article/3373839/deploying-highly-secure-easy-to-deploy-and-cost-effective-micro-data-centers.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3373839/deploying-highly-secure-easy-to-deploy-and-cost-effective-micro-data-centers.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/03/istock-943067460-100791386-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/03/istock-943067460-100791386-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Internet of Things</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>DoE plans world&#039;s fastest supercomputer</title>

		<pubDate>Tue, 19 Mar 2019 06:39:00 -0700</pubDate>

		
		
		
		<author>Tim Greene</author>
		<dc:creator>Tim Greene</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>The U.S. Department of Energy says it is working on a supercomputer that will break the target of exaFLOP computation – a quintillion (10<sup>18</sup>)  floating-point computations per second – in order to handle high-performance computing and artificial intelligence.</p><p>Being built in conjunction with Intel and Cray Computing,  the Aurora supercomputer will  cost more than half a billion dollars and be turned over to Argonne National Laboratory in Chicago in 2021, according to a statement by the DoE. [Click <a href="https://www.networkworld.com/article/3236875/embargo-10-of-the-worlds-fastest-supercomputers.html">here</a> to see the current top 10 fastest supercomputers.]</p><p class="jumpTag"><a href="/article/3373539/doe-plans-worlds-fastest-supercomputer.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3373539/doe-plans-worlds-fastest-supercomputer.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/03/united_states_department_of_energy_rick_perry_aurora_announcement_2019_03_18_3x2_1200x800-100791348-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/03/united_states_department_of_energy_rick_perry_aurora_announcement_2019_03_18_3x2_1200x800-100791348-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Data Center</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>3 companies developing wearable tech for the enterprise</title>

		<pubDate>Tue, 19 Mar 2019 06:10:00 -0700</pubDate>

		
		
		
		<author>Fredric Paul</author>
		<dc:creator>Fredric Paul</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Earlier this month, I wrote that “even as smartwatch shipments continue to grow, <a href="https://www.networkworld.com/article/3356447/wearable-tech-in-the-enterprise-grows-but-few-workplace-uses-exist.html" rel="noopener" target="_blank">significant industrial and business use cases for these internet-connected devices have yet to appear</a>.”</p><p>And then a few days later, as if on cue, International Data Corporation (<a href="http://www.idc.com" rel="nofollow noopener" target="_blank">IDC</a>) put out a press release about the latest edition of the <a href="http://www.idc.com/tracker/showproductinfo.jsp?prod_id=962" rel="nofollow noopener" target="_blank">Worldwide Quarterly Wearable Device Tracker</a>. The release quoted <a href="http://www.idc.com/getdoc.jsp?containerId=PRF002081" rel="nofollow noopener" target="_blank">Ramon T. Llamas</a>, research director for IDC's <a href="http://www.idc.com/getdoc.jsp?containerId=IDC_P29207" rel="nofollow noopener" target="_blank">Wearables</a> team, saying, "Two major drivers for the wearables market are healthcare and enterprise adoption.”</p><p class="jumpTag"><a href="/article/3373877/3-companies-developing-wearable-tech-for-the-enterprise.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3373877/3-companies-developing-wearable-tech-for-the-enterprise.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/02/number-3-with-network-nodes_top-three-100750846-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/02/number-3-with-network-nodes_top-three-100750846-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Internet of Things</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: SD-WAN Without WAN Optimization is Like Peanut Butter Without Jelly</title>

		<pubDate>Mon, 18 Mar 2019 15:51:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<h3 class="body"><strong>SD-WAN vs. WAN Optimization</strong></h3>
<p>Optimization of applications and data traffic has been an integral part of the WAN since its inception. WAN optimization accelerates application traffic by overcoming latency and reducing the amount of data traversing the WAN by applying techniques like protocol acceleration, deduplication, compression, reduced latency and caching to dramatically increase the amount of available bandwidth.</p><p>Today, enterprises are rapidly adopting <a href="https://blog.silver-peak.com/sd-wan-vs-wan-optimization" rel="noopener nofollow" target="_blank">SD-WAN</a> as a preferred solution when rearchitecting their WANs. SD-WAN is transforming the way networks support enterprise applications, dramatically increasing application performance by intelligently controlling and more efficiently utilizing all available WAN transport resources.</p><p class="jumpTag"><a href="/article/3373497/sd-wan-without-wan-optimization-is-like-peanut-butter-without-jelly.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3373497/sd-wan-without-wan-optimization-is-like-peanut-butter-without-jelly.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/03/sd-wan-100791307-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/03/sd-wan-100791307-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Networking</category>
					
				
				
					
						<category>SD-WAN</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Exec: How SDN, SD-WAN, security fit in VMware&#039;s strategy</title>

