Transitioning to IPv6 for Simplicity, Efficiency, and Modernization – Cisco Blogs

Transitioning to IPv6 for Simplicity, Efficiency, and Modernization – Cisco Blogs

Over two decades ago—an eternity in internet time—the most recent version of the Internet Protocol (IPv6) was approved that vastly increased the available number of IP addresses—the unique identifiers for each device connecting to the internet. Back then, the Internet Engineering Task Force (IETF) standards body realized that the immense growth of the internet and the number of devices connecting to it would “soon” exceed the available 32-bit format of IPv4 addresses—a mere 4.3 billion—and…

Read More

IBM service aims to secure multicloud operations

IBM service aims to secure multicloud operations

IBM is launching a new service to help customers manage their data encryption keys in a hybrid cloud environment.  Unified Key Orchestrator lets customers integrate all security key-management systems into one managed service that’s backed by Big Blue’s Hardware Security Module. HSM is IBM’s system that protects against physical or logical attacks and has special hardware to perform cryptographic operations and protect keys. Available from IBM Cloud, Unified Key Orchestrator lets customers maintain visibility and control over…

Read More

Cisco accelerates hybrid cloud operations with innovations from Intersight, Hyperflex, and UCS X-Series – Cisco Blogs

Cisco accelerates hybrid cloud operations with innovations from Intersight, Hyperflex, and UCS X-Series – Cisco Blogs

Today Cisco announced innovations across our cloud and computing portfolio that build on our mission to simplify hybrid cloud operations for IT organizations and help them accelerate digital innovation for the business. Our objective from the onset has been to provide customers the flexibility and choice to bring everyone along – wherever they are on their hybrid cloud journey. One of our guiding principles is to avoid all-or-none “solutions” and create lock-in to a single…

Read More

10 ways IT can navigate the chip shortage

10 ways IT can navigate the chip shortage

Exacerbated by the pandemic, the chip shortage neared crisis proportions at the start of the year. Network vendors calculated the impact on their businesses in recent earnings reports: Cisco’s current product backlog is at nearly $14 billion, Juniper reported a backlog of $1.8 billion, and Arista said that lead times on sales are 50 to 70 weeks. Then Russia invaded Ukraine, putting even more stress on the global supply chain. Ukraine manufactures 70% of the…

Read More

Best backup for 7 major databases

Best backup for 7 major databases

There are many options for backing up databases, and what’s best varies from database to database and how it’s delivered. Here are recommendations for seven of them, with a glimpse at how the options were chosen to help inform your decision making. Oracle Oracle has many options for backup, but the official answer for backing Oracle would be Recovery Manager, or RMAN, which is also the name of the actual command that invokes it. Among…

Read More

What is NAC and why is it important for network security?

What is NAC and why is it important for network security?

Network Access Control (NAC) is a cybersecurity technique that prevents unauthorized users and devices from entering private networks and accessing sensitive resources. Also known as Network Admission Control, NAC first gained a foothold in the enterprise in the mid-to-late 2000s as a way to manage endpoints through basic scan-and-block techniques. As knowledge workers became increasingly mobile, and as BYOD initiatives spread across organizations, NAC solutions evolved to not only authenticate users, but also to manage…

Read More

New Warning from the White House Calls for Urgent Action – Cisco Blogs

New Warning from the White House Calls for Urgent Action – Cisco Blogs

On Monday and based on evolving intelligence, President Biden warned of increased potential of cyberattacks on critical infrastructure in the United States and his administration renewed its calls for all organizations to bolster their cyber defenses in this Statement from the President. We have seen similar warnings before. It’s easy to get jaded or to let down our guard because we have not seen the cyber meltdown that was predicted to coincide with the onset…

Read More

HPE’s GreenLake expansion adds NaaS, HPC, storage options

HPE’s GreenLake expansion adds NaaS, HPC, storage options

HPE is significantly expanding its GreenLake cloud services platform with 12 new packages that focus on strengthening and simplifying networking, high-performance computing (HPC) and storage environments. The goal of GreenLake and these new offerings is to offer customers greater flexibility in the way they build and manage their infrastructure, whether it’s on premises, at the edge, in a colocation facility, or in a public cloud, according to Alan Ni, HPE Aruba senior director of edge marketing….

Read More

Nvidia unveils a new GPU architecture designed for AI data centers

Nvidia unveils a new GPU architecture designed for AI data centers

While the rest of the computing industry struggles to get to one exaflop of computing, Nvidia is about to blow past everyone with an 18-exaflop supercomputer powered by a new GPU architecture. The H100 GPU, has 80 billion transistors (the previous generation, Ampere, had 54 billion) with nearly 5TB/s of external connectivity and support for PCIe Gen5, as well as High Bandwidth Memory 3 (HBM3), enabling 3TB/s of memory bandwidth, the company says. Due out…

Read More

Improving National Cybersecurity with SASE

Improving National Cybersecurity with SASE

By: Dolan Sullivan, Vice President of Federal at Aruba, a Hewlett Packard Enterprise company. With sophisticated cyberattacks, such as ransomware and denial of service (DOS) persistently aimed at the public and private sectors being perpetrated by nation-state and rogue criminal actors, Federal IT teams are consistently dealing with a growing cybersecurity challenge: They must combat many forms of fraud and impersonation while protecting a vast amount of connected assets and sensitive data. Federal government agencies…

Read More
1 1,190 1,191 1,192 1,193 1,194 1,522