For those wishing to upgrade from Debian 10 Buster to Debian 11 Bullseye, the process is very simple, but does take a while depending on the connection speed to the Internet. An upgrade the other day took about an hour due to slow download speeds from the Debian US repository, likely because a lot of […]
At this year’s All Things Open conference, IBM unveiled a new cloud guide focused on open source and hybrid cloud deployments.
The post IBM Unveils Open Source Cloud Guide at All Things Open appeared first on Linux Today.
In the following tutorial, you will learn how to install and configure Maldet on AlmaLinux 8.
The post Configure Linux Malware Detect (Maldet) on AlmaLinux 8 appeared first on Linux Today.
Wine (originally an acronym for “Wine Is Not an Emulator”) is a free and open-source compatibility layer that aims to allow computer programs developed for Microsoft Windows to run on Unix-like operating systems including Linux. This article walks you through the installation process.
The post Linux for Starters: Your Guide to Linux, Part 21 – Wine appeared first on Linux Today.
Rocky Linux is a Community-based Enterprise Operating System, officially released by Rocky Enterprise Software Foundation (RESF) which is a free support platform with a complete binary-compatible release using the Red Hat Enterprise Linux (RHEL) operating system source code. The advantage of Rocky Linux is that it is completely free to install on any 64-bit x86 […]
In this post, I will share my opinion on two operating systems: Windows and Ubuntu. I will point out all the pros and cons of both. I will share some nice tips and tricks that might be handy in your daily workflow which will help you compare them or make you switch to one or […]
Visual Studio Code has become one of the most popular IDEs for coding. This tutorial will teach you how to install Visual Studio Code IDE using the code-server application on your Rocky Linux 8 server. You will also expose it via a public domain along with SSL support.
The post Install Visual Studio Code Cloud IDE on Rocky Linux 8 appeared first on Linux Today.
VirtualBox 6.1.28 is here, about three months after VirtualBox 6.1.26, to introduce initial guest and host support for the Linux 5.14 and 5.15 kernel series. This means that you can now use VirtualBox on GNU/Linux systems powered by Linux kernels 5.14 or 5.15, as well as to run distributions powered by Linux 5.14 or 5.15 […]
The post VirtualBox 6.1.28 Released with Initial Support for Linux 5.14 and 5.15 appeared first on Linux Today.
Redcore Linux is a Gentoo-based live-installable distribution that brings Gentoo’s power to home users. It targets casual desktop users and, to some extent, even power users. The Redcore Linux devs have announced the release of version 2102. This version is called “Polaris” and is mostly focused on polishing and fixing bugs. Learn more here.
The post Redcore Linux is a Gentoo-based Distro for Human Beings appeared first on Linux Today.
String manipulation is one of the fundamental concepts of bash scripting. This guide explains how to create and manipulate strings in bash, with examples in Linux.
The post Bash String Manipulation Explained With Examples In Linux appeared first on Linux Today.
Technology News, Tech Product Reviews, Research and Enterprise Analysis
Clearly, today’s best artificial intelligence software is driving change: hardly a day goes by without artificial intelligence (AI) software introducing new and improved capabilities. As features appear and use cases expand, organizations turn to AI applications to gain competitive advantage. AI software capabilities typically fall into several core areas: machine learning (ML), deep learning, predictive […]
I spoke with Cat Posey, Sr. Technology Director, Machine Learning, at Capital One, about strategies for effective collaboration in machine learning, including the value of building relationships. Where are companies with AI deployments at this point? I’ve heard that only 4 percent of companies have successfully deployed AI. Why is it so challenging? If you’d […]
The post Capital One’s Cat Posey on How to Build a Machine Learning Team appeared first on eWEEK.
When the telecom giant Vodafone decided to shift its entire global enterprise to a single digital environment, it clearly had its 300 million customers — and its future profitability — in mind. The move to an enterprise-wide digital core standardized more than 80% of Vodafone’s core business processes and boosted automation levels to over 60% […]
The post Beyond CX: A Digital Playbook for Thriving in a Hyper-Customer-Centric World appeared first on eWEEK.
