Have you ever had the file in use error? Learn how to use the lsof command in Linux to view open files and the processes using them.
The post How to Use lsof Command in Linux to List Open Files appeared first on Linux Today.
Lynis is an open-source security auditing tool for extensive scanning of systems and its security defense to achieve compliance testing and system hardening. This article will help you to install Lynis from its official package repository and audit the system security in Ubuntu 20.04 LTS systems.
The post How to Use Lynis Linux Security Audit Tool on Ubuntu appeared first on Linux Today.
On a network, mail clients send messages to a mail server which then routes them to the correct destinations (other clients). The mail server uses a network application called Mail Transfer Agent (MTA). Here, we take a look at the six top options.
Bored seeing the same wallpapers every day? Automatically switching wallpapers is probably the best way to keep your desktop fresh and full of surprises. This article will show you how to automatically set new wallpapers using Styli.sh on Linux.
The post Styli.sh is a Great Dynamic Desktop Wallpaper Changer for Linux appeared first on Linux Today.
Mastodon is a free and open source microblogging platform similar to Twitter, but with user privacy and decentralization in mind. It’s one of many protocols that interacts with the Fediverse of protocols like Pleroma, GNU Social, and others. Unlike Twitter, Mastodon is not one social network. You can use Mastodon with a web browser. Or […]
One feature of the Bash shell that can be changed is the history command. Learn 3 useful tips on how to use the history command in Linux here.
The post 3 Useful Tips on How to Use History Command in Linux appeared first on Linux Today.
Craft CMS is a free, open-source content management system for websites. This guide shows how to install Craft CMS on Ubuntu 20.04 LTS (Focal Fossa).
The post How to Install Craft CMS with Nginx on Ubuntu 20.04 appeared first on Linux Today.
iRedmail is an open-source mail server solution that can deploy a full-featured mail server in several minutes. Learn to install iRedmail on Ubuntu 20.04 here.
SSH or Secure Shell Protocol is a cryptographic network protocol that is used to securely access a remote machine from another computer over an unsecured network via the command line. With SSH, you can execute commands on remote Linux systems and servers, send/transfer files, and normally manage everything you do from one place. In this […]
Technology News, Tech Product Reviews, Research and Enterprise Analysis
I spoke with Krishna Subramanian, co-founder and president, Komprise, about using Data Management-as-a-Service to manage data in a multi-cloud environment. What are the big challenges with managing and access data in multi-cloud world? 2. How do you see companies grappling with these challenges? What are some typical fixes, either successful or not? 3. Your web […]
The post Komprise Co-Founder Krishna Subramanian on Data Management-as-a-Service appeared first on eWEEK.
Apple is again making a run at the Enterprise, and Forrester has released a report indicating companies could save around $300 a year in support by moving to Macs. So why aren’t enterprises flocking to Apple? Ironically, Apple is running at the Enterprise as if it were the 1990s, not the 2020s, and they are […]
Philip Cooper, VP of Product, Tableau, discusses the trend toward making data analytics tools available to employees throughout the organization, not merely the C-suite. Among the topics we discussed: At what stage do you see companies now with the adoption of AI, and with augmented analytics? Are companies fully on board with running operations with […]
The post Tableau’s Philip Cooper on Data Analytics ‘Available to All’ appeared first on eWEEK.
Enterprises and their NetOps teams are challenged with sifting through large amounts of incoming data to identify technical, performance and security problems as they arise on the network. This is traditionally a manual, time-intensive process, meaning NetOps teams are prioritizing solutions that will help identify issues and fix them quickly – AIOps is one of […]
The post Top Ways Enterprises Apply AIOps for Network Management appeared first on eWEEK.
Since early 2013, the year Microsoft launched its first Surface Pro, PC vendors have been exploring the value and limits of detachable or ultra-portable 2-in-1 laptops. The general approach was straightforward – take the tablet with detachable keyboard concept of Apple’s iPad but add features to make it a truly business-class device. (Apple, slow to […]
The post Dell’s Latitude 7320 Detachable and the Value of Business-Class Ultra-Portable Laptops appeared first on eWEEK.
