January, 2025

article thumbnail

DeepSeek Just “Opened” The Path To AI ROI

Forrester IT

DeepSeeks open-source model, DeepThink (R1) by a little-known company in China sent shock waves across the technology world. It’s amazing. Yes, it does excel at benchmarks comparable to other state-of-the-art models. Yes, it’s partially open-source. Yes, the DeepSeek app explains its reasoning by default. But there are far-reaching implications to this important AI development.

article thumbnail

Next-gen Ethernet standards set to move forward in 2025

Network World

2024 was a banner year for Ethernet , which has been a foundational element of networking for more than 50 years and is poised for more advancements as 2025 kicks off. Multiple standards and certification efforts made progress in 2024, helping networks to be more reliable and deliver more bandwidth.One of the most significant developments was the maturation of 800 Gigabit Ethernet (800GbE).

Network 468
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Your Business May Want to Shift to an Industry Cloud Platform

Information Week

Industry-specific cloud platforms are growing in size and scope. Now may be the time to consider a move.

Industry 510
article thumbnail

CIOs are rethinking how they use public cloud services. Here’s why.

CIO Business Intelligence

Over the past few years, enterprises have strived to move as much as possible as quickly as possible to the public cloud to minimize CapEx and save money. Increasingly, however, CIOs are reviewing and rationalizing those investments. Are they truly enhancing productivity and reducing costs? In the rush to the public cloud, a lot of people didnt think about pricing, says Tracy Woo, principal analyst at Forrester.

Cloud 349
article thumbnail

The Ultimate Contact Center Buyer's Guide: A Crucial Decision

Harness the True Power of your Contact Center In today’s fast-paced business environment, selecting the right contact center solution is critical for enhancing customer experience, improving operational efficiency, and optimizing costs. This comprehensive guide will walk you through the essential factors to consider when choosing a contact center software that aligns with your business needs.

article thumbnail

GhostGPT: Uncensored Chatbot Used by Cyber Criminals for Malware Creation, Scams

Tech Republic Security

Researchers from Abnormal Security discovered an advert for the chatbot on a cybercrime forum and tested its capabilities by asking it to create a DocuSign phishing email.

Malware 523
article thumbnail

CompTIA bolsters penetration testing certification

Network World

CompTIA recently upgraded its PenTest+ certification program to educate professionals on cybersecurity penetration testing with training for artificial intelligence (AI), scanning and analysis, and vulnerability management, among other things. PenTest+ certification training now includes access to a hackable website that provides live targets and vulnerabilities for cybersecurity professionals to identify and mitigate real-world threats, according to CompTIA.

Analysis 433

More Trending

article thumbnail

Sustainability, grid demands, AI workloads will challenge data center growth in 2025

Network World

Data centers this year will face several challenges as the demand for artificial intelligence introduces an evolution in AI hardware, on-premises and cloud-based strategies for training and inference, and innovations in power distributionsall while opposition to new data center developments continues to grow. Uptime Institute details the major challenges and opportunities the data center industry will encounter this year in its report, Five Data Centers Predictions for 2025.

article thumbnail

HPE beats Dell and Supermicro in $1B AI server deal with X

Network World

Hewlett Packard Enterprise (HPE) has signed a contract exceeding $1 billion to provide AI servers for X, the platform formerly known as Twitter, according to Bloomberg. The deal represents a critical endorsement of HPEs technology as the company reportedly edged out leading competitors Dell and Supermicro. While the finer details remain confidential, the agreement underscores HPEs growing clout in the rapidly expanding AI server market.

Dell 418
article thumbnail

Nile dials-up AI to simplify network provisioning, operation

Network World

Network-as-a-service startup Nile has added an AI-based tool aimed at helping enterprise customers provision and operatethe vendors Campus Network-as-a-Service deployments. Founded by former Cisco CEO John Chambers and Pankaj Patel, Ciscos former chief development officer, Niles subscription-based NaaS offering, Nile Access Service, lets customers set up and manage campus network operations without requiring them to purchase and maintain their own networking infrastructure.

Network 444
article thumbnail

Red Hat unveils Kubernetes connectivity solution to tame multi-cloud chaos

Network World

Integrating traffic management, policy enforcement, and role-based access control, Red Hat Connectivity Link is a new technology from IBMs Red Hat business unit thats aimed at simplifying how enterprises manage application connectivity across distributed cloud environments. The technology is based on the open-source Kuadrant project, which combines traffic routing, security controls, and policy management capabilities that organizations typically handle through separate tools.

Cloud 474
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

US Justice Department sues to block HPE’s $14 billion Juniper buy

Network World

*Article has ben updated to include a joint response from HP and Juniper to the U.S. DOJ complaint* After months of speculation, the U.S. Justice Department today sued to block the $14 billion sale of Juniper Networks to Hewlett Packard Enterprise. The Justice Department said reduced competition in the wireless market is the biggest problem with the proposed buy.