This week, cloud communications provider, Dialpad, announced it is acquiring Koopid. This is the third contact center as a service (CCaaS) move Dialpad has made in the last two months. About one month ago, Dialpad announced it was buying Kare Knowledgeware for its virtual customer care capabilities. A few weeks before that, it announced a […]
The post Dialpad Rounds Out its CCaaS with Acquisition of Koopid appeared first on eWEEK.
I spoke with Ilyas Khan, Director and CEO of Cambridge Quantum, about his forecast for milestones in the future of quantum computing; he also detailed his company’s natural language processing toolkit and library. Among the topics we discussed: Basic question, but I think it helps even tech pros: what is quantum computing – why is […]
The post Cambridge Quantum’s Ilyas Khan on the Future of Quantum Computing appeared first on eWEEK.
In 2017, The Economist published an oft-quoted article claiming that “Data is the new Oil.” The article pointed out that the world’s five most valuable companies deal in, and extract value from data. The companies named are Apple, Microsoft, Alphabet (Google), Amazon and Facebook. Four years later, these five companies are still in the top […]
On a typical Wednesday morning, a cloud security engineer enters the office at about 8:00 AM and spends the next two hours culling through e-mails and text messages that report on minor security issues that occurred over the last 12-24 hours. These messages usually include things like phishing attacks where a small group of CRM […]
The post Better Proactive Security Strategies that Cost Less appeared first on eWEEK.
Hybrid work has been the single most important topic in my discussions with C-level executives at a company of all sizes. This isn’t just CIOs and CTOs I’m having conversations with, but also CEOs, heads of HR, CFOs and anyone in a leadership position. I recently had a conversation with Juan Vela, Global Head of […]
I spoke with Ajeet Singh, Co-founder and Executive Chairman, ThoughtSpot, about the search technology that’s central to ThoughtSpot’s data analytics platform, which he claims far surpasses traditional dashboard interfaces. Among the topics we discussed: As companies rely more and more on their data analytics platforms, what are the typical challenges they run into? What do […]
The post ThoughtSpot’s Ajeet Singh: “The Data Analytics Dashboard is Dead” appeared first on eWEEK.
I spoke with Bratin Saha, VP and General Manager, Machine Learning Services, AWS, about how the cloud has enabled machine learning, and SageMaker’s ability to ease ML deployment. (See podcast and video below.) Among his key points: Exponential Growth in ML Models “Now to give you some statistics, let’s say in 2018, just about when […]
The post AWS’s Bratin Saha on How SageMaker is Advancing Machine Learning appeared first on eWEEK.
Expect the unexpected – that’s just one of the core premises IT leaders need to embrace in the next few years, according to Gartner's top strategic predictions for 2022 and beyond.
IT leaders need to be able to move in multiple strategic directions at once, said Daryl Plummer, distinguished research vice president and Gartner Fellow, to the virtual audience at the firm’s IT Symposium/Xpo Americas, held this week.
“Resilience, opportunity and risk have always been components of good business strategy, but today these issues hold new meaning,” Plummer said. “This year’s predictions embody how resilience must be built in more non-traditional ways, from talent to business modularity, while opportunity and risk must be viewed with a greater sense of urgency.”
Edge computing is shaping up as the most practical way to manage the growing volume of data being generated by remote sources such as IoT and 5G devices.
A key benefit of edge computing is that it provides greater computation, network access, and storage capabilities closer to the source of the data, allowing organizations to reduce latency. As a result, enterprise are embracing the model: Gartner estimates that 50% of enterprise data will be generated at the edge by 2023, and PricewaterhouseCoopers predicts the global market for edge data centers will reach $13.5 billion in 2024, up from $4 billion in 2017.
With IT budgets growing at the fastest rate in 10 years, worldwide IT spending is projected to total $4.5 trillion in 2022, an increase of 5.5% from 2021, according to the latest Gartner forecasts.
