Google’s environmental report hints at enterprise cost-saving tactics
Google touted some of its energy efficiency accomplishments in its annual report on its sustainability efforts published Tuesday, but also highlighted the many pros and cons to be weighed in deciding...
View ArticleWill VMWare’s licensing changes push devirtualization of data centers?
The landscape of data center infrastructure is shifting dramatically, influenced by recent licensing changes from Broadcom that are driving up costs and prompting enterprises to reevaluate their...
View ArticleChina seeks 30% growth in national compute capacity by 2025
China has released a plan that reveals the oriental power’s plans to grow its national compute capacity to 30% by 2025. The plan, which was reported by several Chinese news outlets after its release...
View ArticleWe’re in the Unified SASE Era. What’s next?
Network security is one of the largest sectors of the cybersecurity market today. As with any technology, network security has undergone several evolutions over the past couple of decades, especially...
View ArticleDownload the cloud data warehouse enterprise buyer’s guide
From the editors of our sister publication InfoWorld, this enterprise buyer’s guide helps IT and network staff understand what the various cloud-based data warehouse options can do for their...
View ArticleChina’s Moore Threads upgrades AI data center solution amid US restrictions
Chinese GPU startup Moore Threads has announced an upgrade to its KUAE AI data center solution, boosting the number of GPUs connectable in a single computing cluster to 10,000. In a statement, Moore...
View ArticleNetwork jobs watch: Hiring, skills and certification trends
Network and infrastructure roles continue to shift as enterprises adopt technologies such as AI-driven network operations, multicloud networking, zero trust network access (ZTNA), and SD-WAN. Here’s a...
View ArticleCisco adds heft to cybersecurity push with acquisitions, new talent
With new leadership, key acquisitions, and a platform-based vision, Cisco is betting big on security. Cisco’s dominance in networking and telecommunications products and services is well established,...
View ArticleWhat is the OSI model? How to explain and remember its 7 layers
The Open Systems Interconnect (OSI) model is a conceptual framework that describes networking or telecommunications systems as seven layers, each with its own function. The layers help network pros...
View ArticleFortinet eases firewall management with hardware-as-a-service package
Fortinet is unveiling a hardware-as-a-service offering that promises to ease the stress of keeping up with the latest firewall technology. The new FortiGate-as-a-Service (FGaaS) offering lets...
View ArticleUK election may unlock access to new data center capacity
The change in the UK government following the general election on July 4 is also leading to a change in the country’s planning policies for data center construction. The new Labour government is...
View ArticleAMD buys Silo AI to counter Nvidia
AMD turned its AI acquisition dial another notch this week, announcing a deal to buy Europe’s largest private AI lab, Finland’s Silo AI, for $665 million in cash. Last August it bought French AI...
View ArticleMicrosoft settles cloud complaint for $22M to avoid EU antitrust probe
Microsoft has reportedly agreed to pay $22 million to settle an antitrust complaint with a group representing cloud computing companies in Europe. This move avoids a potential larger fine from the...
View ArticleMD5 attack puts RADIUS networks everywhere at risk
The “secure enough” RADIUS/UDP authentication protocol may have finally met its match, and organizations that have continued to rely on RADIUS to authenticate networked devices over UDP and TCP...
View ArticleStorage: The unsung hero of AI deployments
As enterprises begin to deploy and use AI, many realize they’ll need access to massive computing power and fast networking capabilities, but storage needs may be overlooked. Spinning up a chatbot or...
View ArticleLinux operators: Using |, >, >>, &, &&, !, =, (\) and many more
The power of working on the Linux command line is evidenced nearly as much by the available operators as it is by the awesome collection of available commands. This post gives details and provides...
View ArticleCisco Talos analyzes attack chains, network ransomware tactics
As ransomware continues to be the scourge of enterprise security teams, Cisco’s Talos security intelligence group recently analyzed ransomware groups to identify common techniques and offer...
View ArticleUS lawmakers raise a red flag over Microsoft’s $1.5B investment in G42
A group of Republican lawmakers is urging the Biden administration to investigate a $1.5 billion deal between Microsoft and G42 — an AI and data center service provider based in the UAE. Their...
View ArticleAWS launches Graviton4 instances
Amazon Web Services announced the launch of its fourth-generation, Arm-based Graviton CPU, touting its energy efficiency and high performance for cloud workloads. AWS launched Graviton in 2018 and has...
View ArticleSchneider Electric shares liquid cooling guidelines
Most enterprise data centers have gotten by just fine by air cooling their CPUs and servers, but AI is forcing IT to consider new cooling types, including liquid cooling. With power draws for CPUs...
View Article