Tech News

Linux Today

If you’ve ever needed to know whether a physical cable is connected to a network port on your Linux system, you don’t necessarily need to be right in front of the computer or server to check. There are several methods we can use from the Linux command line in order to see if a cable is […]

The post How to Detect a Linux Physical Cable Connection appeared first on Linux Today.

Author: Web Webster
Posted: September 18, 2021, 2:00 am

Ventoy is an open source tool for creating bootable USB drives. It was originally released as a command line program. A web UI was introduced later in March this year, but it wasn’t really functional or easy to use. These days the developers have announced the first version of Ventoy with a native Linux GUI. […]

The post Ventoy Now Available With GUI appeared first on Linux Today.

Author: Web Webster
Posted: September 18, 2021, 1:00 am

The Ubuntu team has announced an updated version of Ubuntu 18.04 LTS, Ubuntu 18.04.6, is now available. The new media includes a security fix for the BootHole security issues. Learn more about the new release here.

The post Ubuntu 18.04.6 Update Available Download with Security fixes appeared first on Linux Today.

Author: Web Webster
Posted: September 18, 2021, 12:30 am

The echo command is one of the most commonly and widely used built-in commands for Linux bash and C shells, typically used in a scripting language and batch files to display a line of text/string on standard output or a file. Learn more about echo command here.

The post 15 Practical Examples of ‘echo’ Command in Linux appeared first on Linux Today.

Author: Web Webster
Posted: September 18, 2021, 12:00 am

Since KDE Plasma 5.23 will be released in celebration of the project’s 25th anniversary, it’s obvious that it will be a great release that introduces better support for the next-generation Wayland display server, making Plasma desktop more stable, faster, and reliable. The Plasma Wayland improvements include the middle-click paste and drag and drop items between […]

The post KDE Plasma 5.23 “25th Anniversary Edition” Enters Public Beta Testing, Here’s What’s New appeared first on Linux Today.

Author: Web Webster
Posted: September 17, 2021, 11:35 pm

This brief guide explains how to list all installed packages in various Linux distributions, from the command line, with examples.

The post How To List Installed Packages In Linux appeared first on Linux Today.

Author: Web Webster
Posted: September 17, 2021, 11:30 pm

Cybercriminals are targeting Linux-based servers running Microsoft’s Azure public cloud environment that are vulnerable to flaws, after Microsoft didn’t automatically apply a patch on affected clients in its infrastructure. According to cybersecurity firm Recorded Future, the attacks began the night of Sept. 16 after a proof-of-concept exploit was published earlier in the day on GitHub. […]

The post Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes appeared first on Linux Today.

Author: Shelby Hiter
Posted: September 17, 2021, 11:00 pm

The networking startup, Kentik Labs, has launched with open source networking tools that leverage eBPF. They say the new platform is aimed at “the other side of the house” from its usual network engineering customers. Learn more about Kentik Labs here.

The post Kentik Labs Launches Open Source Networking Tools With eBPF appeared first on Linux Today.

Author: Web Webster
Posted: September 17, 2021, 10:00 pm

A significant part of hacking consists of diverting the function of existing systems and software, and hackers often use legitimate security tools to perform cyber attacks. Pentesting tool Cobalt Strike has been one such target, but what happened recently with a Red Hat Linux version of the Cobalt Strike Beacon is worthy of note. According […]

The post Hackers Alter Cobalt Strike Beacon to Target Linux Environments appeared first on Linux Today.

Author: Shelby Hiter
Posted: September 17, 2021, 9:35 pm

In the following tutorial, you will learn how to install Discord client on Ubuntu 20.04 using two different methods.

The post Two Ways to Install Discord on Ubuntu 20.04 appeared first on Linux Today.

Author: Web Webster
Posted: September 17, 2021, 8:00 pm

eWEEK

Technology News, Tech Product Reviews, Research and Enterprise Analysis

Episode 32: Semperis’s Mickey Bresman: How to Secure Your Active Directory Mickey Bresman, Co-founder and CEO of Semperis, provides three tips for securing your Active Directory against cyberthreats. Episode 31: Veritas’s Simon Jelley: How to Guard Against Ransomware Simon Jelley, GM & VP of Product at Veritas Technologies, explains why ransomware is so difficult to […]

The post eWEEK eSPEAKS Video Podcast with James Maguire appeared first on eWEEK.

