Network World Data Center

Author Archives: Network World Data Center

7 ways to look at network connections on Linux

Whether you’re managing a network at work or just watching out for your home systems, it’s important to understand your network connections--how you communicate with public systems and those on the local network. This article covers some of the most important commands available on Linux to help you get a clear understanding of your local network and how it reaches outside.While the links provided include important tips on using network commands, some include commands that have been deprecated in favor of newer commands. Some of the most important commands to know today include ip a, ip neigh, ping, tracepath, dig, tcpdump and whois.To read this article in full, please click here

What is SASE? A cloud service that marries SD-WAN with security

Secure Access Service Edge (SASE) is a network architecture that combines software-defined wide area networking (SD-WAN) and security functionality into a unified cloud service that promises simplified WAN deployments, improved efficiency and security, and application-specific bandwidth policies.First outlined by Gartner in 2019, SASE (pronounced “sassy”) has quickly evolved from a niche, security-first SD-WAN alternative into a popular WAN sector that analysts project will grow to become a $10-billion-plus market within the next couple of years.To read this article in full, please click here

Intel Xeons to offer on-demand special functionality

Intel has a new program called Intel On Demand that will allow customers of its new Xeon Scalable Processors to unlock specialty processing engines for an extra fee.Intel has not disclosed what it will cost to access the On Demand features, which are activated through Intel Software Defined Silicon (SDSi), a newly added function using authentication keys to activate the additional features.For most customers, the standard Xeon core is all they need. But some may want the specialty processing engines included in the latest Xeon generation, codenamed Sapphire Rapids. The chips are available now to OEMs but will have a formal launch Jan. 10, 2023.To read this article in full, please click here

Gartner: Top trends to know for infrastructure and operations in 2023

Two networking technologies – secure access service edge (SASE) and wireless— lead a  list of six core trends that will impact enterprise infrastructure and operations activity in 2023, according to new research revealed by Gartner analysts at its IT Infrastructure, Operations & Cloud Strategies Conference this week.Implementing SASE, a term coined by Gartner, has been ongoing but is expected to grow substantially in the next year. Gartner forecasts that worldwide SASE spending will hit $9.2 billion in 2023, a 39% increase from 2022.To read this article in full, please click here

Gartner: What to do to make data centers more sustainable

Just a few weeks ago Gartner analysts said that sustainability and issues around it  would transcend all of the strategic technology trends for 2023.This week at its IT Infrastructure, Operations & Cloud Strategies Conference Gartner described how corporate data centers might make sustainability a practical reality.“IT leaders must avoid wasting value through the premature replacement of IT infrastructure,” said Philip Dawson, vice president and analyst at Gartner, at the conference. “They can do that by using real-time health analytics to maximize the useful life of data-center assets.”To read this article in full, please click here

AWS suffers outage at its US East 2 cloud region

Amazon Web Services (AWS) on Monday suffered an outage at one of its four regions in the US, just days after the close of its annual re:Invent conference where it announced a multitude of new and updated services.The outage, which according to the company lasted for about 75 minutes between 11:34 AM and 12:51 PM Pacific Time, resulted in internet connectivity issues to and from the US-East 2 region.The loss in connectivity for certain instances at the Ohio region, which was identified by AWS around 12:26, also saw several people taking to Twitter to complain about it.To read this article in full, please click here

Converting numbers on Linux among decimal, hexadecimal, octal, and binary

You might not be challenged very often to convert numbers from one numbering system to another but, when you are, you can do it with either of two fairly easy commands on the Linux command line.Converting in your head can be taxing, especially for longer numbers. While the decimal numbering system allows any digit in a number to have any of ten values (0-9), digits in hexadecimal numbers can have 16 (0-F), digits in octal numbers only eight (0-7) and digits in binary numbers only two (0-1).And, whether you like it or not, from time to time you are likely to run into numbers displayed in hex or octal, and knowing how to convert them from one number base to another can come in handy.To read this article in full, please click here

Linux bash tips: Many ways to loop using bash

The bash shell provides a superb functionality when it comes to writing scripts. This includes many ways to loop through a pile of data so that you can get a lot done with one running of a script. Whether you’re looping through a large group of numeric values, days of the week, usernames, words, files, or something else entirely, bash has an option that can make it easy for you.for, while, and until loops The first thing you need to know about looping in bash is that there are several basic commands to use. The while loop will loop as long as some particular condition holds true. The until loop will loop until some condition becomes true, and the for loop will run through a series of values regardless of their origin.To read this article in full, please click here

Commands for finding out if compressed Linux files are the same

Compressed Linux files are helpful because they save disk space, but what should you do when you have a series of compressed files and want to determine if any are duplicates? The zdiff and zcmp commands can help.To begin, if a directory contains two files like those below, it’s easy to tell just from the listing that they are not identical. After all, the file sizes are a little different. The files look like this:$ ls -l total 200 -rw-r--r--. 1 shs shs 102178 Nov 22 2021 2021.gz -rw-r--r--. 1 shs shs 102181 Nov 22 11:19 2022.gz If you compare the files with the diff command, it will confirm that the files differ:To read this article in full, please click here

