AV Linux MX Edition is here about six months after the last update to the project with many new and updated tools for audio production and musicians.
There are many reasons why you may want to monitor the network activity on your Linux system.
After about six months of development, the upcoming LibreOffice 7.1 office suite is now ready for public beta testing.
OpenGL implementation on top of Vulkan with 'Zink' will continue.
I should be working on Bootstrap!
Learn how to setup private docker registry in Kubernetes cluster step by step.
you can get a very detailed overview of your web server's performance by enabling the mod_status module.
In this article you'll learn how to install the XFCE desktop on your Raspberry PI.
This guide explains what is Syncthing, how to install Syncthing on Linux, how to synchronize files between multiple Linux systems.
eWEEK - RSS Feed
eWeek - RSS Feed
Least privilege—the idea that each person in your organization should have the least number of privileges they need in order to accomplish a given task—is an important security concept that needs to be implemented in your backup system.
The challenge here is that network, system, and backup admins all wield an incredible amount of power. If one of them makes a mistake, or worse, intentionally tries to do the company harm, limiting the amount of power they have reduces the amount of damage they can inflict.
For example, you might give one network administrator the ability to monitor networks, and another one the ability to create and/or reconfigure networks. Security admins might be responsible for creating and maintaining network-administration users without getting any of those privileges themselves.
The reliability of services delivered by ISPs, cloud providers and conferencing services (a.k.a. unified communications-as-a-service (UCaaS)) is an indication of how well served businesses are via the internet.
ThousandEyes is monitoring how these providers are handling the performance challenges they face. It will provide Network World a roundup of interesting events of the week in the delivery of these services, and Network World will provide a summary here. Stop back next week for another update, and see more details here.
The Linux sort command can arrange command output or file content in a lot more ways than you might realize--alphabetically, numerically, by month and randomly are only some of the more interesting choices. In this post, we take a look at some of the more useful sorting options and explain how they differ.
The default sort might seem fairly straightforward. Digits come first, followed by letters and, for each letter, lowercase characters precede uppercase characters. You can expect to see this kind of ordering:
Looking at the numeric byte values for each of these letters, you may note that what you see above is not the "natural order" as far as ASCII is concerned.
Repeated failed login attempts on a Linux server can indicate that someone is trying to break into an account or might only mean that someone forgot their password or is mistyping it. In this post, we look at how you can check for failed login attempts and check your system's settings to see when accounts will be locked to deal with the problem.
One of the first things you need to know is how to check if logins are failing. The command below looks for indications of failed logins in the /var/log/auth.log file used on Ubuntu and related systems. When someone tries logging in with a wrong or misspelled password, failed logins will show up as in the lines below:
The edge is being sold to enterprise customers from just about every part of the technology industry, and there’s not always a bright dividing line between “public” options – edge computing sold as a service, with a vendor handling operational data directly – and “private” ones, where a company implements an edge architecture by itself.
There are advantages and challenges to either option, and which is the right edge-computing choice for any particular organization depends on their individual needs, budgets and staffing, among other factors. Here are some considerations.
The community around the open-sourced Software for Open Networking in the Cloud (SONiC) NOS got a little stronger as Apstra says its intent-based networking software is now more ready for enterprise prime-time than implementations from Cisco and Arista.
The Linux-based NOS, developed and open sourced by Microsoft in 2017, decouples network software from the underlying hardware and lets it run on switches and ASICs from multiple vendors while supporting a full suite of network features such as border gateway protocol (BGP), remote direct memory access (RDMA), QoS, and other Ethernet/IP technologies.
Nearly 70% of the 500 fastest supercomputers in the world, as announced at the Supercomputing 20 conference this week, are powered by Nvidia, including eight of the top 10.
Among them was one named Selene that Nvidia built itself and that debuted at Number 5 on the semi-annual TOP500 list of the fastest machines. With top-end systems requiring 10,000 or more CPUs and GPUs, they are enormously expensive, so government or research institutions own the majority of them.