Author: eWEEK Staff
Posted: September 17, 2021, 5:54 pm

Throughout my career as an IT consultant, working with various platforms and technologies, I’ve encountered a myriad of terms pitched to me to explain how their company is approaching modern software development. Terms like Agile, DevOps, SAFe, among others. All of them come with a passionate group of advocates ready to go to bat for […]

The post DevOps or ‘DevOops’: Three Tips for Successful DevOps appeared first on eWEEK.

Author: eWEEK EDITORS
Posted: September 16, 2021, 7:59 pm

Digital transformation of financial services is driving an increasingly automated analytics process in which personally identifiable information (PII) about borrowers is transmitted and stored in the cloud as part of the application review and underwriting process. Lenders need PII to make lending decisions. But, at the same time, financial institutions must protect the privacy and […]

The post Using Personal Data for Analytics Requires Balancing Accessibility and Security appeared first on eWEEK.

Author: eWEEK EDITORS
Posted: September 16, 2021, 7:24 pm

Remote work existed long before the COVID-19 pandemic. However, now it is part of every organization, in many cases, permanently. This fundamental change in the way we work has had a highly disruptive impact on organizations. The more distributed the workplace becomes, the more difficult the challenge of managing content becomes. Organizations continue to use […]

The post Box’s Mark Wayland on the Importance of the Content Cloud appeared first on eWEEK.

Author: Zeus Kerravala
Posted: September 15, 2021, 9:49 pm

Lenovo has long been one of the tech industry’s canniest vendors in terms of building and extending strategic partnerships. So it is no surprise that both new and existing partners shared the spotlight and rallying cries during last week’s Lenovo Tech World 2021 event. Building on Lenovo’s existing suite of Infrastructure-as-a-Service and Device-as-a-Service offerings, the […]

The post Lenovo Taps Strategic Partners for New Everything-as-a-Service and Edge Solutions appeared first on eWEEK.

Author: Charles King
Posted: September 15, 2021, 9:27 pm

Mickey Bresman, Co-founder and CEO of Semperis, provides three tips for securing your Active Directory against cyberthreats. Among the topics we discussed: What does “identity-driven cyber resilience” mean? Why is Active Directory (AD) security getting so much attention now, in particular? Share your top three tips for organizations looking to quickly beef up AD security […]

The post Semperis’s Mickey Bresman: How to Secure Your Active Directory appeared first on eWEEK.

Author: James Maguire
Posted: September 15, 2021, 9:08 pm

According to Daniël Pairon at KPMG, “resilience is the ability to deliver critical operations in the face of disruption. It allows organizations to absorb internal and external shocks, ensuring the continuity of critical operations by protecting key processes and resources such as systems, data, people, and property.” However, after COVID-19, I think that many business […]

The post Understanding IT Resilience: The Human Component appeared first on eWEEK.

Author: Myles Suer
Posted: September 15, 2021, 6:49 pm

During the recent Tesla AI Day event, Elon Musk said he discourages “machine learning, because it is really difficult. Unless you have to use machine learning, don’t do it.” Well, Musk may be right in his assessment, because machine learning is quite difficult to implement. Most companies desire the benefits of what artificial intelligence can […]

The post Elon is Right, AI is Hard: Five Pitfalls to Avoid in Artificial Intelligence appeared first on eWEEK.

Author: eWEEK EDITORS
Posted: September 14, 2021, 10:46 pm

I spoke with Simon Jelley, GM & VP of Product at Veritas Technologies, about why ransomware is so difficult to defend against, and his suggestions for critical best practices to lessen the threat. Among the topics we discussed: What’s the current state of ransomware? Why does security software alone keep falling short? Why is paying […]

The post Veritas’s Simon Jelley: How to Guard Against Ransomware appeared first on eWEEK.

Author: James Maguire
Posted: September 14, 2021, 10:12 pm

It’s a quandary many organizations face regarding cloud IT services. They can go the do-it-yourself (DIY) route, keeping most, if not everything, involving their IT environments in-house. Or, they can outsource the responsibilities to a third-party company. Both options offer certain benefits, depending on a company’s specific business needs. The problem – one of them, […]

The post Managing Your Cloud: 5 Benefits of Managed Services appeared first on eWEEK.

