Ubuntu 20.10 on Raspberry Pi now comes with the full Linux desktop and, believe it or not, support for clouds.
Learn how to set up a Squid Proxy on Ubuntu 20.04 and configure Firefox and Google Chrome web browsers to use it.
I managed to install and did hands-on with the upcoming Xfce 4.16 pre-release. It's super exciting with new features and updates.
This article describes how to explore and extract different type of information from binary files of ELF format using PyElftools
Linus Torvalds: I've tagged and pushed out 5.10-rc1, and everything looks fairly normal.
What's new in Ubuntu 20.10?
Let us see how to find out TLS/SSL cert expiry date from the Linux or Unix CLI.
Systemd (system daemon) is a modern system management daemon for Linux systems.
VnStat is a console-based network traffic monitoring tool design for Linux and BSD.
eWEEK - RSS Feed
eWeek - RSS Feed
If someone had told me five months ago that the name of the game for cloud in 2020 would be “the ability to scale,” I would probably have thought they were 10 years late. Fast-forward to now, and it seems the biggest asset for organizations is indeed the ability to scale their digital selves to meet the tremendous demand of a world where their physical self is literally constrained by social-distancing mandates.
The dramatic, global migration to online business in 2020 has become THE global-scale massive stress-test for cloud computing and the novelties it introduced years back. Despite some initial hiccups related more to application design than infrastructure capacity, or customers getting anxious over availability, cloud services helped organizations meet the demand spike in early 2020. Cloud equipped IT teams with the tools to not only elastically stretch resources or develop faster, but also scale down where required to preserve cost.
Strategic Planning Assumptions
Source: Gartner (June 2020)
Analysts had expected 2020 to be a year of rising NAND flash prices after a supply glut in 2019. The reasoning, backed by years of repeating patterns, was that after an oversupply, vendors like SK Hynix and Micron would slow production to drive prices up.
Cue COVID-19 and the ensuing chaos.
TrendForce, a market research firm that follows the memory market, said there has been a general decline in contract prices starting last quarter due to oversupply. This oversupply situation is attributed to the accumulation of inventory caused by the economic fallout from the COVID-19 pandemic.
As part of the trend toward more automation and intelligence in enterprise networks, artificial intelligence and machine learning are increasingly in-demand because the ability to programmatically identify problems with the network and provide instant diagnosis of complex problems is a powerful one.
Applying AI and ML to network management can enable the consolidation of input from multiple management platforms for central analysis. Rather than IT staff manually combing through reports from diverse devices and applications, machine learning can make quick, automated diagnoses of problems.
Verizon’s recent announcements of new partnership deals with Microsoft and with Nokia are designed to create a unified platform for businesses to use as they build their own edge deployments, according to experts.
Those deals will see Verizon offer Azure integration natively on its 5G Edge networking platform, as well as partnering for private 5G delivery with Nokia, with the latter agreement focusing on areas where Verizon does not already have a public networking presence, like Europe and Asia-Pacific. The company already has partnerships in place with AWS and IBM, among other major edge technology players.
Gartner is taking a swing at predicting future trends in IT, flagging neuromorphic computing and DNA storage technologies, and an expanded responsibility for CIOs to deliver digital-business outcomes.
Future technologies are resetting everything as current technologies are being stressed to their limits, and conventional computing is hitting a wall, Daryl Plummer, distinguished research vice president and Gartner fellow told the virtual audience at the firm’s IT Symposium/Xpo Americas.
The industry is on a roller-coaster ride that will lead the "reset of everything," Plummer said. The future technologies Gartner forecasts will impact the industry the most have three key common threads: they promote greater innovation and efficiency in the enterprise; they are more effective than the technologies that they are replacing; and they have a transformational impact on society, Plummer said.
COVID-19 has turned the world inside out, and the impact on infrastructure and operations teams is significant.
That's the conclusion of Gartner research vice president Jeffrey Hewitt, who detailed the core infrastructure trends that IT executives can expect to see in the next 12-18 months. Hewitt shared the research at Gartner's IT Symposium/Xpo 2020 Americas event, which is being held virtually this week. (Related story: Gartner's top 9 strategic technology trends for 2021)
"The situations created by COVID-19 have had a significant impact on the world," Hewitt said. "This impact is having an influence on almost all of the trends that infrastructure and operations leaders will be facing going forward."
All of the major IT hardware suppliers to one degree or other have adopted a consumption model, which is a fancy word for leasing. Rather than the outright purchase of hardware, customers lease it, usage is monitored, and the customer pays a monthly use fee.
Now Dell Technologies has announced it is expanding its as-a-service capabilities with Project APEX, to simplify how customers and partners access Dell technology on-demand.
