A new specification from the Open Compute Project could mean more choices for IT pros when it comes time to replace server cards.The spec defines a block of code that, when used in processors, establishes root of trust (RoT) boot security. Because the spec is open, any chip maker can use it, and it will provide interoperability with chips made by other chip makers that also use it. This can help eliminate being locked into a single vendor because of proprietary RoT code.By standardizing on OCP hardware, for example, it’s possible to replace a bad smartNIC from one vendor with one from another vendor, says Bill Chen, general manager of server product management at Supermicro, an OCP member.To read this article in full, please click here
Some of the biggest challenges faced in securing industrial control systems involve integrating legacy and aging operational technology with modern IT systems.
The rate of SD-WAN adoption is quickly rising to the point of ubiquity. In an era of distributed environments — including applications, employees, cloud, Edge, and data centers — navigating network complexity has become an increasing common challenge.Recent ESG research found that 54% of survey respondents felt restrained by network complexity in terms of both operational efficiency and user experience. Impacted companies have two solutions for deploying SD-WAN: Do It Yourself (DIY) and or via Managed Service Providers (MSP). It’s up to IT leaders to choose the approach that will most effectively manage their deployments.To read this article in full, please click here
Despite problems getting parts and a gigantic backlog of orders to fill, Extreme Networks landed a record-setting first-quarter FY23 of nearly $300 million, up 11% year-over-year, and 7% quarter-over-quarter.The backlog CEO Ed Meyercord referred to during the company’s quarterly earnings call this week sits at $555 million, also a record. To put it in perspective, that's nearly three full quarters of product revenue in backlog, mostly due to supply-chain issues. Concerns about the economy are also in the mix, but Meyercord said that when it comes to investing in networks, things look bright.To read this article in full, please click here
Determining how many characters are in a file is easy on the Linux command line: use the ls -l command.On the other hand, if you want to get a count of how many times each character appears in your file, you’re going to need a considerably more complicated command or a script. This post covers several different options.Counting how many times each character appears in a file
To count how many of each character are included in a file, you need to string together a series of commands that will consider each character and use a sort command before it counts how many of each character are included.To do that, you can use a command like this one:To read this article in full, please click here
Cisco is offering software updates for two of its AnyConnect for Windows products it says are actively being exploited in the field.AnyConnect for Windows is security software package, in this case for Windows machines, that sets up VPN connectivity, provides access control and supports other endpoint security features. Cisco said AnyConnect products for MacOS, Linux are not affected.Cisco said its Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerability, which is described in this advisory.To read this article in full, please click here
If you want to check a text file for typos, Linux can help.It has a couple of tools and a number of commands that can point out the errors including aspell and enchant, and I’ll share a script that I put together recently that looks for typos using the system's words file.Using aspell
aspell is very clever tool that will point out typos and make it surprisingly easy to fix them. When used to make changes to a single file, it reverses the text and background colors to highlight misspelled words. You would start it with a command like this:$ aspell check myfile
If aspell detects no typos, it simply exits. Otherwise, it will open with a display that contains the file text (or just the top lines depending on the length of the file) followed by a list of suggested replacement words and, below that, a list of the commands that you can run. The first typo (or suspected typo) will be displayed with the text and background colors reversed as shown below.To read this article in full, please click here
Oracle and Nvidia have extended their partnership to help speed customer adoption of artificial intelligence (AI) services.As part of the deal, Oracle Cloud Infrastructure (OCI), which is Oracle’s cloud service, will beef up the infrastructure with tens of thousands of Nvidia GPUs, both the Ampere A100 currently on the market and the upcoming Hopper H100. Oracle will also add Nvidia’s AI software stack that supports AI training and deep learning.This includes an upcoming release of Nvidia AI Enterprise software with access to Nvidia’s AI development and deployment platform that provides processing engines for each step of the AI workflow, from data processing and AI model training to simulation and large-scale deployment.To read this article in full, please click here
Freeman Health System has around 8,000 connected medical devices in its 30 facilities in Missouri, Oklahoma, and Kansas. Many of these devices have the potential to turn deadly at any moment. "That’s the doomsday scenario that everyone is afraid of," says Skip Rollins, the hospital chain's CIO and CISO.Rollins would love to be able to scan the devices for vulnerabilities and install security software on them to ensure that they aren't being hacked. But he can't."The vendors in this space are very uncooperative," he says. "They all have proprietary operating systems and proprietary tools. We can't scan these devices. We can't put security software on these devices. We can't see anything they're doing. And the vendors intentionally deliver them that way."To read this article in full, please click here
