Weeks after Intel’s proposed $5.4 billion acquisition of Israel-based Tower Semiconductor fell apart, the two firms announced plans for Intel to provide foundry services to its former acquisition target.As part of the deal, Tower will invest up to $300 million to acquire and own equipment and other fixed assets at Intel’s New Mexico fabrication plant. Tower will eventually have a capacity of over 600,000 photo layers per month to manufacture its analog CMOS chips.Tower already owns fabs in Israel, the U.S., and Japan, and it plans to launch in Italy soon. But the existing fabs create 200 mm wafers. The New Mexico facility will create 300 mm wafers, increasing production quantity.To read this article in full, please click here
The comm command on Linux systems can compare file or directory contents and display the differences in a clear and useful way. Think of “comm” not so much as a reference to “compare” as to “common,” since the command writes to standard output both the lines that are common and the lines that are unique in each of the files or directories.One key requirement when using comm is that the content to be compared must be in sorted order. However, there are ways that you can get away with comparing content that isn’t sorted. Some examples of how to do this will be presented in this post.Comparing files
Normally, when using the comm command, you would compare two sorted text files to see their shared and unique lines. Here’s an example in which a list of friends and a list of neighbors are compared.To read this article in full, please click here
The comm command on Linux systems can compare file or directory contents and display the differences in a clear and useful way. Think of “comm” not so much as a reference to “compare” as to “common,” since the command writes to standard output both the lines that are common and the lines that are unique in each of the files or directories.One key requirement when using comm is that the content to be compared must be in sorted order. However, there are ways that you can get away with comparing content that isn’t sorted. Some examples of how to do this will be presented in this post.Comparing files
Normally, when using the comm command, you would compare two sorted text files to see their shared and unique lines. Here’s an example in which a list of friends and a list of neighbors are compared.To read this article in full, please click here
The use of data processing units (DPU) is beginning to grow in large enterprises as AI, security and networking applications demand greater system performance.Much DPU development to date has been aimed at hyperscalers. Looking ahead, DPU use in the data center and elsewhere in the enterprise network is expected to grow. One way that could happen is the melding of DPU technology with networking switches – a technology combination AMD Pensando calls a “smartswitch.”An early entrant in that category is HPE Aruba’s CX 10000, which combines DPU technology from AMD Pensando with high-end switching capabilities. Available since early 2022, the CX 10000 is a top-of-rack, L2/3 data-center box with 3.6Tbps of switching capacity. The box eliminates the need for separate appliances to handle low latency traffic, security and load balancing, for example.To read this article in full, please click here
The use of data processing units (DPU) is beginning to grow in large enterprises as AI, security and networking applications demand greater system performance.Much DPU development to date has been aimed at hyperscalers. Looking ahead, DPU use in the data center and elsewhere in the enterprise network is expected to grow. One way that could happen is the melding of DPU technology with networking switches – a technology combination AMD Pensando calls a “smartswitch.”An early entrant in that category is HPE Aruba’s CX 10000, which combines DPU technology from AMD Pensando with high-end switching capabilities. Available since early 2022, the CX 10000 is a top-of-rack, L2/3 data-center box with 3.6Tbps of switching capacity. The box eliminates the need for separate appliances to handle low latency traffic, security and load balancing, for example.To read this article in full, please click here
Toyota assembly plants across Japan shut down for about a day last week due to a malfunction following routine maintenance. Insufficient disk space in servers used to process parts orders caused the systems to become unavailable, according to the automaker.Toyota this week provided the cause of the production system outage and reassured customers and partners that the company did not suffer from a cyberattack, but rather a lack of disk space across some of the servers in its production order system. The malfunction suspended operations at some 14 plants in Japan. (Read more about the biggest outages of the year)To read this article in full, please click here
Toyota assembly plants across Japan shut down for about a day last week due to a malfunction following routine maintenance. Insufficient disk space in servers used to process parts orders caused the systems to become unavailable, according to the automaker.Toyota this week provided the cause of the production system outage and reassured customers and partners that the company did not suffer from a cyberattack, but rather a lack of disk space across some of the servers in its production order system. The malfunction suspended operations at some 14 plants in Japan. (Read more about the biggest outages of the year)To read this article in full, please click here