Author: eWEEK EDITORS
Posted: September 14, 2021, 5:53 pm

Network World

In a wide-ranging Investor Day conference Cisco executives outlined what they described as a $900 billion total market of high-level technology targets the networking giant expects to be a dominant force in developing toward in the next four years.

Those targets include the six areas Cisco has been building toward for the past couple years, including agile networks, optimized applications, hybrid work, the Internet of the future, end-to-end security and edge networking capabilities but also other areas such as cloud security, hybrid cloud, IoT and more.  

“We have built a portfolio designed for the modern world, and driven compelling new innovation from Cisco Plus and the Webex Suite to Silicon One and Secure X just a few examples of key technologies that we have provided over the past few years,” said Chuck Robbins, Cisco CEO. 

To read this article in full, please click here

Posted: September 16, 2021, 9:28 pm

Palo Alto Networks has bolted together its SD-WAN and security technologies to offer an integrated, cloud-based, secure-access service edge (SASE) offering aimed at simplifying distributed enterprises.

Called Prisma SASE, the package brings together the company’s core Prisma Access package of cloud-based, next-generation security gateways with its Prisma SD-WAN technology it got when it bought CloudGenix for $420 million last year.

To read this article in full, please click here

Posted: September 16, 2021, 4:32 pm

By Peter Thornycroft, Office of the CTO at Aruba, a Hewlett Packard Enterprise company.

For most organizations, whether designing a wireless network for a greenfield deployment or augmenting an existing one to accommodate 6Hz, there are several factors to consider for Wi-Fi 6E. Any discussion of how to introduce Wi-Fi 6E and the 6GHz band will depend on specifics on the ground, including existing switches, cabling, and priority locations…and most importantly, the access points (APs) themselves.   

wifi 6e image Aruba

 

To read this article in full, please click here

Posted: September 16, 2021, 2:57 pm

Whether in an existing network or a new one, there is an aspect of design that cannot be skipped: deciding if handing out IP addresses will be dynamic (automatic) or manual (one-by-one) or—the most common—a combination of the two.

By choosing to distribute them dynamically you are choosing to use a dynamic host configuration protocol (DHCP) service somewhere on your network, and there can be some tricks to that regardless of what server you use. For this discussion, I will describe how to use user classes on a Windows DCHP Server to specify a range of IP addresses and to assign range-specific DHCP options.

To read this article in full, please click here

Posted: September 16, 2021, 10:00 am

Secure access service edge (SASE) is a network architecture that rolls SD-WAN and security into a single, centrally managed cloud service that promises simplified WAN deployment, improved security, and better performance.

According to Gartner, SASE’s benefits are transformational because it can speed deployment time for new users, locations, applications and devices as well as reduce attack surfaces and shorten remediation times by as much as 95%.

With the pandemic, adoption of SASE  has been on an upward swing. A June report from Sapio Research, commissioned by Versa Networks, finds 34% of companies are already using SASE, and another 30% plan to in the next six to 12 months.

To read this article in full, please click here

Posted: September 16, 2021, 9:00 am

Juniper Networks is embracing an open campus-fabric management technology supported by other major networking vendors and at the same time making it simpler to use by removing much of the manual work it can require.

The company is adding Ethernet VPN-Virtual Extensible XLAN (EVPN-VXLAN)  support to its Mist AI cloud-based management platform let customers streamline network operations.

EVPN-VXLAN separates the underlying physical network from the virtual overlay network offering integrated Layer 2/Layer 3 connectivity as well as programmability, automation and network segmentation among other features. The open technology is offered in a variety of forms by most networking vendors including Cisco, Arista, Aruba and others.

To read this article in full, please click here

Posted: September 15, 2021, 3:49 pm

IBM announced the general availability of the industry’s first magnetic tapes and drives based on the LTO-9 Ultrium specification for massive data capacity and resilience.

The Linear Tape-Open (LTO) 9 spec features a 50% improvement in capacity over LTO-8, which translates to 18TB native capacity, or 45TB after data is compressed. Fujifilm and Sony announced media last month, but IBM is the first with a drive.

To read this article in full, please click here

Posted: September 14, 2021, 9:39 pm

While the unprecedented global pandemic has paused our lives for more than a year and a half now, it has not slowed the massive digitization of data, often referred to as digital transformation, that is now a primary challenge as businesses evolve their digital strategies.

