If you only use awk when you need to select specific fields from lines of text, you might be missing out on a lot of other services that the command can provide. In this post, we'll look at this simple use along with many other things that awk can do for you with enough examples to show you that the command is a lot more flexible than you might have imagined.Plucking out columns of data
The easiest and most commonly used service that awk provides is selecting specific fields from files or from data that is piped to it. With the default of using white space as a field separator, this is very simple:To read this article in full, please click here
Prices of enterprise-grade solid-state drives are likely to jump in the coming months, perhaps by as much as 15% over current SSD prices, says TrendForce, a Taiwanese market research firm that focuses on the memory market.In a rare and no doubt unintentional move, Intel and AMD are on a path to begin shipping new processors at roughly the same time: Intel with its Ice Lake generation of Xeon processors and AMD with its Milan processors. You can expect HP Enterprise, Dell Technologies, Lenovo, Super Micro, and every other OEM to unleash a raft of servers at the same quarter as they usually do.To read this article in full, please click here
Intel is pledging to introduce a faster generation of processors every year through 2025 by embracing new technology that enables smaller and smaller transistors and so more powerful chips.By 2024, the transistors will be so small they will no longer be measured in nanometers as they are today, but in angstroms, which are a tenth as big, Intel CEO Pat Gelsinger announced this week. And the chips built around the transistors will be primarily defined by how much they improve in performance per watt over the prior generation.The roadmap Gelsinger set down is as follows:
Intel 10nm SuperFIN: In production now. This is Intel’s “Tiger Lake” generation
Intel 7: In production under the name “Adler Lake,” with 10-15% more performance/watt over the prior generation.
Intel 4 (Intel 7nm): Q2 2021 tapeout, with 20% greater performance/watt than the prior generation. “Meteor Lake” for the client, “Grand Rapids” for the Xeon.
Intel 3: Ready for manufacture in the second half of 2023.
Intel 20A: This ushers in the angstrom era. It is expected to ramp in 2024.
2025 and beyond: Intel 18A is in development for early 2025 based on expected refinements to the manufacturing process that will deliver another Continue reading
A vast majority of Linux systems these days are using systemd – a suite of programs aimed at managing and interconnecting different parts of the system. Systemd started replacing the init process back in 2014 and is now the first process that starts when most Linux systems boot. To get a quick peek, you can run a command like this, which verifies that process 1 is indeed systemd. On this system, two additional systemd processes are currently also running.$ ps -C systemd
PID TTY TIME CMD
1 ? 00:00:59 systemd <===
1244 ? 00:00:00 systemd
54429 ? 00:00:00 systemd
To see a little more detail, try the command below. The blank within the quotes is meant to prevent related processes like systemd-journald from showing up in the list.To read this article in full, please click here
Enterprises can look for more transparency from software vendors after the Biden Administration’s recent mandate that software bills of materials be provided by companies attempting to do business with the federal government.Software bills of materials, frequently abbreviated to SBOMs, aren’t a new concept. The idea comes from the manufacturing sector, where it’s often crucial for buyers to fully understand the components and materials that were used to make a particular piece of equipment.The 10 most powerful companies in enterprise networking 2021
For example, a train engine might contain parts that aren’t rated for certain levels of vibration stress, making it unsuitable for use on a particular type of track. The goal of an SBOM is similar, listing all the proprietary, open source, and licensed components being used in a particular piece of software, so that a buyer can review it and check whether any of those components are outdated or insecure.To read this article in full, please click here
IBM continues to fine-tune its mainframe to keep it attractive to enterprise users interested in keeping the Big Iron in their cloud and AI-application development plans.The company released a new version of the mainframe operating system—z/OS V2.5—that includes beefed-up support for containers, AI, and security.Chip shortage will hit hardware buyers for months to years
According to IBM, applications are at the heart of transactional and batch workloads running on z/OS. Fundamentally, developing new applications while modernizing existing applications is part of the digital transformation occurring in many enterprises.To read this article in full, please click here
Xilinx continues to be arguably the most productive chip maker in the Valley with the introduction of the Versal HBM adaptive compute acceleration platform (ACAP), the latest in its Versal processor portfolio.Xilinx is known as a FPGA company, but the Versal line is so much more than that. Versal is the mashup of many different processor technologies into one die. Of course it has the FPGA programmable logic gates, but it also has Arm cores for applications and real-time processing, intelligent engines (AI blocks, DSPs), and I/O (PCIe Gen 5, CXL). The family ranges from the high-end Premium edition to the Versal AI Edge processors.To read this article in full, please click here
Iceotope Technologies will offer HPE ProLiant servers in Iceotope’s self-contained liquid cooled chassis, which can run in enterprise data centers and is ruggedized to operate in extreme edge scenarios as well.The Ku:l chassis combines Iceotope's immersion liquid-cooling technology in Avnet racks and EcoStruxure management technology from Schneider Electric. It supports standard server boards in a 1U immersion cooling tray from Iceotope.Chip shortage will hit hardware buyers for months to years
In an enterprise data center, the Ku:l chassis can add function without without adding load to the existing cooling systems since it is entirely self-contained. At the same time it is rugged enough for extreme edge environments that might damage standard IT equipment. The chassis provides zero-touch operation with advanced out-of-band management for complete remote control of the entire system.To read this article in full, please click here
Iceotope Technologies will offer HPE ProLiant servers in Iceotope’s self-contained liquid cooled chassis, which can run in enterprise data centers and is ruggedized to operate in extreme edge scenarios as well.The Ku:l chassis combines Iceotope's immersion liquid-cooling technology in Avnet racks and EcoStruxure management technology from Schneider Electric. It supports standard server boards in a 1U immersion cooling tray from Iceotope.Chip shortage will hit hardware buyers for months to years
In an enterprise data center, the Ku:l chassis can add function without without adding load to the existing cooling systems since it is entirely self-contained. At the same time it is rugged enough for extreme edge environments that might damage standard IT equipment. The chassis provides zero-touch operation with advanced out-of-band management for complete remote control of the entire system.To read this article in full, please click here
Did you know that you can ask your Linux system to tell you what upgrades are available for the packages installed on it? You might be surprised by how many you’ll see, especially if you’re using the current release and don’t have your system set up for frequent or automatic updates.Updates play an important role in keeping your Linux systems secure and performing well. Since most packages are updated as fixes or improvements to the code become available, it’s hard to predict how many will show up on any particular day. (Note: Updates should be done when your system is not performing other important tasks.)Finding installed packages on Fedora Linux systems
Fedora and related systems
To check what updates are currently available for your Fedora or related system, use a command like this:To read this article in full, please click here
With ransomware attacks growing in frequency and little being done to stop them, IBM is well-timed with its anti-ransomware Safeguarded Copy for its FlashSystems and on-premises storage-as-a-serivce offerings.Safeguarded Copy is part of the IBM FlashSystem family of all-flash storage arrays, and it automatically creates immutable snapshots of date and stores them securely—meaning they cannot be accessed or altered by unauthorized users, the company says.