This week Bandwidth plans to roll out a version of its direct routing and E911 product, Duet, specifically for RingCentral. The product is currently available for Microsoft Teams and has seen strong adoption as Teams customers look to add calling. Now Bandwidth is providing this to RingCentral customers as an option to Ring’s current calling […]
Zero Trust is being invoked frequently by security professionals, almost as a cure-all for all those things that keep them up at night. In fact, the number of organizations using Zero Trust initiatives has more than tripled, from 16% three years ago to 60% today. But Zero Trust security can be a headache for the […]
In the sports-event industry, the COVID-19 pandemic created unprecedented challenges. Despite the setbacks, COVID-19 accelerated digital transformation initiatives, resulting in a better experience for fans as they returned to in-person sporting events. For professional baseball team Boston Red Sox, this meant moving to 100 percent digital ticketing at America’s most beloved ballpark, known better as […]
The post Talking Digital Transformation with the Boston Red Sox appeared first on eWEEK.
Microsoft recently held its annual partner event, Inspire, where it announced new features to its 365 suites. Many of these new changes are solutions to how the business world has pivoted over the last 18 months towards a remote-hybrid work environment across all business and enterprise areas. Last year’s Inspire event was in the middle […]
The post Microsoft Announces Windows 365 Cloud Desktop at Its Inspire Partner Event appeared first on eWEEK.
The mass shift to remote work in 2020 turned out to be a positive for most workers, which means the hybrid workforce – a combination of remote and in-office employees – is here to stay. 56% of employees said they wanted to stay at least partially remote even after restrictions lifted – and with most […]
The post Riding the Hybrid Work Wave with Automation: Advice for Companies appeared first on eWEEK.
Intel is pledging to introduce a faster generation of processors every year through 2025 by embracing new technology that enables smaller and smaller transistors and so more powerful chips.
By 2024, the transistors will be so small they will no longer be measured in nanometers as they are today, but in angstroms, which are a tenth as big, Intel CEO Pat Gelsinger announced this week. And the chips built around the transistors will be primarily defined by how much they improve in performance per watt over the prior generation.
The roadmap Gelsinger set down is as follows:
- Intel 10nm SuperFIN: In production now. This is Intel’s “Tiger Lake” generation
- Intel 7: In production under the name “Adler Lake,” with 10-15% more performance/watt over the prior generation.
- Intel 4 (Intel 7nm): Q2 2021 tapeout, with 20% greater performance/watt than the prior generation. “Meteor Lake” for the client, “Grand Rapids” for the Xeon.
- Intel 3: Ready for manufacture in the second half of 2023.
- Intel 20A: This ushers in the angstrom era. It is expected to ramp in 2024.
- 2025 and beyond: Intel 18A is in development for early 2025 based on expected refinements to the manufacturing process that will deliver another major jump in transistor performance.
To get down to Angstrom-sized transistors, Intel is investing in something called extreme ultraviolet (EUV) lithography, a manufacturing technique that will eventually replace the standard lithography used now. EUV is new, and that means there will be kinks to work out in the process, so expect a high manufacturing failure initially, which will translate to potential shortages.
A vast majority of Linux systems these days are using systemd – a suite of programs aimed at managing and interconnecting different parts of the system. Systemd started replacing the init process back in 2014 and is now the first process that starts when most Linux systems boot. To get a quick peek, you can run a command like this, which verifies that process 1 is indeed systemd. On this system, two additional systemd processes are currently also running.
$ ps -C systemd PID TTY TIME CMD 1 ? 00:00:59 systemd <=== 1244 ? 00:00:00 systemd 54429 ? 00:00:00 systemd
To see a little more detail, try the command below. The blank within the quotes is meant to prevent related processes like systemd-journald from showing up in the list.