Digitization of the enterprise, and the resulting digital services, are rapidly increasing requirements for larger technology stacks to store, compute, analyze and connect the data. Supporting this is the Valuates Report, which projects the global data center market for power will increase from $15 billion in 2020 to $21.5 billion by 2026.

To read this article in full, please click here

Posted: September 14, 2021, 5:23 pm

In today’s cloud-first world, the WAN and network security are more intertwined than ever before. To realize the full promise of digital transformation, work from anywhere, and the Secure Access Service Edge (SASE) model, enterprises must transform both their WAN and security architectures to support business applications hosted and accessed from anywhere, by anyone authorized to access them, and from any device.

Zero Trust: Securing the Edge by Application, User/Device Identity, and Role-Based Context

With the increase in cloud applications, mobile devices, remote workers, and IoT-connected devices, enterprises must align their security policies based on business intent while also striving for consistency. Aruba ClearPass integration with the Aruba EdgeConnect SD-WAN edge platform augments application intelligence with the user and device identity and role information. The additional identity-based context enables fine-grained segmentation and consistent security policy enforcement that can be enforced network-wide, from the edge to the cloud, while also accelerating troubleshooting and problem resolution.

To read this article in full, please click here

Posted: September 14, 2021, 3:13 pm

Most of us don't often think about swap space unless we run into a problem on our systems that suggests we don't have enough. Even so, viewing and gauging the adequacy of swap space on a system is not overly complicated, and knowing what's normal for your system can help you spot when something is wrong. So let's check out some commands that can help you look into your swap space. But first, let's review some fundamentals.

What swap space is and how it's used

Swap space is disk space that acts something like an extension of memory. It gets used when the system's physical memory (RAM) is full and the system needs more memory resources. It's called "swap" because the system will move some inactive pages in memory into the swap space so that it can accommodate more data in RAM. In other words, it provides a way to free up RAM on a busy system.

To read this article in full, please click here

Posted: September 14, 2021, 10:00 am

The reliability of services delivered by ISPs, cloud providers and conferencing services (a.k.a. unified communications-as-a-service (UCaaS)) is an indication of how well served businesses are via the internet.

ThousandEyes is monitoring how these providers are handling the performance challenges they face. It will provide Network World a roundup of interesting events of the week in the delivery of these services, and Network World will provide a summary here. Stop back next week for another update, and see more details here.

Posted: September 14, 2021, 2:19 am

For many organizations, empowering employees to continue to work from home after the pandemic, at least part of the time, is part of their new normal. There are plenty of reasons for this. First, employees overwhelmingly prefer the flexibility and work-life balance that work-from-anywhere (WFA) provides. And second, a new study from Stanfordshows that productivity increased a jaw-dropping 47% YoY in 2020, with most of that gain led by remote workers. And at the same time, many organizations have realized significant savings due to reduced costs associated with a dark physical campus.

To read this article in full, please click here

Posted: September 13, 2021, 9:33 pm

Gartner says the current paucity of skilled IT workers is foiling the adoption of cloud, edge computing, and automation technologies.

In its "2021-2023 Emerging Technology Roadmap" based on surveying 437 global firms, Gartner found that IT executives see the talent shortage as the most significant barrier to deploying emerging technologies, including compute infrastructure and platform services, network security, digital workplace, IT automation, and storage.

To read this article in full, please click here

Posted: September 13, 2021, 4:03 pm

VMware and Lenovo have collaborated on edge computing systems, with the goal of making  them more robust and resilient.

As part of the deal, Lenovo's Infrastructure Solutions Group (ISG) will pre-load VMware's edge software on its ThinkSystem SE350 Edge servers, a pair of ruggedized servers designed specifically for edge deployments. This includes vSphere, vSan, and Tanzu.

To read this article in full, please click here

Posted: September 13, 2021, 10:00 am

Since he helped build the highly successful ship that is VMware, it is widely expected the company’s CEO Raghu Raghuram, appointed in June, won’t rock that boat too much, at least in the near term. 

raghu raghuram ceo vmware VMware

Raghuram is credited with helping build and grow the company’s core virtualization and multicloud  business as well as its software-defined data center strategy. VMware also credits Raghuram with driving partnerships with Dell Technologies and hyper-scaler customers.

