If you’ve ever needed to know whether a physical cable is connected to a network port on your Linux system, you don’t necessarily need to be right in front of the computer or server to check. There are several methods we can use from the Linux command line in order to see if a cable is […]
Ventoy is an open source tool for creating bootable USB drives. It was originally released as a command line program. A web UI was introduced later in March this year, but it wasn’t really functional or easy to use. These days the developers have announced the first version of Ventoy with a native Linux GUI. […]
The Ubuntu team has announced an updated version of Ubuntu 18.04 LTS, Ubuntu 18.04.6, is now available. The new media includes a security fix for the BootHole security issues. Learn more about the new release here.
The post Ubuntu 18.04.6 Update Available Download with Security fixes appeared first on Linux Today.
The echo command is one of the most commonly and widely used built-in commands for Linux bash and C shells, typically used in a scripting language and batch files to display a line of text/string on standard output or a file. Learn more about echo command here.
Since KDE Plasma 5.23 will be released in celebration of the project’s 25th anniversary, it’s obvious that it will be a great release that introduces better support for the next-generation Wayland display server, making Plasma desktop more stable, faster, and reliable. The Plasma Wayland improvements include the middle-click paste and drag and drop items between […]
The post KDE Plasma 5.23 “25th Anniversary Edition” Enters Public Beta Testing, Here’s What’s New appeared first on Linux Today.
This brief guide explains how to list all installed packages in various Linux distributions, from the command line, with examples.
Cybercriminals are targeting Linux-based servers running Microsoft’s Azure public cloud environment that are vulnerable to flaws, after Microsoft didn’t automatically apply a patch on affected clients in its infrastructure. According to cybersecurity firm Recorded Future, the attacks began the night of Sept. 16 after a proof-of-concept exploit was published earlier in the day on GitHub. […]
The post Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes appeared first on Linux Today.
The networking startup, Kentik Labs, has launched with open source networking tools that leverage eBPF. They say the new platform is aimed at “the other side of the house” from its usual network engineering customers. Learn more about Kentik Labs here.
The post Kentik Labs Launches Open Source Networking Tools With eBPF appeared first on Linux Today.
A significant part of hacking consists of diverting the function of existing systems and software, and hackers often use legitimate security tools to perform cyber attacks. Pentesting tool Cobalt Strike has been one such target, but what happened recently with a Red Hat Linux version of the Cobalt Strike Beacon is worthy of note. According […]
The post Hackers Alter Cobalt Strike Beacon to Target Linux Environments appeared first on Linux Today.
Technology News, Tech Product Reviews, Research and Enterprise Analysis
Episode 32: Semperis’s Mickey Bresman: How to Secure Your Active Directory Mickey Bresman, Co-founder and CEO of Semperis, provides three tips for securing your Active Directory against cyberthreats. Episode 31: Veritas’s Simon Jelley: How to Guard Against Ransomware Simon Jelley, GM & VP of Product at Veritas Technologies, explains why ransomware is so difficult to […]
Throughout my career as an IT consultant, working with various platforms and technologies, I’ve encountered a myriad of terms pitched to me to explain how their company is approaching modern software development. Terms like Agile, DevOps, SAFe, among others. All of them come with a passionate group of advocates ready to go to bat for […]
The post DevOps or ‘DevOops’: Three Tips for Successful DevOps appeared first on eWEEK.
Digital transformation of financial services is driving an increasingly automated analytics process in which personally identifiable information (PII) about borrowers is transmitted and stored in the cloud as part of the application review and underwriting process. Lenders need PII to make lending decisions. But, at the same time, financial institutions must protect the privacy and […]
The post Using Personal Data for Analytics Requires Balancing Accessibility and Security appeared first on eWEEK.
Remote work existed long before the COVID-19 pandemic. However, now it is part of every organization, in many cases, permanently. This fundamental change in the way we work has had a highly disruptive impact on organizations. The more distributed the workplace becomes, the more difficult the challenge of managing content becomes. Organizations continue to use […]
The post Box’s Mark Wayland on the Importance of the Content Cloud appeared first on eWEEK.