That makes Selene all the more rare. It was built by and is based at Nvidia's Santa Clara, California, headquarters. (It’s widely believed there are many supercomputers in private industry that are not reported for competitive reasons.)
Huawei offers a combination of technology that is essential for the transformation of global energy companies as they strive to achieve their goals of delivering a greener, more reliable, and more secure energy future.
IBM has announced a definitive agreement to acquire Instana, an application performance monitoring firm. Financial details were not disclosed.
Once the acquisition closes, Instana's technology will be incorporated into IBM's hybrid cloud and artificial intelligence portfolios – two markets IBM leadership has targeted for high growth in the coming years. To that end, IBM recently said it would spin off the $19 billion Managed Infrastructure Services unit of its Global Technology Services division to help the company focus on hybrid cloud, AI and quantum computing.
Cambridge Consultants is working to deliver the largest airborne communications antenna available commercially.
The technology consultancy and product-development firm, which is part of Capgemini, has built a functioning, scaled-down version of a wireless antenna designed to beam connectivity from the sky. The prototype, announced this month, is part of a four-year project with UK-based start-up Stratospheric Platforms Limited (SPL).
SPL is developing a High-Altitude Platform (HAP) and communication system that's designed to deliver affordable, fast connectivity. The HAP aircraft system, as envisaged, would beam its Internet from the stratosphere, which is the second major layer of Earth's atmosphere. The aircraft, with a 60-meter wingspan, would be powered by hydrogen and could deliver nine days of flight stamina. Each HAP could supply coverage over an area of up to 140 kilometres in diameter, and around 60 aircraft could blanket a country the size of the U.K., according to Cambridge Consultants.
A German startup wants to use IoT sensors and a wireless-mesh network to detect forest fires within 10 minutes to an hour of when they start as opposed to the hours or even days it can take using current methods based on thermal imaging, satellite surveillance and human smoke spotters.
Dryad Networks is developing sensors to detect gases associated with forest fires and engineering how to network them using LoRaWAN and other wireless technologies so the data they gather can be analyzed in the company’s cloud.
The sensors are best placed about 10 feet off the ground in trees, secured by screws, making it more difficult for people or wildlife to disturb them and ensuring they won’t be obscured by grass or fallen leaves, according to founder and CEO Carsten Brinkschulte, a veteran of Apple and SAP.
Many Silver Peak SD-WAN customers have adopted Palo Alto Prisma Access cloud-delivered security services. You might be wondering how you can make Silver Peak and Palo Alto work together to take advantage of secure local Internet breakout from your branch or remotes sites to maintain both the performance and security of your business applications.
The Silver Peak Unity EdgeConnect™ SD-WAN edge platform integration with Palo Alto Networks’ Prisma Access cloud-delivered security enables enterprises to shift to a secure access service edge (SASE) solution. The joint solution can be deployed via two different integration methods, both centrally managed within the Silver Peak Unity Orchestrator™ management console. I will use the analogy of the red or blue pill from the movie The Matrix: “Do you want the red pill or the blue pill?” The choice is yours, either will work, but each is meant to enable a different type of deployment. In this blog, I will discuss both integration methods, how they work and when to choose each option. I’ll also provide a link to a technical video that demonstrates both deployment methods.
Software-defined WAN (SD-WAN) is getting a big boost from AIOps as vendors look to simplify operations, lower costs, and optimize WAN performance in the modern cloud era.
SD-WAN decouples the control aspect of a network from the hardware to create a virtualized network overlay, while AIOps applies machine learning and data analytics to IT operations to automate processes. The convergence of the two – a.k.a. AI-driven WAN – promises to usher in a new era of WAN networking that enables IT to go beyond optimizing network and application experiences to delivering the best experiences to individual users.
The need to maximize user experience, whether for employees or customers, has been a driving force behind much of the digital transformation networks have undergone. Things like business-critical applications, data-driven manufacturing and supply chains, immediate access to essential information, and advanced productivity tools require uninterrupted access to information from any place, using any device, and from any location.