All IT spending segments—from data-center systems to communications services—are forecast to grow next year, according to Gartner.
Enterprise software is likely to have the highest growth in 2022 at 11.5%, driven by infrastructure software spending. Global spending on devices grew over 15% as remote work, telehealth and remote learning took hold, and Gartner expects 2022 will continue that growth as enterprises upgrade devices and/or invest in multiple devices to support the hybrid work setting. “Enterprises will increasingly build new technologies and software, rather than buy and implement them, leading to overall slower spending levels in 2022 compared to 2021,” said John-David Lovelock, distinguished research vice president at Gartner.
The maximum transmission unit (MTU) is the largest number of bytes an individual datagram can have without either being fragmented into smaller datagrams or being dropped along the path between its source and its destination.
For Ethernet frames—and many other types of packets—that number is 1500 bytes, and it generally meets the requirements of traffic that can cross the public internet intact.
So, if 2000-byte Ethernet packets arrive at a router, it will split their payloads in two and repackage them into two packets that are each smaller than 1500 bytes and so meet the MTU.
The reliability of services delivered by ISPs, cloud providers and conferencing services (a.k.a. unified communications-as-a-service (UCaaS)) is an indication of how well served businesses are via the internet.
ThousandEyes is monitoring how these providers are handling the performance challenges they face. It will provide Network World a roundup of interesting events of the week in the delivery of these services, and Network World will provide a summary here. Stop back next week for another update, and see more details here.
It can take years for a CPU to go from design to silicon, so Arm is helping developers get a jump on things by putting virtual models of its chip designs in the cloud. The virtual models will allow developers to write and test applications before the actual silicon ships.
Dubbed Arm Total Solutions for IoT, the project is a full-stack solution intended for Internet of Things applications and use cases. Arm says the early access for developers, OEMs and service providers, as well as the reduction in product design cycles, could accelerate deployments by up to two years.
Arm doesn’t make chips the way Intel and AMD do. It makes designs and licenses them to more than 800 OEMs, which are responsible for everything from embedded devices to servers. Once Arm releases the basic chip design to its partners, the partners then add their own IP to differentiate from the competition, which takes time.
Hewlett Packard Enterprise company Aruba is taking the wraps of a new flagship data-center switch aimed at helping to better control and secure hybrid-cloud traffic in the enterprise.
The Aruba CX 10000 Series switch is a top-of-rack, L2/3 data-center box with 3.2Tbps of switching capacity, 48 ports of line rate 10/25GbE and six 40/100GbE ports, the company says. But its most intriguing component is an integrated Elba programmable data processing unit (DPU) from Pensando that helps eliminate the need for separate appliances for security and load balancing, for example.
Pensando is a startup lead by a crew of ex-Cisco stars including its chairmen of the board, former Cisco CEO John Chambers. Others leaders of the company include former Cisco engineering icons Mario Mazzola, Prem Jain, Luca Cafiero and Soni Jiandani, collectively known as MPLS based on their first initials. The MPLS group has founded a number of companies that were spun back into Cisco during Chamber’s time as CEO including Andiamo Systems for SAN switching, Nuova Systems for data-center switching and Insieme Networks for software-defined networking systems.
As organizations become less centralized they face new security challenges that require new ways of addressing threats that will change the basic fabric of network security, according to Gartner analysts.
A persistent challenge adapting to these changes is the skills gap--finding IT pros with the technical know-how to meet evolving security issues, Peter Firstbrook, Gartner vice president and anayst told attendees at Gartner IT Symposium/Xpo 2021 Americas.
“Cybersecurity teams are being asked to secure countless forms of digital transformation and other new technologies, and if they don’t have those skilled practitioners they move toward managed or cloud-delivered services where they might not have as much control as they’d like,” Firstbrook said.
The xargs command on Linux can make it easier to build and execute commands. If you want to run the same command for a group of files or users, xargs can often make that process easier. Here's a very simple example of xargs that creates or updates the update time on some files.