Work-from employees will no longer be treated as a second-class citizen, which means they will get best-in-class technology including SD-WAN appliances, cellular backup alternatives, zero trust security support and maybe even battery backup.
That’s at least part of the plan for hybrid workers now and moving forward, said Cisco’s Todd Nightingale, executive vice president and general manager of the company’s Enterprise Networking & Cloud business. “The ‘return-to-office’ concept is a myth--it’s a world we have left behind.”
The explosive growth of network connected devices, known as “Internet of Things” or IoT, is well-understood. In a study conducted in September 2020, IDC predicted by 2024, more than 51 billion IoT devices – that’s billion with a “b” – will be connected to the internet. These devices include printers, display panels, heating ventilation and air conditioning controllers – think of a Nest thermostat you might have in your home – credit card processing terminals, security cameras, temperature sensors, flow sensors, medical devices, wind speed sensors on windmills, and even refrigerators and self-driving cars. These are just a few top-of-mind examples, list goes on and on.
Enterprises can look for more transparency from software vendors after the Biden Administration’s recent mandate that software bills of materials be provided by companies attempting to do business with the federal government.
Software bills of materials, frequently abbreviated to SBOMs, aren’t a new concept. The idea comes from the manufacturing sector, where it’s often crucial for buyers to fully understand the components and materials that were used to make a particular piece of equipment.
For example, a train engine might contain parts that aren’t rated for certain levels of vibration stress, making it unsuitable for use on a particular type of track. The goal of an SBOM is similar, listing all the proprietary, open source, and licensed components being used in a particular piece of software, so that a buyer can review it and check whether any of those components are outdated or insecure.
Cable giant Comcast has extended its mobile virtual network operator (MVNO) services for consumers to small and midsize businesses under the brand Comcast Business Mobile.
Comcast already provides a consumer mobility service called Xfinity Mobile. Verizon and Comcast launched the Xfinity Mobile service in 2017. Like Xfinity Mobile, Comcast Business Mobile offers 4G and 5G coverage from Verizon’s mobile network as well as Wi-Fi hotspots to fill in coverage.
The service offers Comcast Business Internet customers up to 10 lines with no line access fees. Customers are required to get broadband service from Comcast.
There's an unlimited plan that supports graduated pricing, starting at $45 per month for one line, $30 per line per month for four lines, and $24 per line per month for 10 lines. Comcast describes the unlimited plan as ideal for on-the-go employees who may not be within Wi-Fi range and need cellular data.
First off, CBRS is an acronym for Citizens Broadband Radio Service, and the upshot for IT pros is that it’s enabling enterprises to build their own private 4G/5G networks and result in improved 4G/5G offerings from service providers. Here’s a primer on CBRS—because you are going to want to know about this.
CB, as in CB radio?
No, good buddy, this has nothing to do with the Citizens’ Band radio service used by truckers for two-way voice communications and that lives in the 27MHz band in the US. CBRS lives in the 3.5GHz band.
IBM continues to fine-tune its mainframe to keep it attractive to enterprise users interested in keeping the Big Iron in their cloud and AI-application development plans.
The company released a new version of the mainframe operating system—z/OS V2.5—that includes beefed-up support for containers, AI, and security.
According to IBM, applications are at the heart of transactional and batch workloads running on z/OS. Fundamentally, developing new applications while modernizing existing applications is part of the digital transformation occurring in many enterprises.
Xilinx continues to be arguably the most productive chip maker in the Valley with the introduction of the Versal HBM adaptive compute acceleration platform (ACAP), the latest in its Versal processor portfolio.
Xilinx is known as a FPGA company, but the Versal line is so much more than that. Versal is the mashup of many different processor technologies into one die. Of course it has the FPGA programmable logic gates, but it also has Arm cores for applications and real-time processing, intelligent engines (AI blocks, DSPs), and I/O (PCIe Gen 5, CXL). The family ranges from the high-end Premium edition to the Versal AI Edge processors.
