Google Cloud is rolling out new network and security features, including a service that provides Layer-7 security.The new offerings announced at Google Cloud Next also include firewall and web application-protection options aimed at advancing existing cloud connectivity and ensuring the security of cloud-based resources.“We are fundamentally enhancing our network fabric—which includes 35 regions, 106 zones and 173 network edge locations across 200-plus countries—and making it simpler and easier for organizations to migrate their existing workloads and modernize applications all while securing and making them easier to manage,” said Muninder Sambi, vice president and general manager of networking for Google Cloud.To read this article in full, please click here
Google Cloud has extended its mainframe migration services to include a new option that enables parallel processing – customers can simultaneously run their mainframe workloads on prem and in the cloud, with the ultimate goal of moving those resources to the cloud.The new service, Dual Run for Google Cloud, is in preview status and lets customers run workloads on their existing mainframes and on Google Cloud concurrently without interrupting operations. Enterprises can then perform real-time testing and determine application performance and stability in the cloud. A large challenge with mainframe systems is the tight coupling of data to the application layer. Companies would have to stop an application for some period of time in order to move it, modernize it or transform it, according to Google.To read this article in full, please click here
Back in August, TrendForce Research predicted that due to an oversupply in NAND flash memory, the price of SSDs could drop by 5% to 10% in the third quarter.Since then, the economy has only worsened and the oversupply has continued, and while TrendForce hasn't reported the Q3 actuals, it's now predicting 15% to 20% drop in NAND flash prices in the fourth quarter on top of the Q3 drop..TrendForce says buyers of NAND flash memory—vendors that make SSDs but don’t manufacture their own memory—have reduced their NAND inventory and cut back on new purchases in the second half of the year. Meanwhile makers of memory drastically reduced prices to boost sales. Now TrendForce predicts that before the end of the year, suppliers will be selling memory at a loss and reduce production.To read this article in full, please click here
Bash provides a large number of options that can be used to control the behavior of bash scripts. This post examines some of the more useful ones and explains how to display which options are in use and which are not.Exiting when an error occurs
If you want a bash script to exit soon as it encounters an error—any error at all—in your scripts, you can add the set -o errexit option. If your script contains a syntax error, tries to read a file that doesn’t exist, attempts to append to a file when you don’t have permission to do so, or misuses a command in some way, the script will end abruptly. Here is a simple example:#!/bin/bash
set -o errexit
tail NoSuchFile
echo -n “Enter text to be appended> “
read txt
echo $txt >> NoSuchFile
Try to run this script, and you’ll see this:To read this article in full, please click here
Cisco continues to build tighter SD-WAN integration with the leading cloud service providers to better tie together widely distributed resources.This week Cisco and Microsoft extended their SD-WAN/Microsoft Azure integration to enable building single or multiple overlays on top of Microsoft’s backbone to interconnect enterprise sites worldwide, and to connect sites to workloads running inside Azure, similar to an arrangement Cisco has with Google Cloud.To read this article in full, please click here
As Morgan Stanley Smith Barney has learned, an information technology asset disposal program can protect a company against the potential catastrophe of data leaks from gear you’re getting rid of.
Modern networks are critical for any enterprise. Networks deliver business applications, multimedia messages and key data to end users around the world. A fundamental element that networks have in common is the network switch, which helps connect devices for the purpose of sharing resources within a local area network (LAN).What is a network switch?
A network switch is a physical device that operates at the Data Link layer of the Open Systems Interconnection (OSI) model -- Layer 2. It takes in packets sent by devices that are connected to its physical ports, and forwards them to the devices the packets are intended to reach. Switches can also operate at the Network Layer (Layer 3) where routing occurs.To read this article in full, please click here
Long-time WAN provider Aryaka today released a version of its Zero Trust WAN product that incorporates a new Secure Web Gateway and Firewall-as-a-Service as it works toward a SASE-enabled WAN offering.The idea is to provide a much more updated version of WAN to enterprise customers-– where SD-WAN traditionally lived in a box in branch offices, the pandemic and the evolving SASE model prompted a more flexible rethink. Now, Aryaka’s latest model is an entirely cloud-based offering, routing secure traffic to branch offices or remote employees while being able to employ robust security technologies via Aryaka’s own cloud.To read this article in full, please click here
While it is clearly early in the game, VMware has made a bunch of moves recently to ensure that DPUs and the smartNICs they enable are an equal part of enterprise networking environments of the future.VMware is a leading proponent of using digital processing units to free-up server CPU cycles by offloading networking, security, storage, and other processes in order to rapidly and efficiently supporting edge- and cloud-based workloads.Competitors—and partners in some cases—including Intel, Nvidia, AWS, and AMD, also have plans to more tightly integrate DPU-based devices into in firewalls, gateways, enterprise load balancing, and storage-offload applications.To read this article in full, please click here
Enterprise IT teams are always on the lookout for ways to save money or gain operational efficiencies. One approach is to purchase used data center equipment such as servers, rather than investing in brand new systems and paying top dollar.There’s no shortage of resellers who cater to this market. Some equipment resellers specifically target gear from hyperscalers, because the hyperscalers replace their hardware at a fast pace, and the equipment they turnover can be more powerful than what most enterprises use today.Those in the business of selling used equipment say demand for their offerings is high.To read this article in full, please click here