$ echo file1 file2 file3 | xargs touch $ ls -l total 0 -rw-r--r--. 1 shs shs 0 Oct 15 12:41 file1 -rw-r--r--. 1 shs shs 0 Oct 15 12:41 file2 -rw-r--r--. 1 shs shs 0 Oct 15 12:41 file3
The command below is similar, but creates a file with blanks in its name because the -d specifies the input termination character.
Digital investments, be they in AI, cloud, security, or engineering, will be among the top technology drivers for 2022, according to Gartner’s annual forecast of what it expects will be leading strategic IT trends.
“It is an overarching drive for organizations to do more with and scale the digital environments they have been rapidly developing during the pandemic,” said David Groombridge, research vice president at Gartner. “Most of these trends define technologies that together show how businesses will reconnect with partners and consumers to create scalable, resilient technical foundations for the future.” Gartner unwrapped its forecast at its virtual IT Symposium/Xpo Americas this week.
In trials, PowerLight’s system transmitted “hundreds of watts over hundreds of meters through the air” to power up a 5G cellular base station, according to Ericsson, which ran the demo in cooperation with PowerLight using an Ericsson Streetmacro 6701 base station. (It consumes a maximum of 300W.)
Four years after Intel first introduced Loihi, the company’s first neuromorphic chip, the company has released its second generation processor, which Intel says will provide faster processing, greater resource density, and improved power efficiency.
CPUs are often called the brains of the computer but aren’t, really, since they process only a handful of tasks at once in a serial manner, nothing like what the brain does automatically to keep you alive. Neuromorphic computing attempts to replicate the functions of the brain by performing numerous tasks simultaneously, with emphasis on perception and decision making
Neuromorphic chips mimic neurological functions through computational “neurons” that communicate with one another. The first generation of Loihi chips had around 128,000 of those digital neurons; the Loihi 2 has more than a million.
A new auction for enormously valuable mid-band spectrum and a rollback of availability for a different piece of it illustrates the uneven progress of 5G rollouts in the U.S. and represents a challenge for enterprises looking to take advantage of 5G technology.
The mid-band is valuable because it’s in a “Goldilocks” zone of the wireless spectrum—its frequencies are high enough to support higher throughput, while also being low enough to propagate effectively across relatively large areas.
To find a brief definition of the networking term you are looking for user your browser's "Find" feature then follow links to a fuller explanation.
5G is fast cellular wireless technology for enterprise IoT, IIoT, and phones that can boost wireless throughput by a factor of 10.
Network slicing can make efficient use of carriers’ wireless capacity to enable 5G virtual networks that exactly fit customer needs.
Microsoft has just made the Windows Subsystem for Linux (WSL) available in the Microsoft Store for Windows 11 systems. WSL is the application that allows Windows users to run a GNU/Linux environment directly on Windows without the overhead of a virtual machine or dual-boot setup.
One good aspect is that it installs as a separate app, decoupled from the OS. This means that users can update the app without having to wait for Windows OS updates to become available.
The app in the Microsoft Store is not a new version of WSL. It’s still WSL 2, but is a preview version that was added as an option for end users to get the latest features faster and more conveniently. The binaries will no longer be part of the Windows image.
Thanks to a US Securities and Exchange Commission filing new details have emerged about Kyndryl, the IBM spin-off of its managed-infrastructure services unit into a separately traded public company.
Kyndryl does exactly what the managed-infrastructure services unit of IBM’s Global Technology Services segment does: manage enterprises IT infrastructure, whether it comes from IBM or another vendor. That’s a challenge for Kyndryl because it has to deal with the trend toward cloud services and against on-premises infrastructure.
The split is expected to be complete by the end of 2021, and when it was announced last year, IBM CEO Arvind Krishna said IBM will focus on open hybrid-cloud and AI capabilities while Kyndryl would focus on modernizing customer infrastructure.