There is arguably no networking technology surrounded by more hype than software defined WANs (SD-WAN), and much of it is well deserved.
A significant number of network professionals either have an SD-WAN deployment underway or on their near-term roadmap. The reason is that SD-WAN architecture is optimized for cloud computing while legacy WANs were designed when client-server computing was the norm.
Iceotope Technologies will offer HPE ProLiant servers in Iceotope’s self-contained liquid cooled chassis, which can run in enterprise data centers and is ruggedized to operate in extreme edge scenarios as well.
The Ku:l chassis combines Iceotope's immersion liquid-cooling technology in Avnet racks and EcoStruxure management technology from Schneider Electric. It supports standard server boards in a 1U immersion cooling tray from Iceotope.
In an enterprise data center, the Ku:l chassis can add function without without adding load to the existing cooling systems since it is entirely self-contained. At the same time it is rugged enough for extreme edge environments that might damage standard IT equipment. The chassis provides zero-touch operation with advanced out-of-band management for complete remote control of the entire system.
Did you know that you can ask your Linux system to tell you what upgrades are available for the packages installed on it? You might be surprised by how many you’ll see, especially if you’re using the current release and don’t have your system set up for frequent or automatic updates.
Updates play an important role in keeping your Linux systems secure and performing well. Since most packages are updated as fixes or improvements to the code become available, it’s hard to predict how many will show up on any particular day. (Note: Updates should be done when your system is not performing other important tasks.)
Fedora and related systems
To check what updates are currently available for your Fedora or related system, use a command like this:
The trend towards increasingly distributed organizations has only been possible due to the availability of business-critical, cloud-based applications and tools. But many cloud-based applications and services place a great deal of demand on legacy WAN infrastructures, especially as expectations for a high-quality user experience continue to increase. To meet these demands, many organizations—especially those with multiple remote offices—have begun switching from performance-inhibited wide-area networks (WANs) to software-defined WAN (SD-WAN) architectures.
Before the recent pandemic, many enterprises had already begun adopting SD-WAN to cloud-enable their businesses, close skill gaps in the IT organization, increase network agility, and improve visibility into networks and applications. But the need for reliable access to critical resources became even more pronounced over this past year to support organizations looking to quickly adopt a work-from-anywhere business strategy. Solutions like SD-WAN and ZTNA have played a critical role in lessening the impact of a global quarantine by ensuring business continuity, maintaining user productivity, and helping businesses thrive. The fact is if recent events had occurred even just a few years earlier, a lot of companies open for business today would have had to close operations permanently.
Network-attached storage (NAS) is a category of file-level storage that’s connected to a network and enables data access and file sharing across a heterogeneous client and server environment.
“Ideally, NAS is platform- and OS-independent, appears to any application as another server, can be brought online without shutting down the network and requires no changes to other enterprise servers,” says research firm Gartner in its definition of NAS.
NAS history: evolution of network-attached storage
NAS evolved from file servers used in the 1980s to provide access to files for network clients. NAS devices typically consist of bundled hardware and software with a built-in operating system, and they typically use industry-standard network protocols such as SMB and NFS for remote file service and data sharing and TCP/IP for data transfer. In an enterprise setting, NAS can allow IT teams to streamline data storage and retrieval while consolidating their server and storage infrastructure.
With ransomware attacks growing in frequency and little being done to stop them, IBM is well-timed with its anti-ransomware Safeguarded Copy for its FlashSystems and on-premises storage-as-a-serivce offerings.
Safeguarded Copy is part of the IBM FlashSystem family of all-flash storage arrays, and it automatically creates immutable snapshots of date and stores them securely—meaning they cannot be accessed or altered by unauthorized users, the company says.
Safeguarded Copy is based on technology from IBM’s DS8000 mainframe storage array, which does the same thing as described above: it creates immutable copies of data that can be used to restore damaged original data volumes or build new and uncorrupted volumes.