		<pubDate>Fri, 15 Mar 2019 12:21:00 -0700</pubDate>

		
		
		
		<author>Michael Cooney</author>
		<dc:creator>Michael Cooney</dc:creator>
		

		
		
		<description><![CDATA[<p>It has been just 10 months since Tom Gillis became <a href="https://www.networkworld.com/article/3340259/vmware-s-transformation-takes-hold.html">VMware</a>'s senior vice president and general manager of its networking and security business, and in that time he has overseen <a href="https://www.networkworld.com/article/3340259/vmware-s-transformation-takes-hold.html">some major changes</a> in the company’s core products.<p class="jumpTag"><a href="/article/3367742/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.networkworld.com/article/3367742/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.techhive.com/images/article/2015/08/vmware-hq-photo-100611136-primary.idge.jpg" />
						<media:content url="https://images.techhive.com/images/article/2015/08/vmware-hq-photo-100611136-primary.idge.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Networking</category>
					
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Data Center</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>How did Facebook go down despite multiple data centers?</title>

		<pubDate>Thu, 14 Mar 2019 13:30:00 -0700</pubDate>

		
		
		
		<author>Andy Patrizio</author>
		<dc:creator>Andy Patrizio</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>The <a href="https://www.nytimes.com/2019/03/14/style/mercury-retrograde-facts.html" rel="nofollow">Mercury retrograde</a> kicked in big time on Wednesday as Facebook suffered an eight hour-outage that also affected Instagram and Facebook Messenger.</p><p>No one was believed to be harmed; a few might have even had offline interactions with other human beings.</p><aside class="fakesidebar">
<p><strong>Learn about backup and recovery:</strong></p><ul>
<li><a href="https://www.networkworld.com/article/3285652/storage/backup-vs-archive-why-its-important-to-know-the-difference.html"> Backup vs. archive: Why it’s important to know the difference </a></li>
<li><a href="https://www.networkworld.com/article/3328488/backup-systems-and-services/how-to-pick-an-off-site-data-backup-method.html"> How to pick an off-site data-backup method </a></li>
<li><a href="https://www.networkworld.com/article/3315156/storage/tape-vs-disk-storage-why-isnt-tape-dead-yet.html"> Tape vs. disk storage: Why isn’t tape dead yet? </a></li>
<li><a href="https://www.networkworld.com/article/3302804/storage/the-correct-levels-of-backup-save-time-bandwidth-space.html"> The correct levels of backup save time, bandwidth, space </a></li>
</ul>
</aside>
<p>Facebook said it wasn’t an attack, like a Denial of Service attack, and has since issued a statement attributing it to a configuration error.</p><p class="jumpTag"><a href="/article/3367559/how-did-facebook-go-down-despite-multiple-data-centers.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3367559/how-did-facebook-go-down-despite-multiple-data-centers.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/07/facebook_privacy_security_breach_wide_eye_user_by_pete_linforth_thedigitalartist_cc0_via_pixabay_1200x800-100765084-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/07/facebook_privacy_security_breach_wide_eye_user_by_pete_linforth_thedigitalartist_cc0_via_pixabay_1200x800-100765084-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Data Center</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: Micro Data Centers Evolve to Fit New Business Requirements of Edge Computing</title>

		<pubDate>Thu, 14 Mar 2019 06:49:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Recent breakthroughs in technology have expanded the possibilities for where data is gathered, processed, stored and analyzed. IT staffs and their business counterparts now have the flexibility of deciding whether their applications are more efficient residing in the cloud, within a traditional data center, or on the network edge. In fact, for the first time, the nature of the applications themselves is determining where they best should run. Over the last several months, <a href="https://www.apc.com/us/en/solutions/business-solutions/micro-data-centers.jsp" rel="nofollow">micro data centers</a> have emerged as a technology of choice for helping to manage the growing computing needs across edge environments.</p><p class="jumpTag"><a href="/article/3365178/micro-data-centers-evolve-to-fit-new-business-requirements-of-edge-computing.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3365178/micro-data-centers-evolve-to-fit-new-business-requirements-of-edge-computing.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/03/data-center-new-age-edge-small-100790892-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/03/data-center-new-age-edge-small-100790892-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Internet of Things</category>
					
				
				
					
						<category>Data Center</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: What’s the Difference between OFDMA and MU-MIMO in 11ax?</title>