Lenovo has long been one of the tech industry’s canniest vendors in terms of building and extending strategic partnerships. So it is no surprise that both new and existing partners shared the spotlight and rallying cries during last week’s Lenovo Tech World 2021 event. Building on Lenovo’s existing suite of Infrastructure-as-a-Service and Device-as-a-Service offerings, the […]
The post Lenovo Taps Strategic Partners for New Everything-as-a-Service and Edge Solutions appeared first on eWEEK.
Mickey Bresman, Co-founder and CEO of Semperis, provides three tips for securing your Active Directory against cyberthreats. Among the topics we discussed: What does “identity-driven cyber resilience” mean? Why is Active Directory (AD) security getting so much attention now, in particular? Share your top three tips for organizations looking to quickly beef up AD security […]
The post Semperis’s Mickey Bresman: How to Secure Your Active Directory appeared first on eWEEK.
According to Daniël Pairon at KPMG, “resilience is the ability to deliver critical operations in the face of disruption. It allows organizations to absorb internal and external shocks, ensuring the continuity of critical operations by protecting key processes and resources such as systems, data, people, and property.” However, after COVID-19, I think that many business […]
During the recent Tesla AI Day event, Elon Musk said he discourages “machine learning, because it is really difficult. Unless you have to use machine learning, don’t do it.” Well, Musk may be right in his assessment, because machine learning is quite difficult to implement. Most companies desire the benefits of what artificial intelligence can […]
The post Elon is Right, AI is Hard: Five Pitfalls to Avoid in Artificial Intelligence appeared first on eWEEK.
I spoke with Simon Jelley, GM & VP of Product at Veritas Technologies, about why ransomware is so difficult to defend against, and his suggestions for critical best practices to lessen the threat. Among the topics we discussed: What’s the current state of ransomware? Why does security software alone keep falling short? Why is paying […]
The post Veritas’s Simon Jelley: How to Guard Against Ransomware appeared first on eWEEK.
It’s a quandary many organizations face regarding cloud IT services. They can go the do-it-yourself (DIY) route, keeping most, if not everything, involving their IT environments in-house. Or, they can outsource the responsibilities to a third-party company. Both options offer certain benefits, depending on a company’s specific business needs. The problem – one of them, […]
The post Managing Your Cloud: 5 Benefits of Managed Services appeared first on eWEEK.
In a wide-ranging Investor Day conference Cisco executives outlined what they described as a $900 billion total market of high-level technology targets the networking giant expects to be a dominant force in developing toward in the next four years.
Those targets include the six areas Cisco has been building toward for the past couple years, including agile networks, optimized applications, hybrid work, the Internet of the future, end-to-end security and edge networking capabilities but also other areas such as cloud security, hybrid cloud, IoT and more.
“We have built a portfolio designed for the modern world, and driven compelling new innovation from Cisco Plus and the Webex Suite to Silicon One and Secure X just a few examples of key technologies that we have provided over the past few years,” said Chuck Robbins, Cisco CEO.
Palo Alto Networks has bolted together its SD-WAN and security technologies to offer an integrated, cloud-based, secure-access service edge (SASE) offering aimed at simplifying distributed enterprises.
Called Prisma SASE, the package brings together the company’s core Prisma Access package of cloud-based, next-generation security gateways with its Prisma SD-WAN technology it got when it bought CloudGenix for $420 million last year.
By Peter Thornycroft, Office of the CTO at Aruba, a Hewlett Packard Enterprise company.
For most organizations, whether designing a wireless network for a greenfield deployment or augmenting an existing one to accommodate 6Hz, there are several factors to consider for Wi-Fi 6E. Any discussion of how to introduce Wi-Fi 6E and the 6GHz band will depend on specifics on the ground, including existing switches, cabling, and priority locations…and most importantly, the access points (APs) themselves.
Whether in an existing network or a new one, there is an aspect of design that cannot be skipped: deciding if handing out IP addresses will be dynamic (automatic) or manual (one-by-one) or—the most common—a combination of the two.
By choosing to distribute them dynamically you are choosing to use a dynamic host configuration protocol (DHCP) service somewhere on your network, and there can be some tricks to that regardless of what server you use. For this discussion, I will describe how to use user classes on a Windows DCHP Server to specify a range of IP addresses and to assign range-specific DHCP options.
Secure access service edge (SASE) is a network architecture that rolls SD-WAN and security into a single, centrally managed cloud service that promises simplified WAN deployment, improved security, and better performance.