Netskope this week acquired digital experience monitoring firm Kadiska in a move that the SASE provider says will expand Netskope’s DEM capabilities for networking and infrastructure professionals who need greater visibility across their SD-WAN, secure service edge, and cloud environments.“The founding vision of Kadiska matches uncannily well with the Netskope platform vision. Both technologies have been built to recognize the new world where data, users, cloud infrastructure, and applications are all dispersed, leaving blind spots and challenges for organizations seeking to control and optimize experience and security,” said Sanjay Beri, CEO and co-founder of Netskope said in a statement. “We already share some very large global customers and seeing the appetite for integration—bringing together the capabilities of both companies—really proved to use the rationale for this acquisition.”To read this article in full, please click here
Netskope this week acquired digital experience monitoring firm Kadiska in a move that the SASE provider says will expand Netskope’s DEM capabilities for networking and infrastructure professionals who need greater visibility across their SD-WAN, secure service edge, and cloud environments.“The founding vision of Kadiska matches uncannily well with the Netskope platform vision. Both technologies have been built to recognize the new world where data, users, cloud infrastructure, and applications are all dispersed, leaving blind spots and challenges for organizations seeking to control and optimize experience and security,” said Sanjay Beri, CEO and co-founder of Netskope said in a statement. “We already share some very large global customers and seeing the appetite for integration—bringing together the capabilities of both companies—really proved to use the rationale for this acquisition.”To read this article in full, please click here
In 2019, Gartner created the term secure access service edge (SASE) to describe a cloud-based service that combines networking and security in order to give remote workers safe access to internet-based resources.Gartner had put its finger on a new set of challenges that enterprise IT faced as employees shifted to remote work during Covid and applications migrated to the cloud. But Gartner overshot the runway a bit; vendors were caught flatfooted and scrambled to cobble together full suites of SASE features.On the customer side, a recent Gartner survey of CISOs revealed that “a majority of buyers are planning for a two-vendor strategy for SASE,” with security and networking teams making separate buying decisions rather than opting for single-vendor SASE.To read this article in full, please click here
In 2019, Gartner created the term secure access service edge (SASE) to describe a cloud-based service that combines networking and security in order to give remote workers safe access to internet-based resources.Gartner had put its finger on a new set of challenges that enterprise IT faced as employees shifted to remote work during Covid and applications migrated to the cloud. But Gartner overshot the runway a bit; vendors were caught flatfooted and scrambled to cobble together full suites of SASE features.On the customer side, a recent Gartner survey of CISOs revealed that “a majority of buyers are planning for a two-vendor strategy for SASE,” with security and networking teams making separate buying decisions rather than opting for single-vendor SASE.To read this article in full, please click here
When preparing scripts that will run in bash, it’s often critical to be able to set up numeric variables that you can then increment or decrement as the script proceeds. The only surprising part of this is how many options you have to choose from to make the increment or decrement operation happen.Incrementing numeric variables
First, to increment a variable, you first need to set it up. While the example below sets the variable $count to 1, there is no need to start at 1.$ count=1
This would also work:$ count=111
Regardless of the initial setting, you can then increment your variable using any of the following commands. Just replace $count with your variable name.To read this article in full, please click here
A traditional backup starts with an initial full backup and is followed by a series of incremental or cumulative incremental backups (also known as differential backups). After some period of time, you will perform another full backup and more incremental backups. However, the advent of disk-based backup systems has given rise to the concept of the incremental forever approach, where only one backup is performed followed by a series of incremental backups. Let’s take a look at the different ways to do this.File-level incremental forever