Wireless 441
article thumbnail

Palo Alto Networks firewalls have UEFI flaws, Secure Boot bypasses

Network World

Researchers have discovered that next-generation firewalls from Palo Alto Networks contain years-old known vulnerabilities in their UEFI firmware a finding that provides yet more evidence of a broader issue with specialized devices today. Increasingly built on commodity hardware , specialty devices share the same UEFI vulnerabilities as general-purpose PCs and laptops, inheriting similarly slow firmware patching cycles.

Firewall 455
article thumbnail

SD-WAN to gain AI-driven deployment, management capabilities

Network World

AI is set to make its mark on SD-WAN technology. For starters, generative AI capabilities will improve how enterprise IT teams deploy and manage their SD-WAN architecture. In addition, AI workloads have distinctive requirements that will influence SD-WAN connectivity choices. SD-WAN which stands for software-defined wide area network has been around for a decade, pitched to enterprises as a way to cut costs and improve WAN flexibility.

WAN 403
article thumbnail

Cisco offers AI application visibility, access control, threat defense

Network World

Cisco has rolled out a service that promises to protect enterprise AI development projects with visibility, access control, threat defense, and other safeguards. The vendors AI Defense package offers protection to enterprise customers developing AI applications across models and cloud services, according to Tom Gillis, senior vice president and general manager of Ciscos Security, Data Center, Internet & Cloud Infrastructure groups.

article thumbnail

Future-Proof IT: Cost-Saving Strategies Every IT Leader Needs in 2025

With IT budgets projected to grow 9.8% in 2025, leaders must invest wisely—not just cut blindly. This whitepaper introduces The Future-Proof IT Cost Optimization Model, a framework to reduce costs while maintaining service quality. Learn how Cloud Efficiency, AI-Powered Workforce Automation, Vendor Optimization, Cybersecurity Resilience, and Unified Communications can drive savings and improve efficiency.

article thumbnail

AMD’s unpatched chip microcode glitch may require extreme measures by CISOs

Network World

Due to a partner disclosure, AMD has found itself in the unenviable position of having to confirm the existence of a major cybersecurity problem in its chip microcode before it could post a fix. But that headache is mild compared to those of their customers CISOs. Microcode often loads during startup and it can change chip capabilities. Security specialists are recommending that CISOs consider extreme protective measures, including network isolation, possible air gapping, and ideally blocking al

Network 406
article thumbnail

Network convergence will drive enterprise 6G wireless strategies

Network World

The traditional separation between Wi-Fi and cellular networks a cornerstone of enterprise wireless planning is facing fundamental challenges according to a new 6G vision statement released this week by the World Broadband Association, It is important that the 6G era brings together cellular, Wi-Fi, and non-terrestrial access in a more seamless fashion, to create a network of networks,' said Maria Cuevas Ramirez, network infrastructure research director at BT and a board director of the Wirele

Wireless 390
article thumbnail

Stratoshark brings Wireshark-style analysis to cloud system calls

Network World

The open-source Wireshark network protocol analyzer has been a standard tool for networking professionals for decades. In recent years, organizations have increasingly moved workloads to the cloud, where they have not had the same network visibility. Sysdig, the lead commercial sponsor behind Wireshark, wants to change that with the new Stratoshark tool.

Analysis 418
article thumbnail

10 top priorities for CIOs in 2025

CIO Business Intelligence

As 2025 dawns, CIOs face an IT landscape that differs significantly from just a year ago. AI, once viewed as a novel innovation, is now mainstream, impacting just about facet of the enterprise. Over the next 12 months, IT leaders can look forward to even more innovations, as well as some serious challenges. To keep ahead of the curve, CIOs should continuously evaluate their business and technology strategies, adjusting them as necessary to address rapidly evolving technology, business, and econo

Strategy 351
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Wi-Fi 7 in 2025: Will this be the year?

Network World

Wi-Fi 7 gear began to emerge in 2024, but it looks like 2025 will be the big year for rollouts. Wi-Fi 7 is currently the leading edge of wireless internet standards, providing more bandwidth, lower latency and more resiliency than prior standards. A year ago, there was some speculation that 2024 would be the breakout year for Wi-Fi 7. Whether or not that actually occurred is a matter of perspective.

Wireless 366
article thumbnail

9 IT resolutions for 2025

CIO Business Intelligence

CIOs are an ambitious lot. Not the type to be satisfied with the status quo, they have set big goals for themselves in the upcoming year, according to countless surveys of IT execs. They want to expand their use of artificial intelligence, deliver more value from those AI investments, further boost employee productivity, drive more efficiencies, improve resiliency, expand their transformation efforts, and more.

article thumbnail

Graviton progress: 50% of new AWS instances run on Amazon custom silicon

Network World

Half of all instances spun up on Amazon Web Services over the past two years used Graviton, Amazons custom silicon built on Arm processor technology, rather than x86 processors. In addition, the homegrown Graviton processor powered more than 250,000 CPUs during Amazon Prime Day, showing its efficiency in handling demand, according to a presentation at the recent AWS: reInvent conference by Dave Brown, vice president of AWS compute & networking services.