To read this article in full, please click here

Posted: September 13, 2021, 10:00 am

The thing about MPLS is that it’s a technique, not a service — so it can deliver anything from IP VPNs to metro Ethernet. It's expensive, so with the advent of SD-WAN enterprises are trying to figure how to optimize its use vs. less expensive connections like the internet

Did you ever order something online from a distant retailer and then track the package as it makes strange and seemingly illogical stops all over the country.

That’s similar to the way IP routing on the Internet works. When an internet router receives an IP packet, that packet carries no information beyond a destination IP address. There is no instruction on how that packet should get to its destination or how it should be treated along the way.

To read this article in full, please click here

Posted: September 10, 2021, 8:54 pm

The global pandemic waxes and wanes, but it has not slowed the massive digitization of data, often referred to as digital transformation, that is now challenging large enterprises and government organizations that are attempting to deploy new digital strategies. Since 2016, the digital transformation phenomena have generated 90% of the world’s data and this astonishing growth shows no sign of slowing.

Digital transformation is rapidly increasing requirements for larger technology stacks to store, compute, analyze and connect the data.  All of this requires more power as evidenced by the Valuates Report, which projects the global data center market for power increasing 43% from $15 billion in 2020 to $21.5 billion by 2026.  

To read this article in full, please click here

Posted: September 10, 2021, 8:42 pm

In the early days of the digital era, data centers were mysterious buildings shrouded in secrecy. They were huge, stark buildings billowing steam and looming in the distance. And the secrecy is understandable when you consider that for the enterprises using them, their IT operations within these buildings were the “crown jewels” supporting their businesses. 

While some enterprises chose to build and manage their own data centers, others have chosen to outsource their IT environment to third-party, multi-tenant colocation data centers for their shared resources and economies of scale. Those early centers were considered quite simple. They provided the secure data center space, power and connectivity (ping, power and pipe) for companies to outsource their IT environment.

To read this article in full, please click here

Posted: September 10, 2021, 8:06 pm

Palo Alto Networks has rolled out a Wi-Fi based package that the company says provides remote workers with enterprise-class security features.

Called Okyo Garde, the bundle incuds Wi-Fi-6-based hardware and mobile application-security software that includes threat-intelligence updates, and sells the hardware and software to enterprises as a customizable subscription. The package also offers malware and ransomware prevention, phishing protection, infected device detection, and suspicious-activity monitoring and control, the company said.

Workers’ homes are becoming enterprise “branches of one” with multiple devices without IT teams or a deep set of cybersecurity protections, yet they face the same threat landscape as any enterprise, said Mario Queiroz, executive vice president of Palo Alto Networks. Threat actors may even see them as more vulnerable and therefore attractive entry points into the corporate network,  Queiroz said.

To read this article in full, please click here

Posted: September 10, 2021, 6:07 pm

Cisco’s network certification lineup underwent a major overhaul last year, and one of the big changes is that specialization options appear at the professional level with the Cisco Certified Network Professional (CCNP).

Before Cisco rearchitected its certifications, there were 10 concentrations associated with Cisco Certified Network Associate (CCNA), Cisco’s foundational certification. As of last year, the CCNA no longer has different tracks. It’s focused on networking fundamentals, and there’s only one exam.

To read this article in full, please click here

Posted: September 10, 2021, 4:31 pm

IBM is keeping the faith for Unix just like it is for mainframes. It has announced a new Unix-based server, the IBM Power E1080, the first in a family that is based on the POWER10 processor.

IBM announced the POWER10 processor last year. Designed on a 7nm process, it is expected to deliver up to a three-fold improvement in capacity and processor energy efficiency within the same power envelope as IBM POWER9.

It features a new technology called Memory Inception that supports multi-petabyte memory clusters for massive memory-intensive workloads along with end-to-end memory encryption with quadruple the number of AES encryption engines per core compared to IBM POWER9.

To read this article in full, please click here

Posted: September 8, 2021, 8:32 pm

The Linux sleep and wait commands allow you to run commands at a chosen pace or capture and display the exit status of a task after waiting for it to finish. Sleep simply inserts a timed pause between commands. Wait, on the other hand, waits until a process completes before notifying you that it has finished.

