The locale settings in Linux systems help ensure that information like dates and times are displayed in a format that makes sense in the context of where you live and what language you speak. Here's how to use them.NOTE: None of the commands described in this post will change your locale settings. Some merely use a different locale setting to display the response you might be seeing from a different location.List your settings
If you’re in the US, you should see something like this when you use the locale command to list your settings:$ locale
LANG=en_US.UTF-8
LC_CTYPE="en_US.UTF-8"
LC_NUMERIC="en_US.UTF-8"
LC_TIME="en_US.UTF-8"
LC_COLLATE="en_US.UTF-8"
LC_MONETARY="en_US.UTF-8"
LC_MESSAGES="en_US.UTF-8"
LC_PAPER="en_US.UTF-8"
LC_NAME="en_US.UTF-8"
LC_ADDRESS="en_US.UTF-8"
LC_TELEPHONE="en_US.UTF-8"
LC_MEASUREMENT="en_US.UTF-8"
LC_IDENTIFICATION="en_US.UTF-8"
LC_ALL=
The en_US.UTF-8 settings in the above output all represent US English. If you’re in France, this response is more likely:To read this article in full, please click here
The term Wi-Fi was created more than two decades ago as a way to make local wireless networking easy to understand for the general public. Today, Wi-Fi technology is ubiquitous, making home and office connectivity without wires available for all, and contributing to an explosion of smart devices.What is Wi-Fi?
Wi-Fi is a blanket term for multiple technologies that use the IEEE 802.11 communications standards to create local area networks or LANs. Wi-Fi-enabled products use radio waves to transmit data and communicate with one another. Initially the technology used the 2.4 GHz frequency, but it has since expanded to 5 GHz, 60 GHz, and 6 GHz frequency bands.To read this article in full, please click here
Nvidia is playing some serious games.When Jensen Huang and his two partners established Nvidia in 1993, the graphics chip market had many more competitors than the CPU market, which had just two. Nvidia’s competitors in the gaming market included ATI Technologies, Matrox, S3, Chips & Technology, and 3DFX.A decade later, Nvidia had laid waste to every one of them except for ATI, which was purchased by AMD in 2006. For most of this century, Nvidia has shifted its focus to bring the same technology it uses to render videogames in 4k pixel resolution to power supercomputers, high-performance computing (HPC) in the enterprise, and artificial intelligence.To read this article in full, please click here
Intel announced plans to split its AXG graphics group and move the resources into two existing business units to better serve their respective markets.The consumer/gaming end of the GPU business will move to Intel’s Client Compute Group (CCG), which develops consumer computing platforms based on the company’s CPU products. The teams responsible for data center and supercomputing products such as the Ponte Vecchio and Rialto Bridge will move to the Data Center and AI (DCAI) business unit.The GPU SoC and IP design teams will also fall under the DCAI umbrella, but they will continue to support the client graphics team. Jeff McVeigh, currently the vice president and general manager of the Super Compute Group, will serve as the interim leader of this team until a permanent leader is found.To read this article in full, please click here
Zero Trust is a term coined by John Kindervag while he was an analyst at Forrester Research to describe a strategic framework in which nothing on the network is trusted by default – not devices, not end users, not processes. Everything must be authenticated, authorized, verified and continuously monitored.The traditional approach to security was based on the concept of “trust, but verify.” The weakness of this approach is that once someone was authenticated, they were considered trusted and could move laterally to access sensitive data and systems that should have been off-limits.Zero Trust principles change this to “never trust, always verify.” A Zero Trust architecture doesn’t aim to make a system trusted or secure, but rather to eliminate the concept of trust altogether. Zero Trust security models assume that an attacker is present in the environment at all times. Trust is never granted unconditionally or permanently, but must be continually evaluated.To read this article in full, please click here
Kyndryl, formerly IBM’s Managed Infrastructure Services unit, on Thursday released Cloud Native Services, which it said will aid enterprises in accelerating their cloud application modernization efforts.The new set of services will allow enterprises to move their on-premises applications to cloud service providers such as AWS, GCP and Azure. Kyndryl will also manage these services on behalf of its customers across hybrid or multicloud environments, the company said.Cloud Native Services, according to the company, will provide a framework that will consist of code assets, workflows with integrated services around automated backup, patching, key performance indicators (KPI) monitoring, security, alerting and incident management.To read this article in full, please click here
Searching for the best provider for SD-WAN, SASE, MPLS, content delivery network (CDN), 5G or any other network service can be a difficult, frustrating, and tedious process.There are so many providers, so many options, so much confusion and possibilities for future regret. What's the best way to move forward?To read this article in full, please click here
A joint effort by immersion cooling firm Iceotope and Meta, the parent company of Facebook, found cooling hard drives with a dielectric liquid is safe and a more effective means of cooling than using fans.Hyperscalers like Meta deploy thousands of HDDs in their data centers, and while the heat given off on an individual basis is tiny, it adds up, especially since the drives are in constant use and are close together. The drives are stored in server racks that hold nothing but dozens of hard drives and are referred to as a JBOD (Just a Bunch Of Disks).A JBOD can overheat without cooling, which up to now has been done with fans, but some drives were further away from fans than others, causing uneven cooling.To read this article in full, please click here
Backup and recovery systems are at risk for two types of ransomware attacks: encryption and exfiltration – and most on-premises backup servers are wide open to both. This makes backup systems themselves the primary target of some ransomware groups, and warrants special attention.Hackers understand that backup servers are often under-protected and administered by junior personnel that are less well versed in information security. And it seems no one wants to do something about it lest they become the new backup expert responsible for the server. This is an age-old problem that can allow backup systems to pass under the radar of sound processes that protect most servers.To read this article in full, please click here
Whether you’re managing a network at work or just watching out for your home systems, it’s important to understand your network connections--how you communicate with public systems and those on the local network. This article covers some of the most important commands available on Linux to help you get a clear understanding of your local network and how it reaches outside.While the links provided include important tips on using network commands, some include commands that have been deprecated in favor of newer commands. Some of the most important commands to know today include ip a, ip neigh, ping, tracepath, dig, tcpdump and whois.To read this article in full, please click here
