Commands for comparing files have proliferated since the early days of Linux. In this post, we'll look at a suite of commands available for comparing files and highlight the advantages that some of the newer ones provide.diff
One of the oldest and still popular commands for detecting and reporting on file differences is the diff command. Comparing two lists of meeting attendees, the diff command will simply and clearly show you the differences.$ diff attendance-2020 attendance-2021
10,12c10
< Monroe Landry
< Jonathon Moody
< Donnell Moore
---
> Sandra Henry-Stocker
Only the lines that are different are displayed. The output precedes lines that are only in the first file with < and those only in the second file with >.To read this article in full, please click here
The server market is fairly slow to change in all things, and that includes its processor platforms. But lately it's clear AMD's comeback is getting very real.Left for dead four years ago, AMD already has won over the gamers. Its Ryzen series of processors are the go-to choice for system builders on YouTube, whose specialty is building a high-end gaming rig in 15 minutes. But the server market is also taking note.The latest sign came from Mercury Research, which follows the semiconductor market, in particular CPU sales. For the fourth quarter of 2020, Intel held 92.9% market share to AMD's 7.1%, but Intel was down from 95.5% one year earlier in Q4 2019 and AMD was way up from 4.5%. For the server market, that's some rapid growth.To read this article in full, please click here
The COVID-19 pandemic has influenced the networking arena in a number of ways, including the rise of fully automated remote offices, the need to support a "branch of one," and the growth of new communications software tools."One of the biggest trends we are seeing is business agility. That is, IT looking at the tech they have deployed and evaluating it not just in terms of speeds and feeds, but how agile it is to handle whatever's coming next," said Todd Nightingale, Cisco's Enterprise Networking & Cloud business chief. "Software APIs are a huge part of that trend, because it is amazingly easier to handle changes through APIs and software that make it possible to change things in a day rather than months."To read this article in full, please click here
If you need to generate a list of names and addresses to test an application or a script that you're working on, Linux can make that surprisingly easy. There's a command called "rig" that will create name, address and phone number listings. As far as I can tell, out of the box, it only works with U.S. addresses and area codes. However, if this is indeed the case, you might be able to work around this problem.To use the rig command, you can just type "rig" on the command line, and a single name and address will be generated. You will see something like this:$ rig
Mavis English
1015 Tulip St
Anderson, IN 46018
(317) xxx-xxxx
To generate a list with many addresses, use the -c option and specify the number of addresses that you want to see.To read this article in full, please click here
The COVID-19 pandemic has profoundly affected many areas of IT, including the data center, where changes to the infrastructure--particularly adoption of cloud services--are bringing about the need for new skill sets among workers who staff them.
Tech Spotlight: The Future of Work
Remote work 2.0 — when WFH really means 'work from anywhere' (Computerworld)
7 key questions facing the future of work (CIO)
6 top security technologies to protect remote workers (CSO)
7 best practices for remote development teams (InfoWorld)
How the data center workforce is evolving (Network World)
Perhaps no technology industry benefitted more from the pandemic than cloud computing; the location independence of cloud services makes them ideal for a world where the majority of line-of-business as well as IT workers are no longer in the office.To read this article in full, please click here
What will your worklife be like years from now? Today's work-from-home world has given us a glimpse of the future, as these five articles from CIO, Computerworld, CSO, InfoWorld, and Network World illustrate.
In this Linux tip, learn how to use the lslogins command. It provides some useful details on user accounts and logins. In its simplest form, you could just type lslogins, but without using sudo, some of the details you'll probably want to see won't be available because the files in which it's stored won't be readable.
Arista has expanded its security software to let customers control authorized network access and communication between groups from the data center to the cloud.The new software, Macro-Segmentation Service (MSS)-Group, expands the company’s MSS security-software family, which currently includes MSS Firewall for setting security policies across customer edge, data-center and campus networks. Additionally, the company’s MSS Host focuses on data-center security policies.See how AI can boost data-center availability and efficiency
MSS software works with Arista Extensible Operating System (EOS) and its overarching CloudVision management software to provide network-wide visibility, orchestration, provisioning and telemetry across the data center and campus. CloudVision’s network information can be utilized by Arista networking partners including VMware, Microsoft and IBM’s Red Hat.To read this article in full, please click here
Dell Technologies, its VMware subsidiary, and SK Telecom have partnered to provide OneBox MEC, a single-box approach that provides enterprises with an integrated, private-5G and edge-computing platform.
