Dell Technologies has issued a significant update to its PowerMax operating system, which runs its high-density storage for mission-critical workloads.The PowerMaxOS 10.1 update is aimed at organizations that want to improve energy efficiency to cut operating costs and lower the environmental impact of their storage infrastructure. Gains in performance, efficiency and cybersecurity are also part of the upgrade.On the energy-efficiency front, new features include real-time power and environmental monitoring and alerting based on usage. Power for all components in a rack is monitored for voltage, current, and frequency, for example, along with temperature and humidity of the rack.To read this article in full, please click here
Aruba Networks is aiming to give customers greater application visibility and the ability to control security policy enforcement across their campus and wide area networks.The network subsidiary of Hewlett Packard Enterprise is enhancing NetConductor, a cloud-based service that let enterprises centrally manage the security of distributed networks, simplify policy provisioning, and automate the orchestration of network configurations in wired, wireless, and WAN infrastructures.NetConductor works by delivering a network overlay based on Ethernet VPN (EVPN) and virtual extensible LAN (VXLAN) across a customer’s wired and wireless networks, with the aim of bringing a unified and simplified view of the network and allowing the networking and security management teams to collaborate to solve problems, according to Larry Lunetta, vice president of wireless local area network and security solutions marketing at Aruba.To read this article in full, please click here
Device42 this week delivered hybrid cloud discovery capabilities for its IT inventory and asset management product, enabling IT managers to gain near real-time visibility into how cloud assets are communicating with other components and how they support business services across on-premises and cloud infrastructure.“[Customers] will have near real-time visibility across their entire hybrid IT footprint, regardless of the nature or the location of any IT asset, whether on-prem or in the cloud. This is big news for our industry that continues to rely on outdated spreadsheets to track things,” says Raj Jalan, CEO, Device42. “With cloud services and containers, the complexity and the growth are so massive that there isn’t clarity on the dependencies across the cloud, data centers, and on-premises.”To read this article in full, please click here
Telecoms giant Nokia has announced it will be cutting up to 14,000 jobs, a decision it blamed on the slowing demand for 5G equipment.On Thursday, the company reported that its third-quarter net sales declined by 20% year-on-year, with profit over the same period dropping by 69%. Nokia said that as a result, it will be implementing cost-cutting measures to try and save between $842 million and $1.2 billion by 2026, eliminating $422 million worth of costs in 2024 and a further $316 in 2025.“The most difficult business decisions to make are the ones that impact our people. We have immensely talented employees at Nokia and we will support everyone that is affected by this process,” said President and CEO Pekka Lundmark in a statement. “Resetting the cost base is a necessary step to adjust to market uncertainty and to secure our long-term profitability and competitiveness. We remain confident about opportunities ahead of us.”To read this article in full, please click here
Telecom giant Nokia has announced it will be cutting up to 14,000 jobs, a decision it blamed on the slowing demand for 5G equipment.On Thursday, the company reported that its third-quarter net sales declined by 20% year-on-year, with profit over the same period dropping by 69%. Nokia said that as a result, it will be implementing cost-cutting measures to try and save between $842 million and $1.2 billion by 2026, eliminating $422 million worth of costs in 2024 and a further $316 in 2025.“The most difficult business decisions to make are the ones that impact our people. We have immensely talented employees at Nokia and we will support everyone that is affected by this process,” said President and CEO Pekka Lundmark in a statement. “Resetting the cost base is a necessary step to adjust to market uncertainty and to secure our long-term profitability and competitiveness. We remain confident about opportunities ahead of us.”To read this article in full, please click here
AI-generating malware, deep fake identity spoofing, and state-sponsored ransomware are just a few of the latest methods that attackers are using to bypass traditional cybersecurity tools. Ritesh Agrawal, CEO of cybersecurity startup Airgap Networks, noticed that many of the attacks that compromise enterprise networks fail to penetrate telco and service provider networks.“Even though they’re deploying the same routers, switches, and firewalls, there’s something fundamentally different about telco networks that shields them from many threats to enterprise LANs,” Argawal said. Agrawal has 20 years of experience with cybersecurity, enterprise networking, and cloud computing, most of that time spent with Juniper Networks focusing on telco and large enterprise clients.To read this article in full, please click here