APEX will cover an array of Dell products —storage, servers, networking, hyperconverged infrastructure, PCs, and broader solutions. Project APEX will unify the company’s as-a-service and cloud strategies, technology offerings, and go-to-market efforts previously sold under the On Demand monicker.
One of the best-known clothing retailers in the world has embraced edge computing technology and realized significant operational advantages as a consequence, one of its senior technical staff said in a presentation at the recent Edge Computing World conference.
The Gap operates more than 2,500 stores in North America and handles about $10 billion in transactions per year. The company has switched from traditional point-of-sale technology to a system based almost entirely on Apple’s iOS products, as iPads replace cash registers and scanner guns across sales floors.
Worldwide IT spending is forecast to reach $3.8 trillion in 2021, an increase of 4% from 2020, according to research firm Gartner, but still shy of pre-pandemic levels. IT spending in 2020 is expected to total $3.6 trillion, down 5.4% from 2019.
Certain industries facing prolonged lockdowns due to COVID-19, such as entertainment and air transport, have cut IT spending by more than 30% in 2020, according to Gartner, which delivered the current outlook for the global IT market at its virtual IT Symposium/Xpo 2020 Americas.
As COVID-19 continues to spread, forcing employees to work from home, the services of ISPs, cloud providers and conferencing services a.k.a. unified communications as a service (UCaaS) providers are experiencing increased traffic.
ThousandEyes is monitoring how these increases affect outages and the performance challenges these providers undergo. It will provide Network World a roundup of interesting events of the week in the delivery of these services, and Network World will provide a summary here. Stop back next week for another update, and see more details here.
When you want a process to continue running even after you log off a Linux system, you have a couple options.
One of them is to use the disown command. It tells your shell to refrain from sending a HUP (hangup) signal to the process when you log off. So, the process continues running. This can be very handy whenever you start a process and then, for some reason, you can’t stay logged in and wait until it finishes.
The disown command is a shell built-in. This means that you don’t have to install it to use it, but it also means that it won’t be available if you use a shell that doesn’t support it. For those of us using bash and related shells (zsh, ksh etc.), disown should be available and you can verify this with a command like this that lists shell built-ins and then looks for "disown":
Cisco has launched a family of core and branch routers that take aim at refining secure, cloud resource access distributed at the edge.
Cisco Catalyst 8000 edge router family includes three models--the high-end 8500 for data-center or colocation customers, the 8300 for branch users, and the software-based 8000 for virtual environments and feature support for advanced routing, SD-WAN, security and secure-access service edge (SASE)--depending on customer requirements.
Traditional Networks Were Never Designed for the Cloud
Prior to the advent of the cloud, IT was simply a department in an organization where users would go to get their phone issues resolved or their computers fixed. Today, IT plays a far more strategic role in the enterprise and is a key enabler of business growth.
As enterprises embrace digital transformation, the rapid adoption of SaaS applications and the migration of enterprise workloads to IaaS, it has become critical for businesses to view their IT investments as a way to maintain a competitive edge. Achieving the highest SaaS and IaaS-hosted application performance is no longer an option but a present day imperative. Any additional latency encountered while accessing SaaS applications or IaaS workloads directly impacts end user quality of experience and business productivity. Dissatisfied users can mean lost customers, prospects, and employees, all of which are critical from a business standpoint.
Working from home is becoming more of a permanent option with each passing day, but working from home means your network is provided not by your corporate enterprise but by carriers such as Verizon, AT&T, and Comcast.
Masergy this week introduced its SD-WAN Work From Anywhere portfolio that brings the benefits of SD-WAN networking to home and mobile users. The portfolio includes a home SD-WAN solution and a SASE-based mobile solution.
The new offerings extend Masergy’s Managed SD-WAN Secure solutions to the remote workforce, supporting their network connections with built-in security, dual-link redundancy, load balancing, and dynamic traffic-steering capabilities.
Deploying password-quality checking on your Debian-based Linux servers can help ensure that your users assign reasonably secure passwords to their accounts, but the settings themselves can be a bit misleading.
For example, setting a minimum password length of 12 characters does not necessarily mean that all your users' passwords will actually have 12 or more characters.
Let's stroll down Complexity Boulevard and see how the settings work and examine some that are worth considering.
The files that contain the settings we're going to look at will be:
Companies need to focus on architecting resilience and accept that disruptive change is the norm, says research firm Gartner, which unveiled its annual look at the top strategic technology trends that organizations need to prepare for in the coming year.
Gartner unveiled this year's list at its flagship IT Symposium/Xpo Americas conference, which is being held virtually this year.
Databases, also referred to as structured data, are an essential part of any data center. While databases do not typically hold a high percentage of the terabytes housed in a given data center, they do hold a high percentage of mission-critical data. Understanding their unique structure and operation is key to backing them up.