		<pubDate>Wed, 13 Mar 2019 12:53:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>The IEEE's latest standard, 802.11ax, has been designed inside and out for high efficiency. Also known as Wi-Fi 6, 11ax promises real-world performance improvements that will keep today’s mobile users and IoT devices connected and happy. To achieve that, over 50 features have been proposed as part of the 11ax standard. Once adopted into the standard, they will be rolled out to the market in phases – Wave 1 and Wave 2, just like with 802.11ac.</p><p>Multi-user Multiple-Input, Multiple-Output (MU-MIMO) and Orthogonal Frequency-Division Multiple Access (OFDMA) are two of the most significant technical enhancements in 11ax. Both MU-MIMO and OFDMA are multiuser technologies that enable simultaneous bidirectional communication between an access point (AP) and end users. So how are they different?</p><p class="jumpTag"><a href="/article/3366216/what-s-the-difference-between-ofdma-and-mu-mimo-in-11ax.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3366216/what-s-the-difference-between-ofdma-and-mu-mimo-in-11ax.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/03/istock-918035570-100790902-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/03/istock-918035570-100790902-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Internet</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: The First SD-WAN ‘App Store’</title>

		<pubDate>Wed, 13 Mar 2019 11:46:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>The incredible power and automation offered by today’s more advanced <a href="https://www.silver-peak.com/sd-wan/sd-wan-explained" rel="noopener noreferrer nofollow" target="_blank" aria-label=" (opens in a new tab)">SD-WAN</a> platforms is transforming how enterprises are building and managing their networks. Operations that were once massive resource-intensive projects for network teams, have now been reduced to mere minutes of work. Need to change how an application operates across 1000+ locations, modify QoS settings across every site in your network or enforce a common security policy simply? Just point and click.</p><p>What’s been missing from this incredible transformation is how the power of automation can be extended to ecosystem partners. Today is the day we’re going to change all of that.</p><p class="jumpTag"><a href="/article/3365138/the-first-sd-wan-app-store.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3365138/the-first-sd-wan-app-store.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/03/istock-538801788-100790853-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/03/istock-538801788-100790853-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>IT Leadership</category>
					
				
				
					
						<category>SD-WAN</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>The noise in fiber could be used to increase data capacity</title>

		<pubDate>Wed, 13 Mar 2019 10:59:00 -0700</pubDate>

		
		
		
		<author>Patrick Nelson</author>
		<dc:creator>Patrick Nelson</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Increasing the capacity of fiber-optic cables might one day be possible through the exploitation of a part of the signal commonly thought of as substandard. That imperfect element in a carrier, called “noise” is usually something one tries to avoid—it can muddy the accurate reading of the data.</p><p>However, scientists now suggest that one could, in fact, embrace the rubbishy, and thus far unusable, part of the signal to hold data and allow it to be decoded. The ordinarily data-obscuring hubbub could potentially be harnessed and used to increase data capacity in light waves.</p><p>“Information is encoded in the correlated noise between spatially separated light waves,” <a href="https://www.ethz.ch/en/news-and-events/eth-news/news/2019/02/data-transfer-by-controlled-noise.html" rel="nofollow noopener" target="_blank">writes Oliver Morsch in an article on the website of ETH Zurich, a technical and scientific university</a>. “The new coding technology, developed by ETH researchers, makes it possible to make better use of the transmission capacity of optical fibers.”</p><p class="jumpTag"><a href="/article/3365241/the-noise-in-fiber-could-be-used-to-increase-data-capacity.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3365241/the-noise-in-fiber-could-be-used-to-increase-data-capacity.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.techhive.com/images/article/2017/03/fiber-optics-100713942-large.3x2.jpg" />
						<media:content url="https://images.techhive.com/images/article/2017/03/fiber-optics-100713942-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Data Center</category>
					
				
				
					
						<category>Networking</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>3 steps to take before deploying SD-WAN</title>

		<pubDate>Wed, 13 Mar 2019 03:00:00 -0700</pubDate>

		
		
		
		<author>Kevin DiLallo, Laura McDonald and Joe Schmidt</author>
		<dc:creator>Kevin DiLallo, Laura McDonald and Joe Schmidt</dc:creator>
		

		
		
		<description><![CDATA[<p>As enterprises develop network strategies and technical roadmaps, one hot technology that will be on their radar is <a href="https://www.networkworld.com/article/3031279/sd-wan-what-it-is-and-why-you-ll-use-it-one-day.html">SD-WAN</a>, a significant transformational solution in networking and a major change  from the <a href="https://www.networkworld.com/article/2297171/network-security-mpls-explained.html">MPLS</a> <em>status quo</em> that most enterprises have deployed.<p class="jumpTag"><a href="/article/3359446/3-steps-to-take-before-deploying-sd-wan.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.networkworld.com/article/3359446/3-steps-to-take-before-deploying-sd-wan.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.techhive.com/images/article/2016/11/negotiating-contracts-ts-100693043-large.3x2.jpg" />
						<media:content url="https://images.techhive.com/images/article/2016/11/negotiating-contracts-ts-100693043-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>WAN</category>
					
