Archive

Category Archives for "Network World Data Center"

Xilinx launches Versal HBM processors for the data center

Xilinx continues to be arguably the most productive chip maker in the Valley with the introduction of the Versal HBM adaptive compute acceleration platform (ACAP), the latest in its Versal processor portfolio.Xilinx is known as a FPGA company, but the Versal line is so much more than that. Versal is the mashup of many different processor technologies into one die. Of course it has the FPGA programmable logic gates, but it also has Arm cores for applications and real-time processing, intelligent engines (AI blocks, DSPs), and I/O (PCIe Gen 5, CXL). The family ranges from the high-end Premium edition to the Versal AI Edge processors.To read this article in full, please click here

HPE servers will ship in liquid-cooled chassis and Iceotope partner for liquid cooled edge servers

Iceotope Technologies will offer HPE ProLiant servers in Iceotope’s self-contained liquid cooled chassis, which can run in enterprise data centers and is ruggedized to operate in extreme edge scenarios as well.The Ku:l chassis combines Iceotope's immersion liquid-cooling technology in Avnet racks and EcoStruxure management technology from Schneider Electric. It supports standard server boards in a 1U immersion cooling tray from Iceotope.Chip shortage will hit hardware buyers for months to years In an enterprise data center, the Ku:l chassis can add function without without adding load to the existing cooling systems since it is entirely self-contained. At the same time it is rugged enough for extreme edge environments that might damage standard IT equipment. The chassis provides zero-touch operation with advanced out-of-band management for complete remote control of the entire system.To read this article in full, please click here

HPE servers will ship in liquid-cooled chassis

Iceotope Technologies will offer HPE ProLiant servers in Iceotope’s self-contained liquid cooled chassis, which can run in enterprise data centers and is ruggedized to operate in extreme edge scenarios as well.The Ku:l chassis combines Iceotope's immersion liquid-cooling technology in Avnet racks and EcoStruxure management technology from Schneider Electric. It supports standard server boards in a 1U immersion cooling tray from Iceotope.Chip shortage will hit hardware buyers for months to years In an enterprise data center, the Ku:l chassis can add function without without adding load to the existing cooling systems since it is entirely self-contained. At the same time it is rugged enough for extreme edge environments that might damage standard IT equipment. The chassis provides zero-touch operation with advanced out-of-band management for complete remote control of the entire system.To read this article in full, please click here

Commands to find Linux-package updates

Did you know that you can ask your Linux system to tell you what upgrades are available for the packages installed on it? You might be surprised by how many you’ll see, especially if you’re using the current release and don’t have your system set up for frequent or automatic updates.Updates play an important role in keeping your Linux systems secure and performing well. Since most packages are updated as fixes or improvements to the code become available, it’s hard to predict how many will show up on any particular day. (Note: Updates should be done when your system is not performing other important tasks.)Finding installed packages on Fedora Linux systems Fedora and related systems To check what updates are currently available for your Fedora or related system, use a command like this:To read this article in full, please click here

IBM builds ransomware protection into on-prem storage

With ransomware attacks growing in frequency and little being done to stop them, IBM is well-timed with its anti-ransomware Safeguarded Copy for its FlashSystems and on-premises storage-as-a-serivce offerings.Safeguarded Copy is part of the IBM FlashSystem family of all-flash storage arrays, and it automatically creates immutable snapshots of date and stores them securely—meaning they cannot be accessed or altered by unauthorized users, the company says. Read about backup and recovery: Backup vs. archive: Why it’s important to know the difference How to pick an off-site data-backup method Tape vs. disk storage: Why isn’t tape dead yet? The correct levels of backup save time, bandwidth, space Safeguarded Copy is based on technology from IBM’s DS8000 mainframe storage array, which does the same thing as described above: it creates immutable copies  of data that can be used to restore damaged original data volumes or build new and uncorrupted volumes.To read this article in full, please click here

Find out what packages are installed on your Fedora system

If you're curious about how many packages are installed on your Fedora system or how you can check on them, you might be surprised at how much information you have at your fingertips. With just a few commands, you can find out just about anything you might want know about packages and the repositories they came from.What is a package? To get started, a Linux package is simply a collection of files that performs some particular tasks. For example, the popular image-editing program GIMP is installed as a package, and it includes all of the files that you need to do some impressive image editing. You can easily ask if GIMP is installed with a command like this:To read this article in full, please click here

Installing fonts on your Linux system

Linux systems generally start out with a large number of fonts available, especially once you've installed LibreOffice. Even so, you might find yourself craving some highly distinctive or unusual fonts to add a special tone to some of your projects. If so, you're in luck. You're likely to find many thousands of free fonts available online – bold, italic, calligraphy, modern, script, hand lettering, cursive, brush lettering, symbolic and more.Here's a small sampling of popular sites that provide free fonts for easy downloading: dafont.com fontzone.net fonts.google.com fontspace.com You can also type "free fonts" into your favorite search engine. Expect to see a huge number of responses. Keep in mind that not all fonts are free, but plenty of free fonts are available, and they're easy to view, download and install.To read this article in full, please click here

Survey: AIOps-driven network management can make your business run better

(Editor’s note: EMA has published “Revolutionizing Network Management with AIOps,” a report based on a survey of 309 network infrastructure and operations professionals who have experience with applying AIOps to network management. This article by EMA Vice President of Research Networking Shamus McGillicuddy further details the results of that report.)Enterprise network infrastructure and operations teams are increasingly recognizing the value of applying AIOps to network management, according to new market research from Enterprise Management Associates (EMA).To read this article in full, please click here