According to Gartner, SASE’s benefits are transformational because it can speed deployment time for new users, locations, applications and devices as well as reduce attack surfaces and shorten remediation times by as much as 95%.
With the pandemic, adoption of SASE has been on an upward swing. A June report from Sapio Research, commissioned by Versa Networks, finds 34% of companies are already using SASE, and another 30% plan to in the next six to 12 months.
Juniper Networks is embracing an open campus-fabric management technology supported by other major networking vendors and at the same time making it simpler to use by removing much of the manual work it can require.
The company is adding Ethernet VPN-Virtual Extensible XLAN (EVPN-VXLAN) support to its Mist AI cloud-based management platform let customers streamline network operations.
EVPN-VXLAN separates the underlying physical network from the virtual overlay network offering integrated Layer 2/Layer 3 connectivity as well as programmability, automation and network segmentation among other features. The open technology is offered in a variety of forms by most networking vendors including Cisco, Arista, Aruba and others.
The Linear Tape-Open (LTO) 9 spec features a 50% improvement in capacity over LTO-8, which translates to 18TB native capacity, or 45TB after data is compressed. Fujifilm and Sony announced media last month, but IBM is the first with a drive.
While the unprecedented global pandemic has paused our lives for more than a year and a half now, it has not slowed the massive digitization of data, often referred to as digital transformation, that is now a primary challenge as businesses evolve their digital strategies.
Digitization of the enterprise, and the resulting digital services, are rapidly increasing requirements for larger technology stacks to store, compute, analyze and connect the data. Supporting this is the Valuates Report, which projects the global data center market for power will increase from $15 billion in 2020 to $21.5 billion by 2026.
In today’s cloud-first world, the WAN and network security are more intertwined than ever before. To realize the full promise of digital transformation, work from anywhere, and the Secure Access Service Edge (SASE) model, enterprises must transform both their WAN and security architectures to support business applications hosted and accessed from anywhere, by anyone authorized to access them, and from any device.
Zero Trust: Securing the Edge by Application, User/Device Identity, and Role-Based Context
With the increase in cloud applications, mobile devices, remote workers, and IoT-connected devices, enterprises must align their security policies based on business intent while also striving for consistency. Aruba ClearPass integration with the Aruba EdgeConnect SD-WAN edge platform augments application intelligence with the user and device identity and role information. The additional identity-based context enables fine-grained segmentation and consistent security policy enforcement that can be enforced network-wide, from the edge to the cloud, while also accelerating troubleshooting and problem resolution.
Most of us don't often think about swap space unless we run into a problem on our systems that suggests we don't have enough. Even so, viewing and gauging the adequacy of swap space on a system is not overly complicated, and knowing what's normal for your system can help you spot when something is wrong. So let's check out some commands that can help you look into your swap space. But first, let's review some fundamentals.
What swap space is and how it's used
Swap space is disk space that acts something like an extension of memory. It gets used when the system's physical memory (RAM) is full and the system needs more memory resources. It's called "swap" because the system will move some inactive pages in memory into the swap space so that it can accommodate more data in RAM. In other words, it provides a way to free up RAM on a busy system.
The reliability of services delivered by ISPs, cloud providers and conferencing services (a.k.a. unified communications-as-a-service (UCaaS)) is an indication of how well served businesses are via the internet.
ThousandEyes is monitoring how these providers are handling the performance challenges they face. It will provide Network World a roundup of interesting events of the week in the delivery of these services, and Network World will provide a summary here. Stop back next week for another update, and see more details here.
For many organizations, empowering employees to continue to work from home after the pandemic, at least part of the time, is part of their new normal. There are plenty of reasons for this. First, employees overwhelmingly prefer the flexibility and work-life balance that work-from-anywhere (WFA) provides. And second, a new study from Stanfordshows that productivity increased a jaw-dropping 47% YoY in 2020, with most of that gain led by remote workers. And at the same time, many organizations have realized significant savings due to reduced costs associated with a dark physical campus.
Gartner says the current paucity of skilled IT workers is foiling the adoption of cloud, edge computing, and automation technologies.
In its "2021-2023 Emerging Technology Roadmap" based on surveying 437 global firms, Gartner found that IT executives see the talent shortage as the most significant barrier to deploying emerging technologies, including compute infrastructure and platform services, network security, digital workplace, IT automation, and storage.