New research findings reveal key requirements for third-party data center colocation services among large enterprises. This independent survey was carried out among 500 CIOs, CTOs, IT directors and heads of IT of global businesses based in the United States, the United Kingdom, France and Germany. The research was conducted in March 2021 by Vanson Bourne, a specialist research-based technology marketing consultancy offering clients analysis and advice based on incisive and rigorous research into their market environment.
Despite the inarguable advantages of operating Wi-Fi in the 6GHz frequency range, analysts say that the smart time to buy Wi-Fi 6E is whenever an organization would ordinarily make an upgrade – and not before.
Wi-Fi 6E is mostly identical to Wi-Fi 6, but the key difference is the 6E standard’s ability to take advantage of the 6GHz spectrum that was made available for unlicensed use by the U.S. last year. It’s a great deal of new bandwidth, enabling larger channels and consequently higher data rates, as well as being a much less busy area of the spectrum compared to the heavily used 2.4GHz and 5GHz bands.
(Enterprise Management Associates has published research called “Post-Pandemic Networking: Enabling the Work-From-Anywhere Enterprise,” a survey of 312 network-infrastructure and operations professionals that finds nearly all of them are budgeting for monitoring tools to better support users working from home. This article by EMA Vice President of Research Networking Shamus McGillicuddy details the major findings.)
Network managers will need to update their network monitoring and troubleshooting tools to support the huge increase in end users who will continue to work from home even after the COVID-19 pandemic is over.
In my previous two videos and blog posts, “Everything You Ever Wanted to Know about SASE – but were Afraid to Ask!,” and “SASE vs. SD-WAN,” I described the secure access service edge (SASE) as the combination of advanced WAN edge network functions at the branch integrated with a rich suite of cloud-delivered security services as defined in the Gartner report, “The Future of Network Security is in the Cloud,” . I described how SD-WAN is a foundational component and an integral part of a SASE architecture. The key is to start the SASE journey. An enterprise can start with SD-WAN or with cloud-security but ultimately, both must be transformed to realize the maximum benefits of the cloud.
The reliability of services delivered by ISPs, cloud providers and conferencing services (a.k.a. unified communications-as-a-service (UCaaS)) is an indication of how well served businesses are via the internet.
ThousandEyes is monitoring how these providers are handling the performance challenges they face. It will provide Network World a roundup of interesting events of the week in the delivery of these services, and Network World will provide a summary here. Stop back next week for another update, and see more details here.
The CCNA, which stands for Cisco Certified Network Associate, is Cisco's foundational certification for networking professionals.
The CCNA is a commonly required prerequisite for associate-level networking jobs such as network engineer, network administrator, network support technician or help desk technician. There used to be 10 CCNA concentrations, specific to cloud, collaboration, security, data centers, wireless, and other areas. Then, in February of 2020, Cisco combined all of its foundational networking certifications into one comprehensive CCNA certification.
OK, let's say you're a CIO who's promoted hybrid cloud computing in your company. Then along came all these news stories that call into question the whole notion of cloud economies. Do you send some covert IT team to block the news from the CFO's computer, or do you deal with it? Hopefully, the latter.
I've examined audits of over four-dozen cloud projects, and the good news is that most cloud applications make the business case. The bad news is that a lot, a worrisome lot, don’t. If you want yours to succeed, there are some strategies that will help, in the form of five “forgets” and four “remembers”.
By Atchison Frazer, Category Marketing, Edge Services Platform, Aruba a Hewlett Packard Enterprise company.
What is the edge? It could be a workplace, a hospital, a large sports stadium, a school, or even a remote worker’s home. In these environments, massive amounts of data are generated by users, devices, and things. Organizations that successfully harness that data – by analyzing and acting on it in real time at the source of the transaction closest to the user – can reveal valuable insights and deliver new services.