Energy 411
article thumbnail

UK regulator may investigate AWS and Microsoft cloud businesses

Network World

AWS and Microsoft could potentially face an investigation of their cloud businesses in Britain should the Competition and Markets Authority (CMA) follow the recommendation of an independent inquiry group that reports into the UKs antitrust regulator. In a release issued on Monday, the group asks that the CMA use its powers under the Digital Markets, Competition and Consumers Act 2024 ( DMCCA ), to designate the two largest providers, AWS and Microsoft, with strategic market status (SMS) in relat

Cloud 365
article thumbnail

The 2025 Annual ProcureCon CPO Report

Procurement leaders are at a pivotal moment. With CPOs playing an increasingly strategic role, it’s time to leverage innovation and technology to drive resilience and efficiency. Download The 2025 Annual ProcureCon CPO Report to uncover key insights to thrive in a dynamic procurement landscape. What’s Inside: How CPOs are driving strategic decision-making and technology adoption The top priorities and challenges for procurement in 2025 Why AI, sustainability, and data analytics are essential for

article thumbnail

Gen AI in 2025: Playtime is over, time to get practical

CIO Business Intelligence

Generative AI playtime may be over, as organizations cut down on experimentation and pivot toward achieving business value, with a focus on fewer, more targeted use cases. Nearly nine out of 10 senior decision-makers said they have gen AI pilot fatigue and are shifting their investments to projects that will improve business performance, according to a recent survey from NTT DATA.

Survey 361
article thumbnail

Data center growth puts unprecedented pressure on power grids

Network World

According to a report released this week by Bloom Energy, US data centers will need 55 gigawatts of new power capacity within the next five years. The report , based on a survey of 100 data center leaders, also shows that 30% of all sites will be using onsite power by 2030. For reference, McKinsey research estimates that there was 25 gigawatts worth of demand in 2024.

article thumbnail

What Intel needs to do to get its mojo back

Network World

While 2024 was a banner year for some chip companies notably Nvidia and Broadcom Intel had a year it would rather forget. Another CEO was forced out , it lost market share, and its stock dropped 60% during a year that was strong for semiconductors. So much went wrong that some industry watchers proposed the unthinkable: a takeover by private equity.

Intel 368
article thumbnail

Examining disk space on Linux

Network World

There are many ways to evaluate disk space usage on Linux, and this post examines a number of commands that allow you to view used and available disk space. Using the df (disk free) command The df command stands for disk free and, as that name suggests, it focuses on how much free disk space is used and how much is available. By default, the command reports disk usage in kilobytes. # df Filesystem 1K-blocks Used Available Use% Mounted on devtmpfs 4096 0 4096 0% /dev tmpfs 1937768 0 1937768 0% /d

Linux 366
article thumbnail

The 2025 Recruitment Playbook

The 2025 Recruitment Playbook by Procom is a strategic guide tailored for hiring managers to navigate the evolving talent landscape. Highlighting innovations like AI-driven tools and data analytics, the playbook empowers leaders to streamline processes, enhance candidate experiences , and foster diversity and inclusion. It provides actionable insights for every recruitment stage—from sourcing and screening to onboarding and retention.

article thumbnail

AI-powered automation set for gains in 2025

Network World

Automation technology has long been a part of ITs arsenal, as enterprises work to simplify increasingly complex networking and operational environments. Looking ahead, the more AI is added to the automation mix, the more enterprise operations teams stand to gain. 2025 will be the year for AI initiatives, where AI-powered automation has reached a tipping point from being a nice-to-have to a requirement, said Bill Lobig, vice president, product management, withIBMAutomation.

Network 371
article thumbnail

Nvidia launches blueprints to help jump start AI projects

Network World

Give Nvidia credit, its not just talking up big ideas, its helping its customers achieve them. The vendor recently issued designs for AI factories after hyping up the idea for several months. Now it has come out with AI blueprints, essentially pre-built templates that give developers a jump start on creating AI systems. The blueprints were announced at both Consumer Electronics Show, where CEO Jensen Huang delivered a keynote and discussed blueprints among many other announcements, and in a blog

article thumbnail

81% of firms back a Zero Trust approach to cyber defense

Network World

A recent survey of cybersecurity professionals indicates that 81% of organizations are turning to zero trust as the foundation of their cybersecurity strategies. With growing concerns over advanced threats, VPN security issues, network complexity, and adversarial AI, enterprises are showing increased interest in a zero trust approach to security and moving away from firewall-and-VPN based architecture.

Survey 369
article thumbnail

FortiGate admins advised to run a compromise assessment

Network World

Network administrators with Fortinets FortiGate next generation firewall in their IT environments are being warned to thoroughly scrutinize systems for possible compromise, following last weeks dump of stolen configuration and VPN credentials by a threat actor. Patching is not enough, tweeted cybersecurity researcher Florian Roth on Thursday. If you take security seriously, you must run a compromise assessment to check whether the device and other systems in your network have already been breach

Firewall 365
article thumbnail

Activating Intent Data for Sales and Marketing

Sales and marketing leaders have reached a tipping point when it comes to using intent data — and they’re not looking back. More than half of all B2B marketers are already using intent data to increase sales, and Gartner predicts this figure will grow to 70 percent. The reason is clear: intent can provide you with massive amounts of data that reveal sales opportunities earlier than ever before.