Juniper Networks has expanded its security portfolio with an architecture design that includes AI-based predictive threat support and a new family of firewalls, all designed to protect distributed data center resources.The central piece of the expanded portfolio is the new Juniper Connected Security Distributed Services Architecture. It’s implemented in a new version of the vendor’s core Junos operating system (version 23.4) and enables a variety of security features from zero trust policy enforcement to intrusion detection and prevention across distributed data center networks.Since Junos runs across Juniper’s entire product family, including QFX Series Switches, MX Series Universal Routers, SRX Series firewalls and more, all of those systems can be included in the Distributed Services Architecture. This enables customers to set up universal protection and policies for networks, data, and applications, and it’s all controlled by the vendor’s Security Director Cloud for setting and managing security policies.To read this article in full, please click here
BackBox this week announced its Network Vulnerability Manager (NVM), a software add-on to its existing Network Automation Platform, that will enable network managers to automate operating system upgrades, network configuration updates, and various remediations across firewalls and other network and security devices.“Common vulnerability management tools focus on endpoints and are designed for security teams rather than network teams,” says Josh Stephens, CTO of BackBox. “BackBox’s vulnerability management capabilities have been specifically engineered for network operations teams in the way that they operate and to accelerate their path toward network automation.”To read this article in full, please click here
AI will play a significant role in enterprise IT in the coming year, and the influence of generative AI will permeate other tech trends on the horizon. Smart robots, a rise in employee unionization, and growing power-availability concerns are among the top predictions for 2024 and beyond from research firm Gartner, which is hosting its annual IT Symposium/Xpo this week.“This is the first full year with generative AI (GenAI) at the heart of every strategic decision, and every other technology-driven innovation has been pushed out of the spotlight,” said Leigh McMullen, distinguished vice president analyst at Gartner. “GenAI has broken the mold and has kept building more excitement.”To read this article in full, please click here
Chipmaker Nvidia and the world’s largest contract manufacturer Foxconn are partnering to start building AI factories globally, the two companies announced on Tuesday.AI factories are data centers with infrastructure specially built for processing, refining, and transforming vast amounts of data into valuable AI models and tokens, Nvidia founder and CEO Jensen Huang and Foxconn Chairman and CEO Young Liu, said during a fireside chat at Hon Hai Tech Day, in Taipei.“A new type of manufacturing has emerged — the production of intelligence. And the data centers that produce it are AI factories,” Huang said in a statement, adding that the data center infrastructure would include Nvidia’s accelerated computing platform — the latest GH200 Grace Hopper Superchip and Nvidia’s AI enterprise software.To read this article in full, please click here
Cloud computing, hybrid work, and remote connectivity are amplifying the need for networking and security teams to be in lockstep. Increasingly, enterprises are considering consolidating the two groups – or at least boosting collaboration between teams, according to research from Cato Networks.In a recent survey of 1,694 IT leaders worldwide, 44% of respondents said networking and security teams “must work together,” and another 30% said they “must have shared processes.” Another 8% said they’re working to create one networking and security group.The goal of shared processes could be a hefty challenge for some organizations. In the Cato Networks survey, 12% of respondents reported that their networking and security teams either have “turf wars or struggle working together,” and another 34% said they “occasionally have problems working together.” The remaining 54% reported that the two teams work well together now.To read this article in full, please click here
Linux provides a lot of ways to display date and time information and not just for the current date and time. You can get information on dates way in the past or in the far future. You can also limit the data provided to just the current weekday or month. This post explains many of these options and provides examples of what you can expect to see.Displaying the current date
Typing “date” on the Linux command line results in quite a bit more data than just the date. It also includes the day of the week, the current time and the time zone.$ date
Mon Oct 16 11:24:44 AM EDT 2023
The command shown below gives displays the date in the shorthand month/day/year format.To read this article in full, please click here
This post covers some well-known Linux commands that, when used with particular options and arguments, can save you some time or ensure that what you are doing is what you intended. The first “trick” involves how you exit vi or vim and the difference that can make.Using :x instead of :wq when saving files with vi or vim