VMware and Lenovo have collaborated on edge computing systems, with the goal of making them more robust and resilient.
As part of the deal, Lenovo's Infrastructure Solutions Group (ISG) will pre-load VMware's edge software on its ThinkSystem SE350 Edge servers, a pair of ruggedized servers designed specifically for edge deployments. This includes vSphere, vSan, and Tanzu.
Since he helped build the highly successful ship that is VMware, it is widely expected the company’s CEO Raghu Raghuram, appointed in June, won’t rock that boat too much, at least in the near term.
Raghuram is credited with helping build and grow the company’s core virtualization and multicloud business as well as its software-defined data center strategy. VMware also credits Raghuram with driving partnerships with Dell Technologies and hyper-scaler customers.
The thing about MPLS is that it’s a technique, not a service — so it can deliver anything from IP VPNs to metro Ethernet. It's expensive, so with the advent of SD-WAN enterprises are trying to figure how to optimize its use vs. less expensive connections like the internet
Did you ever order something online from a distant retailer and then track the package as it makes strange and seemingly illogical stops all over the country.
That’s similar to the way IP routing on the Internet works. When an internet router receives an IP packet, that packet carries no information beyond a destination IP address. There is no instruction on how that packet should get to its destination or how it should be treated along the way.
The global pandemic waxes and wanes, but it has not slowed the massive digitization of data, often referred to as digital transformation, that is now challenging large enterprises and government organizations that are attempting to deploy new digital strategies. Since 2016, the digital transformation phenomena have generated 90% of the world’s data and this astonishing growth shows no sign of slowing.
Digital transformation is rapidly increasing requirements for larger technology stacks to store, compute, analyze and connect the data. All of this requires more power as evidenced by the Valuates Report, which projects the global data center market for power increasing 43% from $15 billion in 2020 to $21.5 billion by 2026.
In the early days of the digital era, data centers were mysterious buildings shrouded in secrecy. They were huge, stark buildings billowing steam and looming in the distance. And the secrecy is understandable when you consider that for the enterprises using them, their IT operations within these buildings were the “crown jewels” supporting their businesses.
While some enterprises chose to build and manage their own data centers, others have chosen to outsource their IT environment to third-party, multi-tenant colocation data centers for their shared resources and economies of scale. Those early centers were considered quite simple. They provided the secure data center space, power and connectivity (ping, power and pipe) for companies to outsource their IT environment.
Palo Alto Networks has rolled out a Wi-Fi based package that the company says provides remote workers with enterprise-class security features.
Called Okyo Garde, the bundle incuds Wi-Fi-6-based hardware and mobile application-security software that includes threat-intelligence updates, and sells the hardware and software to enterprises as a customizable subscription. The package also offers malware and ransomware prevention, phishing protection, infected device detection, and suspicious-activity monitoring and control, the company said.
Workers’ homes are becoming enterprise “branches of one” with multiple devices without IT teams or a deep set of cybersecurity protections, yet they face the same threat landscape as any enterprise, said Mario Queiroz, executive vice president of Palo Alto Networks. Threat actors may even see them as more vulnerable and therefore attractive entry points into the corporate network, Queiroz said.
Cisco’s network certification lineup underwent a major overhaul last year, and one of the big changes is that specialization options appear at the professional level with the Cisco Certified Network Professional (CCNP).
Before Cisco rearchitected its certifications, there were 10 concentrations associated with Cisco Certified Network Associate (CCNA), Cisco’s foundational certification. As of last year, the CCNA no longer has different tracks. It’s focused on networking fundamentals, and there’s only one exam.
IBM is keeping the faith for Unix just like it is for mainframes. It has announced a new Unix-based server, the IBM Power E1080, the first in a family that is based on the POWER10 processor.
IBM announced the POWER10 processor last year. Designed on a 7nm process, it is expected to deliver up to a three-fold improvement in capacity and processor energy efficiency within the same power envelope as IBM POWER9.
It features a new technology called Memory Inception that supports multi-petabyte memory clusters for massive memory-intensive workloads along with end-to-end memory encryption with quadruple the number of AES encryption engines per core compared to IBM POWER9.
The Linux sleep and wait commands allow you to run commands at a chosen pace or capture and display the exit status of a task after waiting for it to finish. Sleep simply inserts a timed pause between commands. Wait, on the other hand, waits until a process completes before notifying you that it has finished.