				
				
					
						<category>WAN Optimization</category>
					
				
				
					
						<category>Networking</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>Wearable tech in the enterprise grows, but few workplace uses exist</title>

		<pubDate>Tue, 12 Mar 2019 11:37:00 -0700</pubDate>

		
		
		
		<author>Fredric Paul</author>
		<dc:creator>Fredric Paul</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Take a glance at the wrists of your co-workers, and you’re likely to see more and more of them adorned with smartwatches, fitness trackers, and other wearable technology. In meetings, you increasingly see colleagues surreptitiously glancing at their tiny screens, hoping in vain that no one is noticing.</p><p>It isn’t just you. The latest smartwatch numbers all say that smartwatch shipments are growing fast, and the internet-connected devices are beginning to achieve mainstream acceptance: Last month, <a href="http://www.npd.com" rel="nofollow noopener" target="_blank">The NPD Group's</a> new <a href="https://www.npd.com/wps/portal/npd/us/news/press-releases/2019/us-smartwatch-sales-see-strong-gains-according-to-new-npd-report/" rel="nofollow noopener" target="_blank">Smartwatch Total Market Report</a> noted that smartwatch unit sales jumped 61 percent in 2018, while dollar volume rose 51 percent to approach $5 billion in sales. Some 16 percent of U.S. adults now own a smartwatch, the report said, up from 12 percent at the end of 2017.</p><p class="jumpTag"><a href="/article/3356447/wearable-tech-in-the-enterprise-grows-but-few-workplace-uses-exist.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3356447/wearable-tech-in-the-enterprise-grows-but-few-workplace-uses-exist.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/03/wearables-in-the-office_fitbit_smartwatch_tech-devices-mobile-100790742-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/03/wearables-in-the-office_fitbit_smartwatch_tech-devices-mobile-100790742-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Internet of Things</category>
					
				
				
					
						<category>Mobile</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: Simplifying Operations: Managing Edge Data Centers</title>

		<pubDate>Tue, 12 Mar 2019 08:31:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>IT professionals have been honing their data center management expertise for decades. However, migrating these best practices to an edge computing environment can be challenging.</p><p>That’s because many workers located in edge environments, such as retail store clerks, lack the necessary data center expertise to ensure edge sites are properly maintained. Complicating matters is the fact that edge data centers can be expensive and complex to run.</p><p>Clearly, organizations need a new way forward. Fortunately, cloud-based platforms are designed for the edge, and can simplify remote monitoring and management. Here’s what every business should look for in a solution:</p><p class="jumpTag"><a href="/article/3359191/simplifying-operations-managing-edge-data-centers.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3359191/simplifying-operations-managing-edge-data-centers.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/03/istock-971760292-100790721-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/03/istock-971760292-100790721-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Internet of Things</category>
					
				
				
					
						<category>Data Center</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>Data center giants announce new high-speed interconnect</title>

		<pubDate>Tue, 12 Mar 2019 07:18:00 -0700</pubDate>

		
		
		
		<author>Andy Patrizio</author>
		<dc:creator>Andy Patrizio</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>A group of big names in the data center space have linked arms to develop yet another high-speed interconnect, this one designed to connect processor chips.</p><p>It's called Compute Express Link, or CXL, which is aimed at plugging data-center CPUs into accelerator chips. Members of the alliance that developed the spec are Intel, Microsoft, Google, Facebook, HPE, Cisco, and Dell-EMC, plus Huawei and Alibaba.</p><aside class="fakesidebar"><strong>[ Learn <a href="https://www.networkworld.com/article/3275385/who-s-developing-quantum-computers.html">who's developing quantum computers</a>. ] </strong></aside>
<p>Where are IBM, AMD, Nvidia, Xilinx, or any of the ARM server vendors such as Marvell/Cavium? They have their own PCIe-nased spec, called <a href="https://en.wikichip.org/wiki/ccix" rel="nofollow">CCIX</a>. The group consists of AMD, Arm, Mellanox, Qualcomm, Xilinx, and Huawei.</p><p class="jumpTag"><a href="/article/3359254/data-center-giants-announce-new-high-speed-interconnect.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3359254/data-center-giants-announce-new-high-speed-interconnect.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/02/binary_code_monitors_data_software_applications_network_by_loops7_gettyimages-162488938_2400x1600-100788309-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/02/binary_code_monitors_data_software_applications_network_by_loops7_gettyimages-162488938_2400x1600-100788309-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Data Center</category>
					
				
				
					
						<category>Networking</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>How to shop for CDN services</title>

		<pubDate>Tue, 12 Mar 2019 03:00:00 -0700</pubDate>

		
		