Incidents of cyber-attacks against IT networks are intensifying globally. The recent spate of ransomware attacks on the American oil pipeline system and the global meat supply chain highlights both the vulnerabilities that exist in our IT infrastructure, as well as the devastating impact these cyber breaches can have even when that breach might seem relatively innocuous. In the case of the Colonial Pipeline hack, the attack reportedly only reached the front-end business IT systems, not the IT and operations technology (OT) that actually control the pipeline itself. But, nonetheless, the attack resulted in shutting down the entire pipeline for a period of time causing alarming gas shortages up and down much of the East Coast of the United States. Long lines and panic buying became the norm for days.
Organizations have often relied on multiple vendors to connect and secure their branch offices. Through a Do-It-Yourself (DIY) approach, they may have installed a number of disparate WAN edge appliances including routers, firewalls, and WAN optimization devices. As a result, network installations are often complex and difficult to manage. These installations are no longer optimized for the digital era. The network security perimeter is dissolving as more and more applications and workloads are hosted in the cloud and more employees connect from anywhere. However, organizations sometimes don’t know where to start to transform their network and security architectures. They may also be tied to multi-year contracts that prevent them from moving their current architecture to a cloud-first SASE architecture.
Marvell has begun to sample the Octeon 10, a server microprocessor aimed at intelligent network management that has up to 24 Arm-compatible cores, making it as powerful as any server processor.
Marvell refers to the Octeon processor line as data processing units (DPUs). They are designed to run high-throughput data in the cloud and on-premises. The DPU is more commonly called the SmartNIC because it can offload non-computational tasks from the CPU like network packet processing, data encryption and compression. That frees up CPU cores to run general-purpose applications.
The Octeon 10 has a few firsts. It's the first processor made by TSMCs 5nm manufacturing process and the first processor to feature Arm’s Neoverse N2 core. The N2 core uses the new Armv9 architecture that the company claims can deliver 40% more single-threaded performance for a variety of workloads vs. the N1, but still retains the same level of power and area efficiency as N1.
VMware is in the process of spinning out from Dell Technologies, but the working relationship remains as strong as ever with a bunch of announcements from VMworld.
All told, the pair made four significant announcements at the show, the first being that VMware Cloud will be sold on systems acquired through Dell's Apex pay-as-you-go program. The new Apex offering gives customers the ability to move workloads across multiple cloud environments and scale resources quickly with predictable pricing and costs.
The new offering combines Dell’s hyperconverged infrastructure VxRail with VMware Cloud, VMware Tanzu for building cloud-native applications, and VMware HCX for application migration. Businesses can deploy the offering in their data center, at an edge location or a colocation facility with partners like Equinix.
By Austin Hawthorne, NaaS Sales Director, at Aruba, a Hewlett Packard Enterprise company.
In networking, there will always be a gap between what’s needed and what’s available, whether it’s budget, resources, or time. This not only impacts the ability of a business to be agile, innovative, and competitive, but it also affects its people, specifically the team that’s tasked with ensuring the network meets or exceeds the business’s ever expanding needs. Morale suffers when network teams are not afforded the ability to do the job at the level they expect of themselves and what’s needed to have the desired impact on the broader organization. Networks teams have the skills, passion, and drive to succeed, but all too often they must hurry a project through with “good enough” results, spending far too much time on low-level tasks like troubleshooting basic connectivity issues (many of which would not exist if there was enough time, resources, and budget to resolve the root causes).
You have to hand it to Larry Ellison, he is persistent. Or maybe he just doesn’t know when to give up. Either way, Oracle has shipped the latest in its Exadata server appliances, making some pronounced boosts in performance.
Exadata was the old Sun Microsystems hardware Oracle inherited when it bought Sun in 2010. It has since discontinued Sun’s SPARC processor but soldiered on with servers running x86-based processors, all of them Intel despite AMD’s surging acceptance in the enterprise.