Networking vendors have a lot on their plate. They need to innovate in areas like automation, AIOps, Zero Trust Network Access (ZTNA), secure access service edge (SASE), visibility, and multi-cloud management.They must respond to customer preferences for subscription models and network as-a-service (NaaS) offerings. In a recent survey, IDC reported that 61% of organizations worldwide were interested in shifting to consumption-based models for IT investments rather than capital intensive purchases.To read this article in full, please click here
Beyond the human cost, natural disasters like hurricane Ian can take a high toll on business continuity, causing enterprise-infrastructure damage that takes days or weeks to fix at a downtime cost in the six figures per hour. If Ian didn’t get you, now is the time to prepare for a future disaster that might hit your network.Vulnerable areas include cloud providers’ managed services that might require customers to explicitly specify they want their apps, compute, and storage housed in redundant, geographically separate availability zones. According to Uptime Institute, roughly one third of enterprises are architecting cloud apps that are vulnerable to outages in single cloud availability zones, rather than distributing their workloads across multiple zones.To read this article in full, please click here
Beyond the human cost, natural disasters like hurricane Ian can take a high toll on business continuity, causing enterprise-infrastructure damage that takes days or weeks to fix while downtime costs in the six figures per hour. If Ian didn’t impact your operations, now is the time to prepare for a future disaster that might hit your network.Vulnerable areas include cloud providers’ managed services that might require customers to explicitly specify they want their apps, compute, and storage housed in redundant, geographically separate availability zones. According to Uptime Institute, roughly one third of enterprises are architecting cloud apps that are vulnerable to outages in single cloud availability zones, rather than distributing their workloads across multiple zones.To read this article in full, please click here
By: Gabriel Gomane, Senior Product Marketing Manager, Aruba, a Hewlett Packard Enterprise company.Originally created primarily to support WAN virtualization, SD-WAN capabilities have evolved to manage more aspects of the network—including security. Today, secure SD-WAN solutions have also enabled IT teams to eliminate branch firewalls in favor of a simplified branch WAN infrastructure.The reasons are manifold. As network architecture continues to shift to the cloud, branch offices must now tackle new security challenges as the network grows more complex as more users connect outside the traditional security perimeter. At the same time, enterprises want additional flexibility to cope with the growing number of cloud applications, the ability to open new branches faster, or host new applications more quickly. The traditional network structure, built on MPLS, routers, and firewalls, simply cannot handle the flexibility enterprises need, due to the cost, complexity, and rigidity this hardware demands…especially as it was never designed to be part of the emerging cloud infrastructure of today. To read this article in full, please click here
Lenovo Group is marking its 30th anniversary with its largest data-center product launch ever, with more than 50 new products covering servers, storage, and edge systems.Specifically, the celebration is for the ThinkSystem server, and many of the announcements were about upgrades. first introduced under the name PS/2 Server when IBM owned the business. It sold that x86 business to Lenovo in 2015, and it became the Lenovo Infrastructure Solutions Group.Due to the sheer numbers we won’t get into the individual products. Suffice it to say nearly everything is being upgraded. The next generation of ThinkSystem servers and storage, along with the ThinkEdge edge computing device lineup, as well as the ThinkAgile family of hyperconverged infrastructure appliances collectively are called Lenovo Infrastructure Solutions V3.To read this article in full, please click here
In reviewing CPU and server benchmarks, you’ve undoubtedly noticed that testing covers both single-core and multi-core performance. Here's the difference.In terms of raw performance, both are equally important, but single- and multi-core have areas of use where they shine. So when picking a CPU, it’s important to consider your particular workloads and evaluate whether single-core or multi-core best meets your needs.Single-core CPUs
There are still a lot of applications out there that are single-core limited, such as many databases (although some, like MySQL, are multicore).Performance is measured in a couple of ways. Clock frequency is the big one; the higher the frequency the faster apps will run. Also important is the width of execution pipelines, and the wider the pipeline, the more work can get done per clock cycle. So even if an app is single threaded, a wider pipeline can improve its performance.To read this article in full, please click here
The commands for looping in bash are extremely useful. They allow you to run a series of commands as many times as needed to process a large collection of data. The break and continue commands provide another special option. They allow you to exit a loop early or skip the remaining commands in the loop and return to the beginning.Both the break and the continue commands are meant to be used only in for, while and until loops. In fact, if you try to invoke the break command on its own, bash will tell you just that.To read this article in full, please click here
Breached information includes names, dates of birth, phone numbers, email addresses, and, for a subset of customers, addresses, ID document numbers such as driver's licence or passport numbers.
A new survey released by UK-based research firm Omdia bears out some of the industry’s rosier predictions for IoT uptake among businesses, finding that almost four out of five companies expect to be actively deploying IoT within the next two years.The survey, which was commissioned by IoT connectivity vendor MachineQ and collected responses from more than 200 enterprises in the manufacturing, retail, real estate and construction, healthcare and life sciences industries, also found that 70% of respondents said that they planned to have more than 50,000 IoT devices deployed within the next 24 months.To read this article in full, please click here
Artificial intelligence (AI) may be all the rage, but it's still slow to be deployed. The learning curve is steep, there are few people with adequate AI experience, and the rules of governance are unclear.That explains Gartner's 2020 statistic that only 53% of AI pilot programs actually make it to deployment. The tools and experience needed are just not there for the average IT shop, especially a smaller enterprise.Nvidia is looking to change that with a pair of AI-related alliances with consulting giants Deloitte and Booz Allen Hamilton. Both deals are designed to help companies plot AI strategies and gain access to Nvidia technology and expertise.To read this article in full, please click here