One of the areas of the network that has undergone the most significant transformation, largely in response to data and resources being distributed throughout the increasingly distributed network—most often in the cloud—has been the WAN. SD-WAN provides the flexibility, performance, and reliability—providing almost instant ROI—that today’s complex networks require. They enable accelerated access to applications while reducing or eliminating delays and jitter that can come from streaming high-performance applications over the public internet.
The latest semiannual TOP500 list of the world's fastest supercomputers is topped by Fugaku, the same machine that won in June. Built by Fujitsu, Fugaku is three times as fast as its nearest rival.
TOP500 says that competition for its list seems to be lessening, with the full list of 500 systems having the fewest number of new entries since the organization started its tracking. The list is updated every June and November and has tracked the development of supercomputer performance and architecture since 1993. Nevertheless, two brand new systems managed to break into the top 10 list on their first try.
In its second cloud-native technology acquisition in as many months, Cisco is buying container security firm Banzai Cloud for an undisclosed amount.
Founded in 2017, Banzai is known for developing Kubernetes-based cloud application development and security technologies. It will become part of Cisco's Emerging Technologies and Incubation group, where the company brews new projects for cloud-native networking, security and edge computing environments.
VMware is extending its core virtual networking product family in an effort to help companies build infrastructure that can stand up to today's challenges, including the shift to remote work and the need to securely move applications across the distributed enterprise.
The enhancements span VMware's Tanzu, NSX and SD-WAN products, which fall under the company's Virtual Cloud Network (VCN) architecture. VCN defines how customers can built and control network connectivity and security from the data center across the WAN to multi-cloud environments. The company's core networking software, VMware NSX, underpins the VCN architecture, which also includes analytics capabilities.
Sensor power loss is the scourge of IoT.
Deploying millions of sensors is pretty much a useless endeavor if the devices continually run out of power. IoT sensors can't collect or transmit data without power.
That's one reason researchers are exploring ambient energy harvesting. Numerous projects have shown that small amounts of power can be generated by converting ambient energy in the environment – from stray magnetic fields, humidity, waste heat, and even unwanted wireless radio noise, for example – into usable electrical energy to power the IoT.
Ceridian is betting on hybrid cloud, network virtualization and automation as it aims to improve IT service delivery, weed out inefficiencies and bolster security.
The human capital management (HCM) company recently completed its transition to a cloud architecture, shuttering its on-premises data centers and migrating its applications and back-office systems to multiple clouds. "We are a true consumer of hybrid cloud technology," says CIO Warren Perlman. "We have operations in both [VMware Cloud on AWS] as well as native AWS, and also native Azure."
The millennial generation is becoming a driving force behind the circular economy of used IT equipment.
IT shops have typically bought used gear if they needed to replace old equipment and couldn't get parts from the vendor. But the idea of buying a low-mileage server with one or two years of use wasn't very popular. Companies typically bought new.
But that's changing. IT shops of all sizes are increasingly buying used gear, both brand name and white box brands from China, according to IDC. The research firm puts the CAGR at 5% and estimates sales of used IT infrastructure gear will reach $36 billion by 2024. The deals are being done through the major OEMs as well as resellers like ITRenew, which buys servers from hyperscalers, refreshes them, certifies they are functioning, and resells them.
Xilinx may be in the middle of an acquisition by AMD, but the partnerships and deals continue.
Most recently, Samsung and Xilinx have partnered to deliver the SmartSSD CSD flash drive, a compute-on-storage SSD device that uses a Xilinx FPGA to offload the processing work.
The ps command is key to understanding what's running on your Linux system and the resources that each process is using. It's useful to know how to display the information that ps provides in whatever way helps you focus on the problem you're trying to resolve. One aspect of this is being able to sort the output of the ps aux command by any column to highlight particular information, such as how much memory processes are using or how long they've been running.
The trick involves using the ps command's --sort option and knowing how to specify the column that you want to use for the sort. By default, ps sorts by process IDs (PIDs), showing the smallest first. PID 1 will appear at the top of the list, right under the column headings. The rest will follow in numeric order.