When Oracle bought Sun in 2010, it was made clear they had no interest in low-end, mass market servers. In that regard, the Oracle Exadata X9M platforms deliver. The new Exadata X9M offerings, designed entirely around Oracle’s database software, include Oracle Exadata Database Machine X9M and Exadata Cloud@Customer X9M, which Oracle says is the only platform that runs Oracle Autonomous Database in customer data centers.
As technology extends deeper into every aspect of business, the tip of the spear is often some device at the outer edge of the network, whether a connected industrial controller, a soil moisture sensor, a smartphone, or a security cam.
This ballooning internet of things is already collecting petabytes of data, some of it processed for analysis and some of it immediately actionable. So an architectural problem arises: You don’t want to connect all those devices and stream all that data directly to some centralized cloud or company data center. The latency and data transfer costs are too high.
That’s where edge computing comes in. It provides the “intermediating infrastructure and critical services between core datacenters and intelligent endpoints,” as the research firm IDC puts it. In other words, edge computing provides a vital layer of compute and storage physically close to IoT endpoints, so that control devices can respond with low latency – and edge analytics processing can reduce the amount of data that needs to be transferred to the core.
Edge computing is gaining steam as an enterprise IT strategy with organizations looking to push storage and analytics closer to where data is gathered, as in IoT networks. But it’s got its challenges.
Its potential upsides are undeniable, including improved latency as well as reduced WAN bandwidth and transmission costs. As a result, enterprises are embracing it. Revenues in the edge-computing market were $4.68 billion in 2020 and are expected to reach $61.14 billion by 2028, according to a May 2021 report by Grand View Research.
Ever heard of Homebrew? It’s a package manager with a very unusual feature. It allows ordinary users to install packages without using sudo, and it’s available for both macOS and Linux. While the tool on each of these systems is referred to as Homebrew, the Linux version installs as linuxbrew.
Once installed, users can use Homebrew via the brew command to install packages very easily. Installation of Homebrew itself, however, does generally require sudo privileges and installs in /home/linuxbrew.
The man page for the brew command calls it “The Missing Package Manager for macOS (or Linux)”.
It’s the time of year when most enterprises are involved in a more-or-less-formal technology review cycle, as a preparatory step for next year’s budgeting. They’ve done this for decades, and it’s interesting to me that in any given year, enterprises share roughly three of their top five priorities. It’s more interesting that over three-quarters of enterprises carry over at least two of their top five priorities for multiple years. Why aren’t they getting addressed? They say their top problem is an “information gap.”
Buyers adopt network technologies that improve their business, not just their network. They have to justify spending, particularly spending on some new technology that someone inside or outside has suggested. That means that they have to understand how it will improve operations, how they’ll deploy it, and what the cost will be. To do this for a new technology, they need information on how that improvement would happen—and they say they’re not getting it.
When it comes to supporting the emerging hybrid workforce, getting the network and security right is top of mind among enterprise IT leaders.
That's one finding detailed in Cisco’s new Hybrid Work Index, which the company says will be updated quarterly to gauge how worker and technology habits are evolving as the COVID-19 pandemic continues.
Cisco says the index gleans information from anonymized customer data points culled from a number of its products, including Meraki networking, ThousandEyes internet visibility, Webex collaboration, and security platforms Talos, Duo and Umbrella. The index also incorporates third-party survey data from more than 39,000 respondents across 34 countries.
The enterprise network has evolved into a seemingly amorphous entity that traverses on-premises, cloud, and edge environments and raises new management and security challenges. That may explain why so many IT practitioners are eager to find out whether the concept of a secure access service edge (SASE) model, or framework, first articulated by
But, as illustrated by an @IDGTechTalk Twitter chat on Sept. 30, sponsored by @ComcastBusiness, it can be difficult to delineate the hype and reality within a conceptual framework. Moderated by CIO, blogger, and industry speaker Isaac Sacolick @nyike, the online session brought together IT practitioners, consultants, and influencers to weigh into whether enterprise networks are up for today’s security challenges and, in particular, the roles that SASE, SD-WAN, and Zero Trust may play in securing the new network edge.