Sometimes, budget pressures mean you just have to cut costs. Sometimes, cutting costs in one area can give you some financial elbow room to fund something in another. A fifth of all CIOs tell me that they have a mandate to cut network costs in 2023, and another third say they’d be open to doing that if they could fund something else with the savings. Most admit that they don’t have a really good idea of how to accomplish their goal without creating a risk that would potentially overwhelm benefits.Cutting CAPEX is popular in theory. Of 87 enterprises with cost-cutting interest, 55 said they thought their capital budgets would be an attractive place to start. That’s not changed much over the last five years, but what has changed is how enterprises think they could cut CAPEX. It used to be that they believed cost reductions could be achieved with new technologies like hosted router software or white-box devices, but this year they reported concerns that integration costs and risks were too high.To read this article in full, please click here
China accounts for nearly 20% of global manufacturing trade and holds a large share of many global value chain inputs. While communication to and from China is always a challenge, large enterprises can work with the local telcos to create a stable communications network. However, small and medium size companies must choose between two evils: a cumbersome process with large local telcos, or an unstable, unpredictable network that prevents uninterrupted communications with apps, cloud workloads and teams across the border. If your company suffers from communication issues in China, you’re not alone. Teridion experts see that about 90% of global businesses face these issues, which result in costly extra workloads and provisioning. We’ve identified several main challenges:To read this article in full, please click here
Secure Access Service Edge (SASE) is a network architecture that combines software-defined wide area networking (SD-WAN) and security functionality into a unified cloud service that promises simplified WAN deployments, improved efficiency and security, and application-specific bandwidth policies.First outlined by Gartner in 2019, SASE (pronounced “sassy”) has quickly evolved from a niche, security-first SD-WAN alternative into a popular WAN sector that analysts project will grow to become a $10-billion-plus market within the next couple of years.To read this article in full, please click here
Just a few weeks ago Gartner analysts said that sustainability and issues around it would transcend all of the strategic technology trends for 2023.This week at its IT Infrastructure, Operations & Cloud Strategies Conference Gartner described how corporate data centers might make sustainability a practical reality.“IT leaders must avoid wasting value through the premature replacement of IT infrastructure,” said Philip Dawson, vice president and analyst at Gartner, at the conference. “They can do that by using real-time health analytics to maximize the useful life of data-center assets.”To read this article in full, please click here
Cloud services and hosting provider Rackspace Technology acknowledged Tuesday that a recent incident that took most of its Hosted Exchange email server business offline was the product of a ransomware attack. The company shut the service down last Friday.It was not, initially, clear what had caused the outage, but Rackspace quickly moved to shift Exchange customers over to Microsoft 365, as this part of the company’s infrastructure was apparently unaffected.Rackpsace offers migration to Microsoft 365
Rackspace said today that there is “no timeline” for a restoration of Exchange service, but it is offering Exchange users technical assistance and free access to Microsoft 365 as a substitute, though it acknowledged that migration is unlikely to be a simple process for every user. Rackspace said that, while the migration is in progress, customers can forward email sent to their Hosted Exchange inboxes to an external server, as a temporary workaround.To read this article in full, please click here
The job of a network engineer just keeps getting more complicated. Mission critical applications are competing for bandwidth. The sheer number of devices is exploding, driven by IoT. And the network itself if being extended to the cloud, the edge and to the home office. And then there’s cybersecurity to worry about. Attacks are on the rise across the board, and attackers are constantly looking for vulnerabilities or backdoors, upping the need for solid and secure networking to act as an early warning system for cybersecurity defenses.Thankfully, there are many great tools available to help network engineers complete their never-ending tasks. And many of them are available for free. Here’s our list of 12 killer network tools that won’t break the bank. To read this article in full, please click here
Automation represents perhaps the clearest embodiment of Benjamin Franklin’s legendary “time is money” aphorism -- and artificial intelligence (AI)-driven networks are one area where it’s relatively easy to see the near-term benefits that give new meaning to Franklin’s simple phrase.Network automation simplifies operations for network teams and reduces configuration errors. So, it stands to reason that greater automation through AI will deliver a more predictable and reliable network that seemingly can speed up time while saving lots of money. We turned to the CIO Experts Network of IT professionals and industry analysts to collect their views on AI-driven networks and how the technology is likely to change the lives of network teams.To read this article in full, please click here
Business spending on artificial intelligence (AI) technologies is growing by leaps and bounds as organizations strive to improve efficiency, simplify, and automate processes, and build more proactive capabilities. Global spending on AI-centric systems is on track to surpass $300 billion in 2026, with the U.S. accounting for more than 50% of the total, according to IDC forecasts. But the success of these investments may ultimately hinge on trust.A National Institute of Standards and Technology (NIST) study points out that “determining that the AI system is trustworthy because it meets its system requirements won’t ensure widespread adoption of AI. It is the user, the human affected by the AI, who ultimately places their trust in the system.”To read this article in full, please click here
Network management has never been easy, and the proliferation of IoT devices, the shift to remote work, and the migration of applications to multi-cloud environments have added new levels of complexity to enterprise networks.IT execs are dealing with network management tool sprawl and employee skills gaps. They are also struggling to gain visibility across increasingly distributed networks, including SaaS instances that are not under their direct control.To read this article in full, please click here
DDoS IP Protection for SMBs is designed to provide enterprise-grade distributed denial of service protection at a price that's attractive to small and medium-size companies.