The vi and vim editors are the most commonly used text editors on Linux systems. When you exit either with :x instead of the more common :wq, the file will only be saved if you have just made changes to it. This can be helpful if you want to ensure that the file’s timestamp reflects its most recent changes. Just keep in mind that, if you make a change to a file and then undo those changes – like deleting a word or a line and then replacing it with the same content, this will still be seen as a change and vi or vim will save the file, updating the timestamp whether you use :x or :wq.To read this article in full, please click here
Arista Networks has unveiled a portfolio of 25G Ethernet switches aimed at supporting data center, financial, industrial control applications that demand high-performance and extremely low latency.The new 7130 25G Series boxes are a significant power and features upgrade over the vendor’s current 7130 10G Ethernet line of devices and promise to reduce link latency 2.5-fold for data transmission by reducing queuing, serialization delays and eliminating the need for latency-inducing Forward Error Correction (FEC) typically required by 25G Ethernet, according to the vendor. In addition the new switches eliminate the need for multiple cables and switches to set up and support the current level of low-latency networks, according to Martin Hull, vice president of Cloud Titans and Platform Product Management with Arista Networks in a blog about the new switches.To read this article in full, please click here
By: Gabriel Gomane, Senior Product Marketing Manager at HPE Aruba NetworkingAs organizations are moving to a cloud-centric architecture, where most applications reside in the cloud and the demand for hybrid work environment increases, security must evolve in parallel:
Legacy VPNs have often provided poor user experience. Additionally, usage of VPNs without granular controls could over-extend network privilege, granting users more access to resources than necessary, increasing security risks.
Traditional network architectures routed application traffic to the data center for security inspection, which is no longer practical, and impacted application performance since most applications now reside in the cloud.
With data increasingly hosted in SaaS applications, organizations need to take extra steps to protect their data. Sensitive data can indeed be stored in both sanctioned and unsanctioned cloud applications (or shadow IT), and may travel over unsecured links, leading to potential risk of data loss.
Employees are vulnerable to web-based threats such as phishing attacks and ransomware when browsing the internet or simply accessing emails.
The explosion of IoT devices in the recent years have significantly increased the attack surface. However, IoT devices are often built on a simple design and lack sophisticated security mechanisms.
Finally, organizations must comply with Continue reading
Chipmaker AMD has announced plans to acquire open source machine learning and AI software provider Nod.ai as the chipmaker looks to expand its AI capabilities in a bid to shore up competition against AI chip market leader Nvidia.The acquisition, whose financial details have not been disclosed, is expected to bring AMD a team that can help accelerate the deployment of AI-based offerings optimized for the company’s Instinct data center accelerators, Ryzen AI processors, EPYC processors, Versal SoCs, and Radeon GPUs, AMD said in a statement.To read this article in full, please click here
In the rush to deploy generative AI, many organizations are sacrificing security in favor of innovation, IBM warns.Among 200 executives surveyed by IBM, 94% said it’s important to secure generative AI applications and services before deployment. Yet only 24% of respondents’ generative AI projects will include a cybersecurity component within the next six months. In addition, 69% said innovation takes precedence over security for generative AI, according to the IBM Institute for Business Value’s report, The CEO's guide to generative AI: Cybersecurity.To read this article in full, please click here
Juniper Networks today said it is laying off 440 workers amidst a $59 million restructuring plan.The restructuring strategy is the result of a review of the company’s business objectives, and it is intended to focus on realigning resources and investments in long-term growth opportunities, the networking vendor wrote in an SEC 8K filing.“The company believes the plan will further allow it to continue to prudently manage operating expenses in order to deliver improved operating margin,” Juniper wrote. “Total costs currently estimated to be incurred in connection with the Plan are approximately $59 million, of which approximately $48 million are expected to result in cash expenditures.”To read this article in full, please click here
Linux systems provide a very easy-to-use command for breaking files into pieces. This is something that you might need to do prior to uploading your files to some storage site that limits file sizes or emailing them as attachments. To split a file into pieces, you simply use the split command.$ split bigfile
By default, the split command uses a very simple naming scheme. The file chunks will be named xaa, xab, xac, etc., and, presumably, if you break up a file that is sufficiently large, you might even get chunks named xza and xzz.Unless you ask, the command runs without giving you any feedback. You can, however, use the --verbose option if you would like to see the file chunks as they are being created.To read this article in full, please click here