Optane, the memory technology pioneered and championed by Intel, has seen its last days. Intel has decided to wind down the technology as part of a refocusing effort.The news came on an earnings call with analysts to discuss Intel’s rocky second quarter. Since Pat Gelsinger has taken the reigns at Intel, the company has divested itself of McAfee (although that process began before Gelsinger arrived) as well as shed its drone business, NAND products, RealSense visual sensors, and Intel Sports.
Read more: Intel’s $20 billion bet on advanced fabricationTo read this article in full, please click here
You’ve done everything to secure your network, and you still face threats. That’s what most enterprises say about their network security, and they’re half right. Yes, they still face threats, but they’ve not done everything to address them. In fact, most enterprises haven’t really implemented the two foundations on which real network security must be based.When I ask enterprises whether they’ve done a top-down analysis of network security, they usually say they do it every year. When I ask what’s involved in that assessment, they say they look for indications that their current strategies have failed. They build another layer, which is kind of like putting a second Band-Aid on a cut.To read this article in full, please click here
Life on the command line on Linux is clearly something most of us enjoy, but typing the same command again and again can become tiresome. To avoid that boredom, this post explains a number of ways that you can make repeating commands – or repeating commands but with some changes – a lot easier than you might expect.Rerunning the previous command
First, the easiest way to repeat a command is simply by typing !!. If you were logged into a Linux server and waiting for a coworker to log in, for example, you might want to repeat the who command shown below until you see your coworker’s username. Typing !! after the initial who command will do this for you.To read this article in full, please click here
Data center operators are weighing new approaches to thermal management as they deal with growing compute requirements and strive to achieve sustainability goals. They’re not alone in prioritizing sustainability: Enterprise IT buyers are increasingly looking for data centers with sustainability credentials and are making purchasing decisions based on the presence of practices that reduce greenhouse gas emissions.That’s the crux of findings from research and advisory firm Omdia, which last week unveiled its Data Center Thermal Management and Sustainability Intelligence Service. The service is aimed at analyzing sustainable data-center best practices and strategies, with a focus on new technologies such as liquid cooling and energy storage systems.To read this article in full, please click here
Release 9 of Rocky Linux just made its public appearance on July 14, and the big news is something called Peridot, which anyone (yes, anyone) can use to reproduce Rocky Linux 9 from scratch on their own. This is a truly exciting turn for the Linux community.If you’re not familiar with Rocky Linux, don’t be too surprised that it made it to Release 9 and you’re just now tuning in. “Release 9” doesn’t mean that Rocky has gone through eight prior major releases. Instead, the name indicates its connection to RHEL 9. Rocky Linux began life as Release 8.3 in April 2021 as a replacement for CentOS, which was EOL’ed in December 2020.To read this article in full, please click here
From incorporating cloud services to keeping the hybrid workforce humming, network execs and architects face myriad challenges every day.The main goals of large organizations are to prioritize those challenges, adjust the network architecture to handle widely distributed applications, services and users, and keep corporate resources secure, according to Neil Anderson, area vice president with World Wide Technology, a $14.5 billion global technology services provider.
Read more: SSE is SASE minus the SD-WANTo read this article in full, please click here
Major chip vendors including Intel are telling customers that they’re set to begin hiking chip prices in the fourth quarter as they deal with increasing costs and supply shortages.The rumor initially started with Intel. Now Qualcomm and Marvell Technologies have also begun informing customers of price increases, according to a report from Taiwanese publication DigiTimes.“On its Q1 earnings call, Intel indicated it would increase pricing in certain segments of its business due to inflationary pressures. The company has begun to inform customers of these changes,” an Intel spokesperson said in a statement to me.To read this article in full, please click here
IBM is expanding its Power10 server lineup with four new midrange and scale-out systems designed for on-premises, data-intensive and business-critical workloads.The new Power S1014, Power S1022, