The awk, gawk and sed commands on Linux are extremely versatile tools for manipulating text, rearranging columns, generating reports and modifying file content.Using awk and gawk
To select portions of command output using gawk, you can try commands like those below. The first displays the first field in the output of the date command. The second displays the last field. Since NF represents the number of fields in the command output, $NF represents the value of the last field.$ date | awk '{print $1}'
Sat
$ date | awk '{print $NF}'
2023
Note that on Linux systems today, awk is usually a symbolic link to gawk, so you can type either command and get the same result. Here's what you'll probably see when you do a long listing of the awk executable:To read this article in full, please click here
Oracle on Monday said it is planning to invest $1.5 billion in Saudi Arabia to bolster its cloud computing capacity in the Middle East.The planned investment, which is part of Oracle’s memorandum of understanding with Saudi Arabia Ministry of Communications and Information Technology, will see the public cloud services provider expand its existing cloud region in Jeddah, and open a new one in Riyadh. In addition to the Riyadh region, Oracle will work with the ministry to set up a commercial and operational model for another cloud region in Saudi Arabia that complies with Saudi government requirements and local data residency regulations.To read this article in full, please click here
Oracle on Monday said it is planning to invest $1.5 billion in Saudi Arabia to bolster its cloud computing capacity in the Middle East.The planned investment, which is part of Oracle’s memorandum of understanding with Saudi Arabia Ministry of Communications and Information Technology, will see the public cloud services provider expand its existing cloud region in Jeddah, and open a new one in Riyadh. In addition to the Riyadh region, Oracle will work with the ministry to set up a commercial and operational model for another cloud region in Saudi Arabia that complies with Saudi government requirements and local data residency regulations.To read this article in full, please click here
A new offering from IT services provider NTT combines Palo Alto Networks' Prisma SASE offering with NTT's managed network services and AIOps infrastructure.SASE – secure access service edge – has been gaining interest for its potential to reduce networking complexity while improving security. It combines SD-WAN with security services, including secure web access gateway (SWG), cloud access security broker (CASB), zero-trust network access (ZTNA), and firewall-as-a-service (FWaaS), in a single, cloud-delivered service model.To read this article in full, please click here
Before the start of the Covid epidemic, a traditional WAN architecture with centralized security worked well for Village Roadshow. "Advanced security inspection services can be applied, firewalls can provide separation, and a demilitarized zone can be implemented," said Michael Fagan, chief transformation officer at Village Roadshow, the largest theme park owner in Australia.But it required backhauling traffic from remote sites to a data center or hub for security inspection, which can hurt application performance, create a poor user experience, and cost the company in productivity, he said.When the pandemic led the company to transition to a hybrid workforce, with most people working from home or from a remote site, it prompted Village Roadshow to rethink its network and security approach.To read this article in full, please click here
A computer network as we usually visualize it involves various cables (Ethernet, fiber optic, coaxial) connecting to appliances like routers and switches, which direct data packets where they need to go.The rise of Wi-Fi and cellular data networks have replaced some of those wires with wireless signals, but even radio waves are in the realm of the physical, and they connect back to cell towers or Wi-Fi access points.In the seven-layer OSI network reference model, all of that network equipment, processing, and communication occupies the lowest three layers: Level 3 (the network), Level 2 (the data link), and Level 1 (the physical layer).To read this article in full, please click here
Earlier this month AMD quietly disclosed 31 new CPU vulnerabilities affecting both its Ryzen desktop chips and EPYC data center processors. AMD disclosed the flaws in coordination with several researchers, including teams from Google, Apple, and Oracle.AMD typically releases vulnerability findings twice a year, in May and November, but decided to release the fixes early due to the relatively large number of new vulnerabilities and the timing of the mitigations.Despite the severity and number of flaws, AMD posted the lists to its security page. The flaws include BIOS/UEFI revisions that AMD has distributed to its OEMs. Since every OEM has a different BIOS/UEFI, it’s best to check with your motherboard maker or system vendor to see if you need the updates.To read this article in full, please click here
Startup ECL has emerged from stealth mode with some mighty big plans: to reinvent the data-center industry with hydrogen-powered modular data centers that use no local power and water.Rather than drawing power from the electrical grid the company will generate electricity for its data centers using hydrogen fuel cells. The only byproduct is water either as a liquid or vapor that is used for cooling with the leftovers being returned to the local environment. “So we can give back to the community some of the water that we’re producing,” said ECL founder and CEO Yuval Bachar, who previously helped design data centers for Facebook and LinkedIn.To read this article in full, please click here