Structured data cannot be backed up like unstructured data due to three very big challenges. First, databases are typically stored in datafiles that are constantly changing as long as something is making updates to the database. This means you cannot just back them up like any other file.
When most non-technical people hear the term “seven layers”, they either think of the popular Super Bowl bean dip or they mistakenly think about the seven layers of Hell, courtesy of Dante’s Inferno (there are nine). For IT professionals, the seven layers refer to the Open Systems Interconnection (OSI) model, a conceptual framework that describes the functions of a networking or telecommunication system.
The model uses layers to help give a visual description of what is going on with a particular networking system. This can help network managers narrow down problems (Is it a physical issue or something with the application?), as well as computer programmers (when developing an application, which other layers does it need to work with?). Tech vendors selling new products will often refer to the OSI model to help customers understand which layer their products work with or whether it works “across the stack”.
Having completed its purchase of bare-metal cloud specialist Packet in March, Equinix is announcing the availability of Equinix Metal, an automated and interconnected bare metal cloud service in four major regions.
A bare metal service means the customer provides the operating environment, not just the apps. Typical IaaS/PaaS includes the operating system (either Linux or Windows) plus developer tools and middleware. In a bare metal environment, there's no operating system or virtual machine. All you get are cores, memory, storage, and networking.
IBM is expanding the role of its security-software package for hybrid-cloud deployments by improving the gathering of security data collected within customer networks and drawing on third-party threat-intelligence feeds, among other upgrades.
IBM’s Cloud Pak for Security, which features open-source technology for hunting threats and automation capabilities to speed response to cyberattacks, can bring together on a single console data gathered by customers’ existing security point products.
IBM Cloud Paks are bundles of Red Hat’s Kubernetes-based OpenShift Container Platform along with Red Hat Linux and a variety of connecting technologies to let enterprise customers deploy and manage containers on their choice of private or public infrastructure, including AWS, Microsoft Azure, Google Cloud Platform, Alibaba and IBM Cloud.
Who would have imagined that there’s a Linux tool available for downloading YouTube videos? Well, there is and it works for Linux as well as for other operating systems. So, if you need to watch some of the available videos even when your internet connection is flaky or you need to be offline for a while, this tool can be especially handy.
The tool for downloading videos is called youtube-dl. (The “dl” portion undoubtedly means “download”.) It’s very easy to use and drops webm or mp4 files onto your system. Both formats provide compressed, high-quality video files that you can watch whenever you like.
AMD had a busy week last week. It introduced the third generation of its Zen microarchitecture, which has been propelling the company’s comeback since 2017, and is the subject of reports it is looking to buy field-programmagle gate array (FPGA) maker Xilinx.
Five years ago, AMD was a non-entity in the CPU market and only kept afloat by its GPU business. Intel had written the company off and considered Qualcomm its biggest competitor. Then the company came out with Zen, a whole new design. “We started with Zen from scratch, starting from a clean sheet of paper,” said CEO Lisa Su in a video announcement.
The result is a nice comeback for a company that had been written off five years ago. It has 5.8% of the server market share as of Q2, 19.2% of desktop and 19.9% of mobile, according to Mercury Research, which specializes in semiconductor market share. The server share may seem low, but two years ago it was at zero and server turnover is slower than desktop.
The technological revolution in business continues apace. A huge range of technologies have become integral to the way businesses operate, and this dependence on tech is growing all the time. Those firms that fail to keep up with the accelerating pace of technological change – and the changing expectations of their clients and customers – risk falling behind their competitors.
Recent years have seen software-defined wide-area network (SD-WAN) products make a real leap forward. The advantages of SD-WAN are already well documented. More cost-effective and flexible than legacy router-centric multiprotocol label switching (MPLS) WANs, SD-WAN offers superior responsiveness, enhanced application performance, more robust security, and improved visibility. All that facilitates greater reliability and consistency and enables organizations to advance their cloud and digital transformation initiatives.
IT purchasing teams have a dismal track record, in part because they face a number of roadblocks. Undue influence of a few team members who only check in occasionally. Failure to include a diversity of stakeholders. Paying too much attention to what vendors say about their own products. Not giving security its due.
So what can IT pros do to improve things and ensure successful purchases when they're members of buying teams? Plenty, according to Gartner.
Common red masonry bricks – the same type used in construction projects, including many data centers – can be adapted and used to store electricity, researchers claim.
A team from Washington University in St. Louis has found that the red pigment in bricks can trigger a chemical reaction, in much the same way rust occurs, that enables bricks to store a significant amount of energy.
Specialized bricks aren't required; the synthesis works with any kind of brick, according to an article published on the university's news site. The team used common bricks bought from the Home Depot in Brentwood, Missouri, for 65 cents apiece.