The sleep command pauses for a specified time. It’s generally used in a script, but works on the command line as well. In the example below, sleep pauses a minute between the two date commands.
$ date; sleep 60; date Wed Sep 8 12:10:40 PM EDT 2021 Wed Sep 8 12:11:40 PM EDT 2021
The sleep command takes the numeric argument as the number of seconds. You can, however, ask it to sleep for various amounts of time by adding another character to the argument:
1m = 1 minute 2h = 2 hours 3d = 3 days
$ date; sleep 1m; date Wed Sep 8 12:16:38 PM EDT 2021 Wed Sep 8 12:17:38 PM EDT 2021
In fact, you can sleep for less than a second if you need.
Amazon Web Services and NetApp have teamed up to tie NetApp’s on-prem storage and its proprietary OS for storage-disk arrays to AWS’s managed file-storage service, FSx.
Called Amazon FSx for NetApp ONTAP, the service provides things like capacity scaling, maintenance, and updates so on-prem staff doesn’t have to. Performance management with automatic tiering between local storage and fully elastic AWS storage is provided by AWS as well.
This is not a new area for AWS, which offers two similar services for Windows File Server and the Lustre HPC file-storage system. FSx for Windows File Server is a native Windows file system that offers Windows file storage in the cloud, while FSx for Lustre offers scalable, high-performance storage for HPC applications.
In just a decade, the IT landscape has changed dramatically. Ten years ago, most business applications were hosted in corporate data centers, accessed by employees from the corporate network. Applications, data, and users were secured within a defined perimeter. Today, with the cloud, the rise of IOT, mobility, and remote working, the traditional security perimeter is dissolving, and the security architecture must now be tightly integrated with the network.
SASE (Secure Access Service Edge), as defined by Gartner in The Future of Network Security is in the Cloud report, combines SD-WAN with network security services delivered in the cloud. Five dynamics are making the advent of SASE inevitable with no way of turning back:
Why is it that we always seem to think that we can adopt a technology that has seriously revolutionary pieces by just buying it and hooking it up? This, despite the undeniable fact that everything in tech is getting more sophisticated, more complex? Software-defined WAN is a technology like that, and because all SD-WANs aren’t the same, or even close to the same, you’ll have to do some digging to make SD-WAN your own.
Although it’s tempting to just deploy more access points (APs) when expanding your Wi-Fi network, there are many considerations to take in account first in order to get a high-performing result without overspending.
Step one is to clearly understand what you are trying to achieve, then analyze the current setup so you know how well the network serves the coverage area, and only then go about designing and deploying the APs.
Western Digital has announced a new disk drive architecture that combines flash memory with high-density hard-disk drives plus a small CPU to manage everything.
If this sounds familiar, it is. Several years ago there was an effort by WD and other hard-disk drive (HDD) makers to build hybrid hard drives, with small flash drives acting as a cache for the hard disk, but those efforts failed, said Ravi Pendekanti, senior vice president of HDD product management and marketing at WD.
“There was a huge pitfall in those [drives],” he told me. The drives didn’t know what kind of data they had, so they didn’t know that hot data was frequently accessed and should be written on to the flash drive, while warm or cold that wasn’t accessed as much should be written to the disk.
Self-driving cars must possess the ability to recognize road conditions, make decisions and take appropriate action, all in real time. This requires on-board artificial intelligence (AI) that ensures vehicles are able to “learn,” along with super-fast processing power.
Tesla unveiled a custom AI chip back in 2019 and soon began manufacturing cars with it. Now Tesla has unveiled a second internally designed semiconductor to power the company’s Dojo supercomputer.
The D1, according to Tesla, features 362teraFLOPS of processing power. This means it can perform 362 trillion floating-point operations per second (FLOPS), Tesla says.
The Linux set command allows you to change the value of shell options or to display the names and values of shell variables. Rarely used, it is a bash builtin, but is quite a bit more complicated than most builtins.
If you use the command without any arguments, you will get a list of all the settings—the names and values of all shell variables and functions. Watch out though! You’ll end up with a torrent of output flowing down your screen. There are just short of 3,000 lines of output on my Fedora system:
$ set | wc -l 2954
The top of the list looks like what you see below, but the output gets considerably more complicated as you move through it.