After its purchase of cloud storage automation specialist Spot for $450 million this past June, NetApp is releasing its first new product under the brand. Called Spot Storage, it's a "storageless" solution that's designed to enable automated administration of cloud-native, container-based applications.
NetApp describes Spot Storage as a cloud-based, serverless offering for application-driven architectures that run microservices-based applications in Kubernetes containers.
"Serverless computing" is a bit of a misnomer. Your application and data still reside on servers, but they're not tied to one particular physical location. Just like the cloud means never using the same physical box twice, a serverless storage service means the cloud provider runs the server and dynamically manages the allocation of machine resources.
When asked “what is your favorite candy bar?” my response was simple: a peanut butter cup. Somehow, the combination of chocolate and peanut butter in the right proportion perfectly hits the mark.
The ubiquitous Reese’s peanut butter cup in its bright orange wrapper always catches my eye at the supermarket checkout. While I usually resist, sometimes I just can’t, and the two cups in the package provide just the medicine I need. But, when the holidays come around, See’s Candies releases its own version of the peanut butter cup using much better dark chocolate and a very good peanut butter center.
However the very best peanut butter cup I’ve ever tasted is my sister’s – and actually, it’s a chocolate peanut butter bar. Why is her confection the best? It’s not just because it’s from my sister. It’s because she selects and uses only the highest quality ingredients. Not chocolate chips from a bag, but Valrhona or Guittard or Ghirardelli or another boutique brand. And she doesn’t use supermarket peanut butter from a jar, but rather, freshly ground peanut butter from the local health food store.
With the COVID-19 pandemic showing no signs of abating, migration to the cloud is expected to accelerate as enterprises choose to let someone else worry about their server gear.
In its global IT outlook for 2021 and beyond, IDC predicts the continued migration of enterprise IT equipment out of on-premises data centers and into data centers operated by cloud service providers (such as AWS and Microsoft) and colocation specialists (such as Equinix and Digital Realty).
The research firm expects that by the end of 2021, 80% of enterprises will put a mechanism in place to shift to cloud-centric infrastructure and applications twice as fast as before the pandemic. CIOs must accelerate the transition to a cloud-centric IT model to maintain competitive parity and to make the organization more digitally resilient, the firm said.
Palo Alto is rolling out a cloud service that promises to protect the highly distributed data in contemporary enterprises.
The cloud service -- Enterprise Data Loss Prevention (DLP) – will help prevent data breaches by automatically identifying confidential intellectual property and personally identifiable information across the enterprise, Palo Alto stated.
Data breaches are a huge and growing problem worldwide, but most of the current DLP systems were only designed to help global-scale organizations that have huge data protection budgets and staffs. Legacy and point solutions are not accessible, appropriate or effective for many of the companies that need them, said Anand Oswal, senior vice president and general manager with Palo Alto Networks.
IBM continued enhancing its core Cloud Pak hybrid cloud software offerings, this week bolstering automation and data features that will let customers simplify everything from software provisioning and patching, to data discovery and document processing.
IBM Cloud Paks are bundles of Red Hat’s Kubernetes-based OpenShift Container Platform along with Red Hat Linux and a variety of connecting technologies to let enterprise customers deploy and manage containers on their choice of private or public infrastructure, including AWS, Microsoft Azure, Google Cloud Platform and Alibaba.
The driving idea behind Cloud Paks is to ease the building, orchestrating and managing of multiple containers for enterprise workloads.
Nvidia's plan to buy British chip powerhouse Arm Ltd. for a cool $40 billion is just the latest move in the company's evolution from a gaming chip maker to a game changer in enterprise data centers.
Nvidia's goal is to take its high-powered processor technology and, through innovation, high-profile acquisitions (Mellanox, Cumulus and Arm) and strategic alliances (VMware, Check Point and Red Hat), provide a full-stack, hardware/software offering that brings the power of AI to companies that are modernizing their data centers.