The first type of incremental forever backup is a file-level incremental forever backup product. This type of approach has actually been around for quite some time, with early versions of it available in the ‘90s. The reason why this is called a file-level incremental is that the decision to backup an item happens at the file level. If anything within a file changes, it will change its modification date (or archive bit in Windows), and the entire file will be backed up. Even if only one byte of data was changed within the file, the entire file will be included in the backup.To read this article in full, please click here
When preparing scripts that will run in bash, it’s often critical to be able to set up numeric variables that you can then increment or decrement as the script proceeds. The only surprising part of this is how many options you have to choose from to make the increment or decrement operation happen.Incrementing numeric variables
First, to increment a variable, you first need to set it up. While the example below sets the variable $count to 1, there is no need to start at 1.$ count=1
This would also work:$ count=111
Regardless of the initial setting, you can then increment your variable using any of the following commands. Just replace $count with your variable name.To read this article in full, please click here
A traditional backup starts with an initial full backup and is followed by a series of incremental or cumulative incremental backups (also known as differential backups). After some period of time, you will perform another full backup and more incremental backups. However, the advent of disk-based backup systems has given rise to the concept of the incremental forever approach, where only one backup is performed followed by a series of incremental backups. Let’s take a look at the different ways to do this.File-level incremental forever
The first type of incremental forever backup is a file-level incremental forever backup product. This type of approach has actually been around for quite some time, with early versions of it available in the ‘90s. The reason why this is called a file-level incremental is that the decision to backup an item happens at the file level. If anything within a file changes, it will change its modification date (or archive bit in Windows), and the entire file will be backed up. Even if only one byte of data was changed within the file, the entire file will be included in the backup.To read this article in full, please click here
Microsoft has blamed staff strength and failed automation for a data center outage in Australia that took place on August 30, disabling users from accessing Azure, Microsoft 365, and Power Platform services for over 24 hours.In a post-incident analysis report, Microsoft said the outage occurred due to a utility power sag in Australia’s East region, which in turn “tripped a subset of the cooling units offline in one data center, within one of the Availability Zones.”As the cooling units were not working properly, the rise in temperature forced an automated shutdown of the data center in order to preserve data and infrastructure health, affecting compute, network, and storage services.To read this article in full, please click here
Microsoft has blamed staff strength and failed automation for a data center outage in Australia that took place on August 30, disabling users from accessing Azure, Microsoft 365, and Power Platform services for over 24 hours.In a post-incident analysis report, Microsoft said the outage occurred due to a utility power sag in Australia’s East region, which in turn “tripped a subset of the cooling units offline in one data center, within one of the Availability Zones.”As the cooling units were not working properly, the rise in temperature forced an automated shutdown of the data center in order to preserve data and infrastructure health, affecting compute, network, and storage services.To read this article in full, please click here
Arm Holdings unveiled a program that it says will simplify and accelerate the adoption of Arm Neoverse-based technology into new compute solutions. The program, called Arm Neoverse Compute Subsystems (CSS), was introduced at the Hot Chips 2023 technical conference held at Stanford University.Neoverse is Arm’s server-side technology meant for high performance while still offering the power efficiency that Arm’s mobile parts are known for. CSS enables partners to build specialized silicon more affordably and quickly than previous discrete IP solutions.The first-generation CSS product, Arm CSS N2, is based on the Neoverse N2 platform first introduced in 2020. CSS N2 provides partners with a customizable compute subsystem, allowing them to focus on features like memory, I/O, acceleration, and so on.To read this article in full, please click here
VMware is advising customers to upgrade or patch its Aria for Network Operations software because of potential security problems.VMware Aria is the vendor’s multi-cloud management platform that integrates previously separate VMware services such as vRealize Automation, vRealize Operations, vRealize Network Insight, and CloudHealth. A single Aria Hub console provides centralized views and controls and lets customers see and manage the entire multi-cloud environment.The vulnerabilities are in Aria Operations for Networks, a monitoring component that can find the cause of application delays based on TCP traffic latency and retransmissions and trigger alerts on the applications dashboard.To read this article in full, please click here