Cisco has added AI features to its AppDynamics observability platform that promise to help customers more quickly detect anomalies, identify performance problems, and resolve issues across the e...
https://www.networkworld.com/article/2099747/cisco-adds-ai-features-to-appdynamics-on-premises.html
The Biden administration has proposed adding another $285 million to the CHIPS and Science Act for funding semiconductor development in the U.S. with the creation of a chip manufacturing institut...
Microsoft is betting big on AI, investing $3.3 billion in a new AI data center in Wisconsin as part of a growing wave of investment in the technology. US President Joe Biden visited the site in...
At the Red Hat Summit this week, the company unveiled a new container image deployment method for Red Hat Enterprise Linux. The new option is designed to streamline operations, enhance consistenc...
https://www.networkworld.com/article/2099690/red-hat-unveils-image-mode-for-its-linux-distro.html
Enterprise IT managers prove to be too trusting of internal network protocols, as many organizations do not encrypt their WAN traffic, according to a new security threat report. Secure Access S...
The use of digital twins – digital representations that mimic the structure and behavior of physical objects or systems – is on the rise. Digital twin technology has moved beyond manufacturin...
https://www.networkworld.com/article/965860/what-is-digital-twin-technology-and-why-it-matters.html
The reliability of services delivered by ISPs, cloud providers and conferencing services is critical for enterprise organizations. ThousandEyes, a Cisco company, monitors how providers are handl...
An Australian pension fund provider has attributed a week-long service outage to “an unprecedented occurrence” related to provisioning by Google Cloud, its cloud service provider (CSP). A d...
IBM has filled out the low end of its Power server portfolio with a 2U rack-mounted server designed for running AI inferencing workloads in remote office or edge locations outside of corporate da...
https://www.networkworld.com/article/2099390/ibm-power-server-targets-ai-workloads-at-the-edge.html
HPE Aruba continues to steep its management software with AI features, now by adding network security controls to help IT teams protect AI assets such as large language models from unmanaged devi...
Cisco has added a variety of new AI-based security features to its cloud-native security platform that promise to help customers more quickly spot and remediate threats. The features extend the v...
Red Hat’s generative AI-powered Lightspeed tool was first announced last year for the Red Hat Ansible automation platform . This morning, as the Red Hat Summit kicks off in Denver, the company ...
Red Hat Ansible’s new “policy as code” capabilities will help users of the infrastructure automation platform to increase efficiency, reduce human error and improve the ability to meet gove...
https://www.networkworld.com/article/2098823/red-hat-introduces-policy-as-code-for-ansible.html
Riverbed today announced its Riverbed Platform that includes observability capabilities to provide enterprise network managers with visibility into blind spots around public cloud, zero trust, ...
Tata Communications has unveiled CloudLyte, a fully automated edge computing platform to meet the increasing needs for real-time data processing, low latency applications, and smart decision-maki...
Hewlett Packard Enterprise has launched the HPE Cray Storage Systems C500, an entry-level and midrange storage system for HPC and AI compute clusters. The HPE Cray Storage Systems C500 is a der...
There are lots of ways bad actors could get into a network these days, and most of them will sooner or later involve accessing something they shouldn’t. Relationships with, and among, applicati...
https://www.networkworld.com/article/2098413/does-new-security-need-to-be-old-again.html
Cisco promised to quickly integrate the security technology it gained in its $28 billion Splunk acquisition , and it has set that process in motion by adding tie-ins to its extended detection and...
The Zero Trust network access (ZTNA) approach replaces the perimeter defense model with a “least privilege” framework where users authenticate to access specific data and applications. Enterp...
Network and infrastructure roles continue to shift as enterprises adopt technologies such as AI-driven network operations , multicloud networking, zero trust network access (ZTNA ), and SD-WAN ....