		
		<author>Stacy Collett</author>
		<dc:creator>Stacy Collett</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Content delivery networks have been around for more than a decade, but many enterprises are taking a new look at the perks and specialization that today’s <a href="https://www.networkworld.com/article/2895788/the-rapid-evolving-state-of-content-delivery-networks.html">CDN</a> services have to offer.</p><p>Why the renewed interest? The cloud-first movement, all-things-video, <a href="https://www.networkworld.com/article/3207535/what-is-iot-how-the-internet-of-things-works.html">IoT</a> and <a href="https://www.networkworld.com/article/3224893/what-is-edge-computing-and-how-it-s-changing-the-network.html">edge computing</a> are all bringing sexy back to CDNs. The content delivery network market was valued at $7.3 billion in 2017 and is expected to reach $29.5 billion by 2023, a compound annual growth rate of 26 percent, according to <a href="https://www.researchandmarkets.com/" rel="nofollow">ResearchAndMarkets.com</a>.</p><p class="jumpTag"><a href="/article/3346220/how-to-shop-for-cdn-services.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3346220/how-to-shop-for-cdn-services.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/03/nw_how-to-shop-for-cdn_shopping-cart-100790338-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/03/nw_how-to-shop-for-cdn_shopping-cart-100790338-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Networking</category>
					
				
				
					
						<category>WAN</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>Nvidia grabs Mellanox out from under Intel’s nose</title>

		<pubDate>Mon, 11 Mar 2019 14:08:00 -0700</pubDate>

		
		
		
		<author>Andy Patrizio</author>
		<dc:creator>Andy Patrizio</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>After months of speculation, Mellanox found a suitor -- and it was a surprise, to say the least. GPU leader Nvidia snatched up the networking vendor for $6.9 billion, topping a rumored previous offer of $6 billion from Nvidia’s nemesis, Intel.</p><p>The acquisition ends <a href="https://www.networkworld.com/article/3330566/techology-business/why-does-mellanox-have-four-potential-suitors.html">months of rumors of a suitor for Mellanox</a>. Intel, Microsoft, and Xilinix were all reportedly bidding for the Israeli company, which specializes in high-speed networking.</p><aside class="fakesidebar"><strong> [ Read also: <a href="https://www.networkworld.com/article/3284352/data-center/how-to-plan-a-software-defined-data-center-network.html">How to plan a software-defined data-center network</a> ]</strong></aside>
<p>Mellanox Technology was formed in 1999 by a former Intel executive and was a pioneer in the early adoption of InfiniBand interconnect technology, which along with its high-speed Ethernet products is now used in over half of the world’s fastest supercomputers and in many leading hyperscale data centers.</p><p class="jumpTag"><a href="/article/3356444/nvidia-grabs-mellanox-out-from-under-intels-nose.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3356444/nvidia-grabs-mellanox-out-from-under-intels-nose.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/01/underwhelming-100784946-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/01/underwhelming-100784946-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Data Center</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>Software-defined perimeter brings trusted access to multi-cloud applications, network resources</title>

		<pubDate>Mon, 11 Mar 2019 11:55:00 -0700</pubDate>

		
		
		
		<author>Linda Musthaler</author>
		<dc:creator>Linda Musthaler</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Many companies today have a hybrid approach to their networking and IT infrastructure. Some elements remain in an on-premise data center, while other portions have gone to the cloud and even to multi-cloud. As a result, the network perimeter is permeable and elastic. This complicates access requirements at a time when it’s more important than ever to enable accessibility while preventing unauthorized access to applications and data.</p><p>To reduce risk, some organizations are applying a zero-trust strategy of “verification before trust” by incorporating stronger, stateful user and device authentication; granular access control; and enhanced segmentation no matter where the applications and resources reside.</p><p class="jumpTag"><a href="/article/3359363/software-defined-perimeter-brings-trusted-access-to-multi-cloud-applications-network-resources.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3359363/software-defined-perimeter-brings-trusted-access-to-multi-cloud-applications-network-resources.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/10/firewall_network-security_lock_padlock_cyber-security-100776989-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/10/firewall_network-security_lock_padlock_cyber-security-100776989-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Network Security</category>
					
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Hybrid Cloud</category>
					
				
				
					
						<category>Cloud Computing</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>Facebook gets into the fiber-optic connectivity business</title>

		<pubDate>Mon, 11 Mar 2019 05:44:00 -0700</pubDate>

		
		