Sleep

The sleep command pauses for a specified time. It’s generally used in a script, but works on the command line as well. In the example below, sleep pauses a minute between the two date commands.

$ date; sleep 60; date
Wed Sep 8 12:10:40 PM EDT 2021
Wed Sep 8 12:11:40 PM EDT 2021

The sleep command takes the numeric argument as the number of seconds. You can, however, ask it to sleep for various amounts of time by adding another character to the argument:
1m = 1 minute
2h = 2 hours
3d = 3 days
$ date; sleep 1m; date Wed Sep 8 12:16:38 PM EDT 2021 Wed Sep 8 12:17:38 PM EDT 2021

In fact, you can sleep for less than a second if you need.

To read this article in full, please click here

Posted: September 8, 2021, 6:30 pm

Amazon Web Services and NetApp have teamed up to tie NetApp’s on-prem storage and its proprietary OS for storage-disk arrays to AWS’s managed file-storage service, FSx.

Called Amazon FSx for NetApp ONTAP, the service provides things like capacity scaling, maintenance, and updates so on-prem staff doesn’t have to. Performance management with automatic tiering between local storage and fully elastic AWS storage is provided by AWS as well.

This is not a new area for AWS, which offers two similar services for Windows File Server and the Lustre HPC file-storage system. FSx for Windows File Server is a native Windows file system that offers Windows file storage in the cloud, while FSx for Lustre offers scalable, high-performance storage for HPC applications.

To read this article in full, please click here

Posted: September 8, 2021, 6:19 pm

In just a decade, the IT landscape has changed dramatically. Ten years ago, most business applications were hosted in corporate data centers, accessed by employees from the corporate network. Applications, data, and users were secured within a defined perimeter. Today, with the cloud, the rise of IOT, mobility, and remote working, the traditional security perimeter is dissolving, and the security architecture must now be tightly integrated with the network.

SASE (Secure Access Service Edge), as defined by Gartner in The Future of Network Security is in the Cloud report, combines SD-WAN with network security services delivered in the cloud. Five dynamics are making the advent of SASE inevitable with no way of turning back:

To read this article in full, please click here

Posted: September 7, 2021, 3:35 pm
Businesses would have hired even more IT workers — especially developers, cybersecurity staffers, and compliance experts — had they been able to find enough qualified candidates.
Posted: September 7, 2021, 10:00 am

Why is it that we always seem to think that we can adopt a technology that has seriously revolutionary pieces by just buying it and hooking it up? This, despite the undeniable fact that everything in tech is getting more sophisticated, more complex? Software-defined WAN is a technology like that, and because all SD-WANs aren’t the same, or even close to the same, you’ll have to do some digging to make SD-WAN your own.

To read this article in full, please click here

Posted: September 7, 2021, 9:30 am

Although it’s tempting to just deploy more access points (APs) when expanding your Wi-Fi network, there are many considerations to take in account first in order to get a high-performing result without overspending.

Step one is to clearly understand what you are trying to achieve, then analyze the current setup so you know how well the network serves the coverage area, and only then go about designing and deploying the APs.

To read this article in full, please click here

Posted: September 7, 2021, 9:25 am

Western Digital has announced a new disk drive architecture that combines flash memory with high-density hard-disk drives plus a small CPU to manage everything.

If this sounds familiar, it is. Several years ago there was an effort by WD and other hard-disk drive (HDD) makers to build hybrid hard drives, with small flash drives acting as a cache for the hard disk, but those efforts failed, said Ravi Pendekanti, senior vice president of HDD product management and marketing at WD.

“There was a huge pitfall in those [drives],” he told me. The drives didn’t know what kind of data they had, so they didn’t know that hot data was frequently accessed and should be written on to the flash drive, while warm or cold that wasn’t accessed as much should be written to the disk.

To read this article in full, please click here

Posted: September 2, 2021, 9:50 am

Self-driving cars must possess the ability to recognize road conditions, make decisions and take appropriate action, all in real time. This requires on-board artificial intelligence (AI) that ensures vehicles are able to “learn,” along with super-fast processing power.

Tesla unveiled a custom AI chip back in 2019 and soon began manufacturing cars with it. Now Tesla has unveiled a second internally designed semiconductor to power the company’s Dojo supercomputer.