Read about backup and recovery:
Backup vs. archive: Why it’s important to know the difference
How to pick an off-site data-backup method
Tape vs. disk storage: Why isn’t tape dead yet?
The correct levels of backup save time, bandwidth, space
Safeguarded Copy is based on technology from IBM’s DS8000 mainframe storage array, which does the same thing as described above: it creates immutable copies of data that can be used to restore damaged original data volumes or build new and uncorrupted volumes.To read this article in full, please click here
In this Linux tip, learn how easy it is to install Apache on Fedora. The first thing you need to do is run a command to install the software. Then, you can run other commands to ensure it starts when your system reboots, to view Apache processes, to uninstall it and more.
If you're curious about how many packages are installed on your Fedora system or how you can check on them, you might be surprised at how much information you have at your fingertips. With just a few commands, you can find out just about anything you might want know about packages and the repositories they came from.What is a package?
To get started, a Linux package is simply a collection of files that performs some particular tasks. For example, the popular image-editing program GIMP is installed as a package, and it includes all of the files that you need to do some impressive image editing. You can easily ask if GIMP is installed with a command like this:To read this article in full, please click here
In this Linux tip, learn how to ask a Linux command for help. You can type the command you want to know about and then add --help. What the command should send back is an explanation of the command's options, maybe a usage example and something about the exit status.
Linux systems generally start out with a large number of fonts available, especially once you've installed LibreOffice. Even so, you might find yourself craving some highly distinctive or unusual fonts to add a special tone to some of your projects. If so, you're in luck. You're likely to find many thousands of free fonts available online – bold, italic, calligraphy, modern, script, hand lettering, cursive, brush lettering, symbolic and more.Here's a small sampling of popular sites that provide free fonts for easy downloading:
dafont.com
fontzone.net
fonts.google.com
fontspace.com
You can also type "free fonts" into your favorite search engine. Expect to see a huge number of responses. Keep in mind that not all fonts are free, but plenty of free fonts are available, and they're easy to view, download and install.To read this article in full, please click here
(Editor’s note: EMA has published “Revolutionizing Network Management with AIOps,” a report based on a survey of 309 network infrastructure and operations professionals who have experience with applying AIOps to network management. This article by EMA Vice President of Research Networking Shamus McGillicuddy further details the results of that report.)Enterprise network infrastructure and operations teams are increasingly recognizing the value of applying AIOps to network management, according to new market research from Enterprise Management Associates (EMA).To read this article in full, please click here
By now you’ve heard about the kerfuffle surrounding Windows 11 and its requirement for a Trusted Platform Module (TPM) chip, which is not standard on the majority of PCs and threatens to leave many newer Windows 10 PCs blocked from being upgraded.Normally the issues around a new version of Windows are system requirements, but here, the issue is the TPM chip. TPM is a specially designed chip that assists with security surrounding credentials. It ensures that boot code that’s loaded, such as firmware and OS components, haven’t been tampered with. It can also encrypt the drive contents to protect against theft. Microsoft is mandating that systems have TPM based on 2.0 specifications but few PCs do. Those that do ship with it have it turned off by default but it is easily activated.To read this article in full, please click here
If your computing environment is subject to a large ransomware attack, you will most certainly be enacting your disaster recovery (DR) plan. But before you begin restoring systems, you must first ensure you have stopped the infection, identified it, and removed it. Jumping too quickly to the restore phase could actually make things worse. To understand why this is the case, it’s important to understand how ransomware works.How ransomware spreads in your environment
There are many articles such as this one that describe what ransomware does, but it’s important to emphasize that the goal of ransomware is rarely to infect just one system. Modern ransomware variants will immediately attempt to identify and execute various operating system vulnerabilities to gain administrative access and spread to the rest of your LAN. The attack will be coordinated via command-and-control (C&C) servers, and contacting these servers for instructions is the first thing that every ransomware variant does. They key in responding to an active ransomware attack is stopping further communications with C&C servers, as well as further communications between infected systems and the rest of your network.To read this article in full, please click here
Everyone knows that backups are important, but most of us tend to think of backups solely as the process of backing up our data files -- not necessarily our applications, our passwords or our computers. And, when we run into a serious problem that threatens our ability to get our work done, it just might be time to rethink what "backing up" should involve.Even if you have more than one computer at your disposal, it could easily be that only one of them is ready to help you with passwords you rarely use, provide access to your cloud backups, allow you to connect to the VPN you use for special projects, probe your network for problems or offer you a way to log into remote systems.To read this article in full, please click here