		
		<author>Andy Patrizio</author>
		<dc:creator>Andy Patrizio</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>When you think of Facebook services, high-speed connectivity is not the first thing that comes to mind. But the social media giant is doing just that, offering high-capacity fiber-optic routes to sell unused capacity between its data centers for third parties.</p><p>Facebook has created a subsidiary called Middle Mile Infrastructure to sell excess capacity on its fiber, starting with new fiber routes between its data center campuses in Virginia, Ohio, and North Carolina. The company made the announcement in a <a href="https://code.fb.com/connectivity/fiber-optic-cable/" rel="nofollow noopener" target="_blank">blog post</a> by Kevin Salvadori, director of network investments.</p><p class="jumpTag"><a href="/article/3359239/facebook-gets-into-the-fiber-optic-connectivity-business.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3359239/facebook-gets-into-the-fiber-optic-connectivity-business.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/08/4_catastrophe_vulnerable_disaster_fiber-optic-cables-100769194-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/08/4_catastrophe_vulnerable_disaster_fiber-optic-cables-100769194-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Networking</category>
					
				
				
					
						<category>Internet</category>
					
				
				
					
						<category>Data Center</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: How IPsec UDP Helps Scale and Secure SD-WAN Fabrics</title>

		<pubDate>Mon, 11 Mar 2019 03:00:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>IPsec is a critical element in building a scalable and secure SD-WAN fabric. The right IPsec is key to making it happen.</p><p>Robert Sturt published an article title “<a href="https://searchsdn.techtarget.com/tip/SD-WAN-vs-VPN-How-do-they-compare" rel="noopener nofollow" target="_blank">SD-WAN vs. VPN: How do they compare?</a>” While Robert tried to illustrate when and how to use SD-WAN vs. VPN, the objective of this blog is to look deeper into existing IPsec approaches and challenges in building and securing an <a href="https://www.silver-peak.com/sd-wan/sd-wan-explained" rel="noopener nofollow" target="_blank">SD-WAN</a> fabric, and how IPsec UDP can help address these challenges. At the end of this blog, I have included a link to a Silver Peak white paper that provides a detailed explanation of IPsec options.</p><p class="jumpTag"><a href="/article/3359245/how-ipsec-udp-helps-scale-and-secure-sd-wan-fabrics.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3359245/how-ipsec-udp-helps-scale-and-secure-sd-wan-fabrics.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/03/istock-865460022-100790559-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/03/istock-865460022-100790559-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>IT Leadership</category>
					
				
				
					
						<category>SD-WAN</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Survey: Cloud monitoring, management tools come up short</title>

		<pubDate>Mon, 11 Mar 2019 03:00:00 -0700</pubDate>

		
		
		
		<author>Shamus McGillicuddy</author>
		<dc:creator>Shamus McGillicuddy</dc:creator>
		

		
		
		<description><![CDATA[<p><em>(Editor’s note: Recent research by Enterprise Management Associates takes a look at how enterprises regard cloud management tools. This article by Shamus McGillicuddy, EMA’s research director for network management, details highlights of “<a href="http://www.enterprisemanagement.com/research/asset.php/3710/Network-Engineering-and-Operations-in-the-Multi-Cloud-Era" rel="nofollow">Network Engineering and Operations in the Multi-Cloud Era</a>,” a report based on EMA’s survey of 250 IT professionals and telephone interviews with a half dozen IT leaders.) </em><p class="jumpTag"><a href="/article/3356464/survey-cloud-monitoring-management-tools-come-up-short.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.networkworld.com/article/3356464/survey-cloud-monitoring-management-tools-come-up-short.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/08/cloud-100770444-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/08/cloud-100770444-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Networking</category>
					
				
				
					
						<category>Cloud Management</category>
					
				
				
					
						<category>Cloud Computing</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>VMware firewall takes aim at defending apps in data center, cloud</title>

		<pubDate>Fri, 08 Mar 2019 14:42:00 -0800</pubDate>

		
		
		
		<author>Michael Cooney</author>
		<dc:creator>Michael Cooney</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>VMware has taken the wraps off a <a href="https://www.networkworld.com/article/3230457/what-is-a-firewall-perimeter-stateful-inspection-next-generation.html?nsdr=true">firewall</a> it says protects enterprise applications and data inside <a href="https://www.networkworld.com/article/3223692/what-is-a-data-centerhow-its-changed-and-what-you-need-to-know.html">data centers</a> or clouds.</p><p>Unlike perimeter firewalls that filter traffic from an unlimited number of unknown hosts, VMware says its new Service-defined Firewall gains deep visibility into the hosts and services that generate network traffic by tapping into into its NSX network management software, vSphere hypervisors and <a href="https://www.vmware.com/products/appdefense.html" rel="nofollow">AppDefense</a> threat-detection system.</p><p class="jumpTag"><a href="/article/3359242/vmware-firewall-takes-aim-at-defending-apps-in-data-center-cloud.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3359242/vmware-firewall-takes-aim-at-defending-apps-in-data-center-cloud.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/10/cyber-security_lock_padlock_firewall_code_breach_password-100777447-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/10/cyber-security_lock_padlock_firewall_code_breach_password-100777447-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Cloud Computing</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>How to determine if Wi-Fi 6 is right for you </title>