The TPM chip controversy for Windows 11 is a non-issue for Windows Server

By now you’ve heard about the kerfuffle surrounding Windows 11 and its requirement for a Trusted Platform Module (TPM) chip, which is not standard on the majority of PCs and threatens to leave many newer Windows 10 PCs blocked from being upgraded.Normally the issues around a new version of Windows are system requirements, but here, the issue is the TPM chip. TPM is a specially designed chip that assists with security surrounding credentials. It ensures that boot code that’s loaded, such as firmware and OS components, haven’t been tampered with. It can also encrypt the drive contents to protect against theft. Microsoft is mandating that systems have TPM based on 2.0 specifications but few PCs do. Those that do ship with it have it turned off by default but it is easily activated.To read this article in full, please click here

Ransomware recovery: Plan for it now

If your computing environment is subject to a large ransomware attack, you will most certainly be enacting your disaster recovery (DR) plan. But before you begin restoring systems, you must first ensure you have stopped the infection, identified it, and removed it. Jumping too quickly to the restore phase could actually make things worse. To understand why this is the case, it’s important to understand how ransomware works.How ransomware spreads in your environment There are many articles such as this one that describe what ransomware does, but it’s important to emphasize that the goal of ransomware is rarely to infect just one system. Modern ransomware variants will immediately attempt to identify and execute various operating system vulnerabilities to gain administrative access and spread to the rest of your LAN. The attack will be coordinated via command-and-control (C&C) servers, and contacting these servers for instructions is the first thing that every ransomware variant does. They key in responding to an active ransomware attack is stopping further communications with C&C servers, as well as further communications between infected systems and the rest of your network.To read this article in full, please click here

Backing up not just your data, but your productivity

Everyone knows that backups are important, but most of us tend to think of backups solely as the process of backing up our data files -- not necessarily our applications, our passwords or our computers. And, when we run into a serious problem that threatens our ability to get our work done, it just might be time to rethink what "backing up" should involve.Even if you have more than one computer at your disposal, it could easily be that only one of them is ready to help you with passwords you rarely use, provide access to your cloud backups, allow you to connect to the VPN you use for special projects, probe your network for problems or offer you a way to log into remote systems.To read this article in full, please click here

The chip shortage is real, but driven by more than COVID

By now you’ve undoubtedly heard the complaining about computing parts shortages, particularly from gamers who can’t get modern GPU cards and from car makers, since new cars these days are a rolling data center.The problem is also affecting business IT but in a different way, and there are steps you can take to address the problem. The first step, though, is patience. This shortage isn’t due to staffing or fabs being out of commission, it’s that demand is so high that it’s leading to very long lead times.Chip shortage will hit hardware buyers for months to years That delay can mean 36 weeks, according to Mario Morales, program vice president for the semiconductor and enabling technologies team at IDC, with the demand for components “seeing untempered demand.”To read this article in full, please click here

Intel stumbles in supercomputer rankings, delays next-gen CPU

This week the TOP500 list of the world’s fastest supercomuters found that, once again, Fugaku is number one, benchmarking at 442 Pflop/sec, making it three times faster than the second place machine. Impressive, but also indicative that it might also be the first to break the exaflop barrier if it’s working on the right kind of problem.TOP500 pointed out that Fugaku’s score (and everyone else’s) is based on double-precision benchmarks, the most accurate floating point math calculation you can do. But much of AI and machine learning is single-precision, which can be less than half the compute power of double precision.To read this article in full, please click here

How to dig up configuration details on your Linux system with getconf

Linux systems can report on a lot more configuration details than you likely ever knew were available. The trick is using the getconf command and having an idea what you are looking for. Watch out though. You might find yourself a bit overwhelmed with how many settings are available.To start, let's look at a few settings that you might have expected to see to answer  some important questions.Summarizing your command-line usage on Linux For starters, how long can a filename be?You can check this setting by looking at the NAME_MAX setting.To read this article in full, please click here

The 10 most powerful companies in enterprise networking 2021

When the pandemic hit last spring, employees suddenly began working from home, enterprises quickly shifted applications to the cloud, and secure remote access became critical. As we move (hopefully) beyond the pandemic, it’s clear that enterprise networking has been changed forever.Companies are looking at new technologies like SASE to combine networking and edge security into one manageable platform. Zero-trust network access has moved from the back burner to the hotseat as companies seek a more effective way to fight cyberattacks in a world where the traditional perimeter no longer exists. The lines between security and networking are blurring, with traditional security companies moving into the networking realm, and networking companies upping their security game.To read this article in full, please click here

Peering into binary files on Linux

Any file on a Linux system that isn't a text file is considered a binary file--from system commands and libraries to image files and compiled programs. But these files being binary doesn't mean that you can't look into them. In fact, there are quite a few commands that you can use to extract data from binary files or display their content. In this post, we'll explore quite a few of them.file One of the easiest commands to pull information from a binary file is the file command that identifies files by type. It does this in several ways--by evaluating the content, looking for a "magic number" (file type identifier), and checking the language. While we humans generally judge a file by its file extension, the file command largely ignores that. Notice how it responds to the command shown below.To read this article in full, please click here

Fugaku still reigns as the world’s fastest supercomputer

Fugaku, the supercomputer built by Fujitsu, remains at number one in the TOP500 list of the fastest supercomputers in the world, where it is still three times faster than the nearest competition.The contest for the fastest remains tight, with only one new entry into the top 10 on the latest list—Perlmutter, at the National Energy Research Scientific Computing (NERSC) Center at Lawrence Berkeley National Laboratory, which is part of the US Department of Energy. It joins the list at number five and bumps down numbers six through 10 from the previous list published in November 2020.(A system called Dammam-7 dropped off the top 10.)To read this article in full, please click here

1 4 5 6 7 8 142