For example, the abundance of IoT sensors and high resolution/high frame-rate cameras have made it much easier to digitalize the flow of network performance and behavior data. IoT devices generate enormous amounts of data in short periods of time; business line managers are demanding near real-time analysis and action based on edge-generated data.
If you're curious about how many packages are installed on your Fedora system or how you can check on them, you might be surprised at how much information you have at your fingertips. With just a few commands, you can find out just about anything you might want know about packages and the repositories they came from.
What is a package?
To get started, a Linux package is simply a collection of files that performs some particular tasks. For example, the popular image-editing program GIMP is installed as a package, and it includes all of the files that you need to do some impressive image editing. You can easily ask if GIMP is installed with a command like this:
Prior to the pandemic, SD-WAN was primarily a niche technology pitched to enterprises as a way to cut costs and improve WAN flexibility by allowing traffic to burst directly from the branch office to the Internet, rather than backhauling it over expensive MPLS links to a central site.
Today, SD-WAN has emerged as a key enabler of the post-COVID enterprise in which mission critical applications live in multiple clouds, employees connect and collaborate from everywhere, and remote access to applications like Office 365, Salesforce and Zoom must be fast, secure, reliable, optimized, and automated for maximum business productivity and end user satisfaction.
The day is coming when enterprise IT professionals will be able to order network infrastructure components from a menu of options, have them designed to fit their business needs, and have the whole thing delivered and running in perhaps hours.
The concept is called Network as a Service (NaaS), and it has been around in a number of different forms for a few years, mostly in the service provider arena.
For enterprises, the as-a-service concept took hold as companies started to embrace cloud computing and its model of consumption-based capacity. In the infrastructure space, for example, more than 75% of infrastructure in edge locations and up to 50% of data-center infrastructure will be consumed in the as-a-service model by 2024, according to research firm IDC.
By Mason Coffman, Senior Product Marketing Manager at Aruba, a Hewlett Packard Enterprise company.
The circumstances of the past 18 months have made an indelible impact on the enterprise and has challenged traditional business models. Early in the flight to work-from-home scenarios, organizations had to adapt quickly to changing requirements to ensure business continuity.
Today, armed with lessons learned, enterprises are not only adapting to and thriving amidst new business realities, many organizations are also increasing investment in technologies. The objective: to yield a more flexible and resilient IT infrastructure to prepare for any major business disruptions in the future.
As I mentioned in my last blog, “Everything You Ever Wanted to Know about SASE – but Were Afraid to Ask!,” there are a lot of opinions, misconceptions, and questions about SASE.
- SD-WAN is dead!
- SASE is a replacement for SD-WAN
- SASE is cloud-hosted security with basic SD-WAN functionality added
- SASE and SD-WAN are different networking technologies
However, if you carefully read Gartner’s initial report, “The Future of Network Security is in the Cloud,” that introduced the term SASE (secure access service edge), you’ll see that it’s not “either” SASE or SD-WAN. Rather, SD-WAN is a foundational component and an integral part of a SASE architecture.
Linux systems generally start out with a large number of fonts available, especially once you've installed LibreOffice. Even so, you might find yourself craving some highly distinctive or unusual fonts to add a special tone to some of your projects. If so, you're in luck. You're likely to find many thousands of free fonts available online – bold, italic, calligraphy, modern, script, hand lettering, cursive, brush lettering, symbolic and more.
Here's a small sampling of popular sites that provide free fonts for easy downloading:
You can also type "free fonts" into your favorite search engine. Expect to see a huge number of responses. Keep in mind that not all fonts are free, but plenty of free fonts are available, and they're easy to view, download and install.
(Editor’s note: EMA has published “Revolutionizing Network Management with AIOps,” a report based on a survey of 309 network infrastructure and operations professionals who have experience with applying AIOps to network management. This article by EMA Vice President of Research Networking Shamus McGillicuddy further details the results of that report.)
Enterprise network infrastructure and operations teams are increasingly recognizing the value of applying AIOps to network management, according to new market research from Enterprise Management Associates (EMA).