		<pubDate>Fri, 08 Mar 2019 05:14:00 -0800</pubDate>

		
		
		
		<author>Zeus Kerravala</author>
		<dc:creator>Zeus Kerravala</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>There’s a lot of hype around the next Wi-Fi standard, 802.11ax, more commonly known as Wi-Fi 6. Often new technologies are built up by the vendors as being the “next big thing” and then flop because they don’t live up to expectations. In the case of Wi-Fi 6, however, the fervor is warranted because it is the first Wi-Fi standard that has been designed with the premise that Wi-Fi is the primary connection for devices rather than a network of convenience.</p><h2>Wi-Fi 6 is a different kind of Wi-Fi</h2>
<p>Wi-Fi 6 is loaded with new features, such as Orthogonal Frequency Division Multiple Access (OFDMA), 1024-QAM (quadrature amplitude modulation) encoding and target wake time (TWT), that make Wi-Fi faster and less congested. Many of these enhancements came from the world of LTE and 4G, which solved many of these challenges long ago. These new features will lead to a better mobile experience and longer client battery life, and they will open the door to a wide range of new applications that could not have been done on Wi-Fi before. For example, an architect could now use virtual reality (VR) over Wi-Fi to showcase a house.</p><p class="jumpTag"><a href="/article/3356838/how-to-determine-if-wi-fi-6-is-right-for-you.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3356838/how-to-determine-if-wi-fi-6-is-right-for-you.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.techhive.com/images/article/2014/06/wifi_abstract-100315038-primary.idge.jpg" />
						<media:content url="https://images.techhive.com/images/article/2014/06/wifi_abstract-100315038-primary.idge.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Wi-Fi</category>
					
				
				
					
						<category>Networking</category>
					
				
				
					
						<category>Mobile</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: Resilience at Edge Computing Sites Is Resilience for the Whole IT Environment</title>

		<pubDate>Thu, 07 Mar 2019 12:57:00 -0800</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>As edge computing deployments get under way, organizations need to make their <a href="https://www.apc.com/us/en/campaign/edge-computing-solutions/" rel="noopener nofollow" target="_blank">edge computing sites</a> resilient. As the saying goes, “you’re only as good as your weakest link,” so if edge computing locations are allowed to be the weakest link in a multi-location environment, the entire network surely will suffer.</p><p>You can’t have a truly resilient IT deployment without resilience at these edge computing sites. So organizations have to harden these sites with best-in-class technology as they do at centralized and regional data centers. Organizations need redundancy, security and management controls designed to prevent downtime.</p><p class="jumpTag"><a href="/article/3356439/resilience-at-edge-computing-sites-is-resilience-for-the-whole-it-environment.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3356439/resilience-at-edge-computing-sites-is-resilience-for-the-whole-it-environment.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/03/7-tech-trends-dc-monitoring-small-100790423-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/03/7-tech-trends-dc-monitoring-small-100790423-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Internet of Things</category>
					
				
				
					
						<category>Data Center</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>How blockchain will manage networks</title>

		<pubDate>Thu, 07 Mar 2019 04:23:00 -0800</pubDate>

		
		
		
		<author>Patrick Nelson</author>
		<dc:creator>Patrick Nelson</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Ethernet networking technology is flawed, say some engineers. The problem is it doesn’t have any inherent security built in to it. Ethernet also hard to manage because it's centralized. It’s out-of-date, and it needs revamping, researchers say.</p><p>One attempt to address the issue is the Marconi protocol, which is a strategy to shift network and packet management over to a smart-contract, decentralized chain-based system. Smart contracts are trackable, verifiable transactions. They’re performed through encrypted <a href="https://www.computerworld.com/article/3191077/what-is-blockchain-the-complete-guide.html" rel="noopener" target="_blank">blockchains</a> and are self-enforcing.</p><p class="jumpTag"><a href="/article/3356496/how-blockchain-will-manage-networks.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3356496/how-blockchain-will-manage-networks.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/02/abstract_data_background_by_iaremenko_gettyimages-911054280_2400x1600-100788488-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/02/abstract_data_background_by_iaremenko_gettyimages-911054280_2400x1600-100788488-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Networking</category>
					
				
				
					
						<category>Network Management</category>
					
				
				
					
						<category>Cloud Security</category>
					
				
				
					
						<category>Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Wireless spectrum shortage? Not so fast</title>