As Cisco celebrates the 25th anniversary of Cisco Networking Academy, the company on Tuesday announced two new certifications and a plan to provide networking, cybersecurity and general IT training to 25 million people over the next 10 years.The training will be done through the company's networking academy, an IT skills-to-jobs program that provides IT courses, learning simulators, and hands-on learning opportunities, supporting instructors and learners in 190 countries. To date, Cisco says more than 17.5 million global learners have taken Cisco Networking Academy courses to gain IT skills, with 95% of students attributing their post-course job or education opportunity to Cisco Networking Academy.To read this article in full, please click here
New capabilities in Fortinet's secure access service edge (SASE) package are designed to help customers better secure their private and cloud-based assets.Fortinet added Secure Private Access and Secure SaaS Access features to its FortiSASE security platform, which includes SD-WAN, secure web gateway, firewall as a service, and zero-trust network access. All of Fortinet’s offerings run on top of its FortiOS operating system.To read this article in full, please click here
T-Mobile retained its place as the consensus fastest mobile data provider in the US, posting a median download speed of 116Mbps and outstripping Verizon and AT&T by a roughly two-fold margin in the latest market analysis report from network analysis firm Ookla. Additionally, the report—based on tests in the third quarter—found that Spectrum topped the rankings for fastest fixed broadband service, beating out Cox and Xfinity for the top spot with a median download speed of 211Mbps.The figures were gathered via Ookla’s online Speedtest website, which lets users test their internet connections for upload speed, download speed, latency and more.To read this article in full, please click here
IT executives must look beyond cost savings to new forms of operational excellence and seek technologies that can help them optimize resilience, scale industry-specific solutions and product delivery, and pioneer new forms of engagement, according to the 10 top strategic technology trends for 2023 unveiled at Gartner’s IT Symposium/Xpo 2022.These include multiple forms of wireless, artificial intelligence, and sustainability, according to Frances Karamouzis, distinguished vice president and analyst at Gartner, and external events are making IT pros’ decisions about them even more difficult.“Depending on what region of the world you are in there are lots of looming issues such as a potential recession, supply chain concerns, the war in Ukraine and that impact, as well as energy-related issues,” Karamouzis said.To read this article in full, please click here
Startup Graphiant emerged from stealth mode last month with what it describes as an enterprise-grade network service that provides the privacy, security, and reliability of MPLS but with the cost effectiveness, agility, and scalability of broadband internet.In addition, the service, called Graphiant Network Edge, is simpler to deploy and manage than the hybrid SD-WAN/MPLS networks that many enterprises wind up with when they adopt SD-WAN, according to Graphiant CEO Khalid Raza.To read this article in full, please click here
Dell Technologies has aggressively promoted Azure Stack, Microsoft’s software package that allows enterprises to run a complete copy of the Azure cloud service within their own data center.Now it has introduced a hyperconverged infrastructure (HCI) system designed to support Azure Stack: a 1U server that allows organizations to start small with their deployment and grow.Formally known as Dell Integrated System for Microsoft Azure Stack HCI, the single-node system is designed for customers with smaller data-center footprints, but is expandable to support AI/ML workloads.To read this article in full, please click here
Google Cloud announced new virtual machines as part of its cloud platform based on Intel’s newest Xeon Scalable processors.In addition to the new C3 virtual machine series, Google also announced it is deploying Infrastructure Processing Units (IPU), which are designed to intelligently route network traffic and take the load of network data processing off the CPU. The company made the announcements at its Google Cloud Next ’22 conference held virtually.The IPU chip, formally known as the E2000, was co-designed by Google and Intel together and features 16 Arm Neoverse cores and 200GbE networking.C3 machine instances deliver performance gains of up to 20% over previous generation of C2 instances. They also benefit from a recent product launch called Hyperdisk, a block storage system that offers 80% higher IOPS per vCPU for data analytics and DBMS workloads when compared to other hyperscalers,To read this article in full, please click here
The IoT fingerprinting feature will allow companies to fully identify IoT devices that don't have the storage or processing capabilities to communicate complete identifying information such as model number, or even device type.
Using a function in bash allows you to create something in Linux that works as if it were a script within a script. Whenever the data being processed matches a set of conditions, your script can call a function that does further processing.The format of a function is very straightforward. The syntax looks like this:<function_name> () {
<commands>
}
You can also use the following format that uses the word "function" if you prefer:function <function_name> {
<commands>
}
In fact, you can also create a function on a single line if the commands to be run are limited, but note the required “;” that follows the command(s):To read this article in full, please click here