Seagate introduces HDDs as fast as SSDs

Thanks to some engineering wizardry involving existing technologies, Seagate has introduced a new line of hard disk drives that can match the throughput of a solid state drive.The drives are part of Seagate’s Mach.2 line, called Exos 2X18. This is the second generation of the Mach.2, coming in 16TB and 18TB capacity and support either SATA3 6Gbps or SAS 12Gbps interfaces.The drive is essentially two drives in one, with two sets of platters served by two separate actuators, the arms with the drive heads, that work in parallel. So the 16TB/18TB capacity is achieved through two 8TB/9TB drives packed into one 3.5-inch form factor. The Mach.2 line is filled with helium to reduce friction.To read this article in full, please click here

Data-center requirements should drive network architecture

If you like survey data, here’s an interesting fact for you. Every year since 2000, when I started surveying enterprises on the question, the most important factor driving investment and change in enterprise networks was the data center. It’s like the network is the tail of a big, fuzzy, maybe-largely-invisible dog, and it’s time we look at where that dog might be leading us.Today’s virtual private networks (VPNs) evolved from the days when companies leased time-division-multiplexed (TDM) lines and connected their own routers. That approach focused companies on how to network sites, and they now think about networking people instead. But people are half the story; the other half is what the people are doing, which is accessing (increasingly via the cloud) data-center applications and databases.To read this article in full, please click here

10 most powerful network management companies

Network management has never been easy, and the proliferation of IoT devices, the shift to remote work, and the migration of applications to multi-cloud environments have added new levels of complexity to enterprise networks.IT execs are dealing with network management tool sprawl and employee skills gaps. They are also struggling to gain visibility across increasingly distributed networks, including SaaS instances that are not under their direct control.To read this article in full, please click here

Using the zip and zipcloak commands on Linux

Both the Linux zip and zipcloak commands can create encrypted zip files, but they have some important and interesting differences. Here’s what you need to know about how they work and what you should understand when using them.zip The zip command provides an easy way to take a group of files and squeeze their content into a single smaller file. To join a group of files into a single file—often done to make copying them to other systems considerably easier—use a command like the one shown below. The first argument is the name to be used for the zip file and is followed by the list of files to be included.To read this article in full, please click here

Dell expands data-protection product line

Dell Technologies has announced new products and services for data protection as part of its security portfolio.Active data protection is often treated as something of an afterthought, especially compared to disaster recovery. Yet it's certainly a problem for companies. According to Dell’s recent Global Data Protection Index (GDPI) research, organizations are experiencing higher levels of disasters than in previous years, many of them man-made. In the past year, cyberattacks accounted for 48% of all disasters, up from 37% in 2021, and are the leading cause of data disruption.One of the major stumbling blocks in deploying data-protection capabilities is the complexity of the rollout. Specialized expertise is often required, and products from multiple vendors are often involved. Even the hyperscalers are challenged to provide multicloud data-protection services.To read this article in full, please click here

Ways to look at logged in users on Linux

There are quite a few ways on Linux to get a list of the users logged into the system and see what they are doing. The commands described in this article all provide very useful information.users The users command displays a simple list of logged-in users. In this example, one user is logged in twice and is, therefore, listed twice.$ users nemo popeye shs shs Note that the users are listed in alphabetical order.who The who command provides additional information. The login terminal is identified along with the login date and time. The final field displays the terminal or the IP address of the connecting system.To read this article in full, please click here

AMD partners with Arm developer for exascale computing

AMD has announced plans to work with French chip designer SiPearl to build exascale-level supercomputing systems that use SiPearl's Arm-based Rhea processor with AMD's Instinct GPU accelerators.SiPearl is a relatively small startup that began operation in 2019 with a license for Arm’s Neoverse high-performance technology. It has forged a number of alliances with partners including Intel, Nvidia, HPE, and Graphcore.SiPearl is also involved with the European Processor Initiative (EPI), a consortium selected by the European Union to support the development of a European microprocessor specifically for high performance computing (HPC), as well as emerging applications such as artificial intelligence. The EPI's goal is to develop an Arm-based processor for an exascale supercomputer by 2023.To read this article in full, please click here

AMD gives new Epyc processors a big launch with help from partners

AMD has officially launched the fourth-generation of its Epyc server processors for high performance computing (HPC) in the data center, and all the top OEMs showed up for the party.Officially named the Epyc 9004 but commonly referred to by its codename “Genoa,” the new chip is based on the fourth generation of AMD’s Zen microarchitecture and built on a 5nm manufacturing process by TSMC.Thanks to its chiplet design, which breaks the monolithic CPU into smaller “chiplets” that are tied together with a high speed interconnect, Genoa has up to 96 cores (double Intel’s best at the moment). The chiplets, with 16 cores each, are easier to manufacture than a single 96-core CPU. Genoa includes the latest I/O technology, such as PCI Express 5.0, 12 channels of DDR5 memory, and CXL 1.1.To read this article in full, please click here

1 12 13 14 15 16 20