		<pubDate>Thu, 07 Mar 2019 03:00:00 -0800</pubDate>

		
		
		
		<author>Craig Mathias</author>
		<dc:creator>Craig Mathias</dc:creator>
		

		
		
		<description><![CDATA[<p>The wireless industry has always had to deal with regular (and alarming) pronouncements that we're somehow running out of radio spectrum. We’re not. But the misconception regardless gives many IT and network managers pause. After all, if the availability, reliability and especially the capacity of wireless were to degrade to the point of a de-facto shortage, the situation would be dire for communications at the edges of both the LAN and <a href="https://www.networkworld.com/article/3248989/lan-wan/what-is-a-wide-area-network-a-definintion-examples-and-where-wans-are-headed.html">WAN</a>.<p class="jumpTag"><a href="/article/3343040/wireless-spectrum-shortage-not-so-fast.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.networkworld.com/article/3343040/wireless-spectrum-shortage-not-so-fast.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/08/circular_jigsaw_puzzle_pieces_component_parts_of_a_whole_microservices_by_thomasvogel_gettyimages-495061257_plus_abstract_network_connections_nodes_background_by_matjaz_slanic_gettyimages-629677830_1200x800-100768066-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/08/circular_jigsaw_puzzle_pieces_component_parts_of_a_whole_microservices_by_thomasvogel_gettyimages-495061257_plus_abstract_network_connections_nodes_background_by_matjaz_slanic_gettyimages-629677830_1200x800-100768066-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Mobile</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Cisco uncorks 26 security patches for switches, firewalls</title>

		<pubDate>Wed, 06 Mar 2019 12:49:00 -0800</pubDate>

		
		
		
		<author>Michael Cooney</author>
		<dc:creator>Michael Cooney</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Cisco has bundled <a href="https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-70757" rel="nofollow">25 security advisories that describe 26 vulnerabilities</a> in Cisco NX-OS switch and Firepower FXOS firewall software.</p><p>While the 26 alerts describe vulnerabilities that have a Security Impact Rating of “High,” most –23 – affect Cisco NX-OS software, and the remaining three involve both software packages.</p><aside class="fakesidebar"><strong>[ Also see <a href="https://www.networkworld.com/article/3236448/lan-wan/what-to-consider-when-deploying-a-next-generation-firewall.html">What to consider when deploying a next generation firewall</a>. | Get regularly scheduled insights by <a href="https://www.networkworld.com/newsletters/signup.html">signing up for Network World newsletters</a>. ]</strong></aside>
<p>The vulnerabilities span a number of problems that would let an attacker gain unauthorized access, gain elevated privileges, execute arbitrary commands, escape the restricted shell, bypass the system image verification checks or cause denial of service (DoS) conditions, Cisco said.</p><p class="jumpTag"><a href="/article/3356501/cisco-uncorks-26-security-patches-for-switches-firewalls.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3356501/cisco-uncorks-26-security-patches-for-switches-firewalls.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/12/network-security_lock_padlock_breach-100782976-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/12/network-security_lock_padlock_breach-100782976-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Networking</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>Why Wi-Fi needs artificial intelligence</title>

		<pubDate>Wed, 06 Mar 2019 07:04:00 -0800</pubDate>

		
		
		
		<author>Zeus Kerravala</author>
		<dc:creator>Zeus Kerravala</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>This week <a href="https://www.networkworld.com/article/3353042/juniper-grabs-mist-for-wireless-ai-cloud-service-delivery-technology.html">Juniper Networks plunked down $405 million to acquire Wi-Fi vendor Mist Systems</a>. As always, Network World's Michael Cooney did a fine job <a href="https://www.networkworld.com/article/3353042/juniper-grabs-mist-for-wireless-ai-cloud-service-delivery-technology.html">covering the news</a>, so I won’t rehash that. What I want to look at is something specific that Cooney wrote — that “Mist touts itself as having developed an artificial-intelligence-based wireless platform.” Why does Wi-Fi need artificial intelligence (AI)?</p><p class="jumpTag"><a href="/article/3355237/why-wi-fi-needs-artificial-intelligence.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.networkworld.com/article/3355237/why-wi-fi-needs-artificial-intelligence.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/10/artificial-intelligence_brain_machine-learning_digital-transformation_world-networking-100777429-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/10/artificial-intelligence_brain_machine-learning_digital-transformation_world-networking-100777429-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Wi-Fi</category>
					
				
				
					
						<category>Networking</category>
					
				
				
					
						<category>Artificial Intelligence</category>
					
				
				
					
						<category>Network Management</category>
					
				
				
					
						<category>Juniper Networks</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
	
	




	</channel>
</rss>