As IoT matures, vendors are creating application bundles to simplify deployments, but security remains a worry.
Stories by Jon Gold
The chip shortage is hitting Wi-Fi 6, the top performing standard for wireless LAN connectivity, but supply chain issues are slowing its spread.
A set of Bluetooth Classic vulnerabilities has a new proof-of-concept from a Singapore-based security research team, as chipset makers scramble to deploy patches.
The author of a new report from Forrester says that the simultaneous growth of IoT and edge computing usage are interlinked.
8.5 version of Red Hat Enterprise Linux caters to multi-cloud, predictive analytics, containerisation
Red Hat has rolled out version 8.5 of RHEL, which upgrades its support for containerisation, predictive analytics, and multi-cloud.
Red Hat Enterprise Linux version 9 is edge-friendly and has plenty of new features, but a surprisingly forgiving learning curve.
Standards for cellular radio-access networks known as Open RAN could make deployment of 5G and other cellular networks less expensive.
A start-up using open source components to offer software-defined private 5G-as-a-service hopes to attract enterprises with an enhanced architecture.
The past several years have seen a large-scale shift from traditional MPLS-based customer edge routers to SD-WAN technology, according to Gartner.
Enterprise customers looking to buy data centre switches face longer lead times and lack of stock over the course of the next year or so.
Virtualising physical appliances is just one part of the equation.
The promise of Wi-Fi in the 6GHz band is undeniable, but experts agree that it’s rarely worth deviating from usual refresh cycle.
Open source code in commercial network software can mean that when flaws are found by project teams, fixes don’t make it to the commercial products.
Business users looking for an upgrade to the very latest Wi-Fi standard, also known as Wi-Fi 6E, now have the option of Aruba’s new AP 635.
Vulnerabilities in Wi-Fi’s basic design offers a long-standing and widespread threat vector, but the probability of compromise remains low.