The D1, according to Tesla, features 362teraFLOPS of processing power. This means it can perform 362 trillion floating-point operations per second (FLOPS), Tesla says.

To read this article in full, please click here

Posted: September 2, 2021, 9:30 am

The Linux set command allows you to change the value of shell options or to display the names and values of shell variables. Rarely used, it is a bash builtin, but is quite a bit more complicated than most builtins.

If you use the command without any arguments, you will get a list of all the settings—the names and values of all shell variables and functions. Watch out though! You’ll end up with a torrent of output flowing down your screen. There are just short of 3,000 lines of output on my Fedora system:

$ set | wc -l
2954

The top of the list looks like what you see below, but the output gets considerably more complicated as you move through it.

To read this article in full, please click here

Posted: September 2, 2021, 9:15 am

Gear Latest

Channel Description

Ready to cut the cord? We've tested the best buds that will never, ever get tangled.
Author: Parker Hall, Jeffrey Van Camp
Posted: September 19, 2021, 2:00 pm
Download one of these trail-mapping apps to make sure you can always find your way in the great outdoors, whether you have cell service or not.
Author: Arielle Pardes
Posted: September 19, 2021, 1:00 pm
Have you ever wanted a phone you could toss off a staircase? For $550, this durable smartphone is one tough mudder.
Author: Julian Chokkattu
Posted: September 19, 2021, 12:00 pm
Secretlab’s metal Magnus desk is expensive and heavy, but it makes cable management a breeze.
Author: Julian Chokkattu
Posted: September 19, 2021, 11:00 am
We've tested dozens of devices for watching stuff on 4K or HD TVs. These are our favorites.
Author: Medea Giordano, Jeffrey Van Camp
Posted: September 18, 2021, 2:00 pm
It’s expensive, but this espresso machine is a shrine to the pleasures of fine coffee.
Author: Jess Grey
Posted: September 18, 2021, 12:00 pm
Fall in love with a new hobby this autumn with discounts on phones, bicycle apparel, and more.
Author: Gear Team
Posted: September 18, 2021, 11:00 am
After being in one career for decades, I had to relearn how to apply for jobs—and how to stand out. Here are a few tips.
Author: Charles G. Thompson
Posted: September 18, 2021, 11:00 am
It’s still pricey even with this deal, but this Samsung has almost everything you could want in an Android phone right now.
Author: Julian Chokkattu
Posted: September 17, 2021, 11:30 pm
Get those Apple Wallets ready. From the Mini to the Pro Max, we break down all your options.
Author: Brenda Stolyar
Posted: September 17, 2021, 4:18 pm
With several new iPads on the market, choosing the right one is more complicated than ever. We’re here to help.
Author: Julian Chokkattu, Jeffrey Van Camp
Posted: September 17, 2021, 2:00 pm
This 4K flagship is fantastic, even if you plan to watch with all the lights on.
Author: Parker Hall
Posted: September 17, 2021, 1:00 pm
Whether you're riding a bike or schlepping a camera, these bags do the job right.
Author: Medea Giordano, Adrienne So
Posted: September 17, 2021, 1:00 pm
This week, we go deep on the photographic and cinematic capabilities of the iPhone 13.
Author: WIRED Staff
Posted: September 17, 2021, 12:00 pm
A smart wearable can be useful and fun—until it starts to fuel an obsession with numbers.
Author: Julie Gallagher
Posted: September 17, 2021, 12:00 pm
Last year’s flagship phone is still a great pick. If you’ve got a 2020 model, here are the cases, chargers, and other extras you’ll want to snag.
Author: Julian Chokkattu
Posted: September 16, 2021, 1:00 pm
The biggest name in action cameras is back with an improved model. The GoPro Hero 10 has a better chip, better software, and water-friendly enhancements.
Author: Scott Gilbertson
Posted: September 16, 2021, 1:00 pm
This capable, affordable camera has a manual shutter to block the lens when you don’t want it peeping.
Author: Medea Giordano
Posted: September 16, 2021, 12:00 pm
Apple now offers multiple versions of its popular fitness smartwatch. Here's our guide to them all.
Author: Adrienne So
Posted: September 16, 2021, 12:00 pm
If you plan to upgrade to Apple's new models, don't forget to cash in on your old one.
Author: Scott Gilbertson
Posted: September 16, 2021, 11:00 am