Red Hat and Oracle announced jointly Tuesday that they have partnered to bring Red Hat Enterprise Linux (RHEL) to Oracle Cloud Infrastructure, broadening Oracle’s available public cloud options and creating a measure of détente between two long-standing competitors.The announcement couched the news as step one in a broader partnership between Red Hat and Oracle, but provided details mostly of the OCI integration. RHEL will be available on Oracle’s VMs, ranging in size from 1 to 80 CPU cores and from 1GB of memory up to 1024GB. Initial support will be limited to the newer OCI virtual machine shapes, which use AMD, Intel and Arm processors.To read this article in full, please click here
A hybrid cloud is a computing platform built from both private and public cloud components. A public cloud is what usually comes to mind when we talk about cloud computing: storage and compute resources offered by a vendor to customers who pay on a metered basis and don't have to worry about provisioning and managing the underlying infrastructure.One drawback to using public cloud resources is that they often run in virtualized environments, and customers share hardware and other resources. As an alternative, a customer could set up a private cloud themselves on their own infrastructure, offering the same sort of flexible access to compute resources to internal users.To read this article in full, please click here
Outages that made Microsoft Azure and multiple Microsoft cloud services widely unavailable for 90 minutes on Jan. 25 can be traced to the cascading effects of repeated, rapid readvertising of BGP router prefixes, according to a ThousandEyes analysis of the incident.The Cisco-owned network intelligence company traced the Microsoft outage to an external BGP change by Microsoft that affected service providers. (Read more about network and infrastructure outages in our top 10 outages of 2022 recap.)Multiple Microsoft BGP prefixes were withdrawn completely and then almost immediately readvertised, ThousandEyes said. Border gateway protocol (BGP) tells Internet traffic what route to take, and the BGP best-path selection algorithm determines the optimal routes to use for traffic forwarding.To read this article in full, please click here
Linux systems support a number of file editors – like vi, vim, neovim, ne, GNU Emacs etc. But you can also install an editor that allows you to view the contents of and make changes to binary files--hexedit.With hexedit, you can edit images, executables and other binaries, though you have to know a lot about the format of the file you’re editing to make valid changes that don't disrupt the file's format. After all, you'll be editing one byte at a time. This is not meant to imply that you can't use this command for viewing or editing text files. There's just little or no reason to do that.To read this article in full, please click here
To get the most out of SD-WAN, organizations should augment it with analytics and automation that can provide valuable insights and boost security as well, according to IDC.“SD-WAN plays an important role in just about everything enterprises want to do from supporting distributed applications or multi-cloud applications to providing on-ramps to the public cloud backbone and connectivity to site-to-site or site to multi-site use cases,” said Brandon Butler, research manager with IDC’s Enterprise Networks practice speaking at a Cisco-sponsored webinar this week.To read this article in full, please click here
Juniper Networks is releasing a new version of its Apstra intent-based networking software that includes more extensive configuration capabilities, additional multivendor hardware and software support, and improved environmental analytics.Apstra keeps a real-time repository of configuration, telemetry and validation information to ensure a network is doing what the enterprise wants it to do. Companies can use Apstra's automation capabilities to deliver consistent network and security policies for workloads across physical and virtual infrastructures.In addition, Apstra performs regular network checks to safeguard configurations. It's hardware agnostic, so it can be integrated to work with Juniper’s networking products as well as boxes from Cisco, Arista, Dell, Microsoft and Nvidia.To read this article in full, please click here
Analysts are debating what effect the layoffs at Alphabet will have on the delivery of enterprise cloud services at its Google subsidiary, while investors call for deeper cuts.
Amazon Web Services (AWS) on Tuesday said its second infrastructure region in Australia has been made available for customers.The new region in Melbourne (codenamed: ap-southeast-4), which was first announced in December 2020, will consist of three availability zones.Availability zones are the building blocks of an AWS region that place infrastructure in separate and distinct geographic locations.AWS had launched its first infrastructure region in Sydney in 2012, which also has three availability zones.Other than the two regions, Australia is home to seven Amazon CloudFront Edge locations in Australia, backed by a Regional Edge cache in Sydney. The company had launched an additional CloudFront point of presence (PoP) in Perth in 2018.To read this article in full, please click here
A new AI-based system from Nvidia sniffs out unusual behavior and ties it to users, in an effort to prevent insider attacks and protect digital credentials.
Facing what they perceive as an inevitable recession, IT planners are moving ahead with infrastructure investment but also calculating how to shift priorities if spending cuts become unavoidable, according to monthly surveys by IDC.Roughly 81% of respondents expect their spending to stay the same or increase for 2023, despite anticipating economic “storms of disruption." The results are based on surveys conducted in November and December 2022 of more than 800 IT decision makers in North America, Asia/Pacific, and Europe.Cloud spending is increasing, and an IDC Quick poll of 69 CIOs from its global CIO Executive Council conducted in December found two-thirds of them are already spending more on cloud services than they budgeted. The two studies are cited in the IDC report “Early 2023 Cloud Budget Outlook: Aligning IT Spending with the Business Conditions” published this month.To read this article in full, please click here