5G resources
What is 5G? Fast wireless technology for enterprises and phones
How 5G frequency affects range and speed
Private 5G can solve some problems that Wi-Fi can’t
Private 5G keeps Whirlpool driverless vehicles rolling
5G can make for cost-effective private backhaul
CBRS can bring private 5G to enterprises
Consulting giant Deloitte believes private 5G networks will become the preferred choice of networks for many of the world’s largest businesses, especially for industrial environments such as manufacturing plants, logistics centers, and ports.To read this article in full, please click here
In this post, we examine a bash script that takes a string of letters, rearranges them in every possible way and checks each permutation to identify those that are English words. In the process, we'll take a close look at the script and calculate how hard it might have to work.Note that, in the algorithm used, each letter arrangement must use all of the letters in the string provided. Words formed by substrings are not considered.How to loop forever in bash on Linux
First, the script expects the scrambled string to be provided as an argument and prompts for it if none is provided. It then checks out each arrangement of letters to find those that exist in the system's words file – in this case, that's /usr/share/dict/words. Here are the first lines in the script:To read this article in full, please click here
Nvidia is offering a certification program to steer customers and partners to buy GPU servers specifically tailored for artificial intelligence (AI) workloads from top-tier OEMs and ODMs.The program, called Nvidia-Certified Systems, is similar to those offered by Intel and AMD. It tells customers that these servers with these configurations are best optimized for running AI workloads at peak performance and in large-scale deployments.
READ MORE: How AI can create self-driving data centersTo read this article in full, please click here
In this Linux tip, learn how to use the autoexpect command. You can use it to build expect scripts that let you run scripts without having to provide answers interactively.
While the move to 400G Ethernet has so far been a largely hyperscaler and telco-network event, the ambition for those users, as well as data-center customers is ultimately to move to at least 800Gbps and possibly 1.6Tbps.And while 800Gbps seems to be a solid goal for Ethernet networking visionaries, the challenges—such as the optics, power, and architecture required to make the next speed leap—seem formidable.The need for increased speed in data centers and cloud services is driven by myriad things including the continued growth of hyperscale networks from players like Google, Amazon and Facebook, but also the more distributed cloud, artificial intelligence, video, and mobile-application workloads that current and future networks will support.To read this article in full, please click here
I'm a sucker for the underdog, so shame on me for focusing on the big guys for so long. It's time to change that with some news from ExaGrid, a competitor of Dell EMC and HP Enterprise in the data backup appliance market.Earlier this month, ExaGrid announced it has increased the capacity of its Tiered Backup Storage appliances while also reducing its offerings from nine systems to seven. Appliances of any size can be mixed and matched in a cluster of up to 32 appliances.ExaGrid also changed the naming convention of the appliances to better reflect their capacity. For example, the discontinued bottom-of-the-line EX3000 had 3TB of full backup capacity, while the new bottom-end appliance is the EX6, with 6TB of full backup capacity storage.To read this article in full, please click here
Linux users should immediately patch a serious vulnerability to the sudo command that, if exploited, can allow unprivileged users gain root privileges on the host machine.Called Baron Samedit, the flaw has been “hiding in plain sight” for about 10 years, and was discovered earlier this month by researchers at Qualys and reported to sudo developers, who came up with patches Jan. 19, according to a Qualys blog. (The blog includes a video of the flaw being exploited.)To read this article in full, please click here
Any time you have a text file on a Linux system that you want to keep private regardless of the privileges that other users with accounts on the system may have, you can resort to encryption. One easy way to do this is to use a feature that is built into the vim editor. You will have to provide a password that will you then need to remember or store in a password safe, but the process is straightforward. The file name will not be changed in any way, and the content of the file can be recovered in much the same way that it was encrypted.To begin, let's say that we have a file that begins like this:$ head -3 mysecret
I feel the need to put my deepest darkest secret into a text file on my Linux
system. While this likely isn't common practice, I'm not sure that I can trust
anyone with it. But a penguin? That's a different story! So here goes ...
Now, not wanting to risk your deepest darkest secret to fellow users, you use vim with its -x (encryption) option.To read this article in full, please click here
Gartner projects worldwide IT spending will total $3.9 trillion in 2021, an increase of 6.2% over 2020 when spending declined a little over 3%.All IT spending segments—from data-center systems to communications services—are forecast to return to growth in 2021, according to Gartner . Enterprise software is expected to have the strongest rebound, 8.8%, as remote work environments are expanded and improved. The devices segment will see the second highest growth in, 8%, and is projected to reach $705.4 billion.To read this article in full, please click here
There are a lot of commands available on Linux for looking at network settings and connections. In today's post, we're going to run through some very handy commands and see how they work.To read this article in full, please click here(Insider Story)
In this Linux tip, learn how to use expect. It's a tool that allows you to automate interactions with other scripts so that you can run them with a set of predefined answers.
The news that Pat Gelsinger is departing as CEO of VMware to take over at Intel generated a positive response for Intel and an equally negative response for VMware. Intel's stock jumped 7% on the day of the news, while VMware's stock fell 7%, and investment bank Piper Sandler slashed its VMware price target from $178 down to $157.Most of the discussion has been around Gelsinger and his return to Intel. VMware, meanwhile, has been overlooked in the process. So what's the outlook for VMware, which has lost more talent than just its CEO in recent months? To read this article in full, please click here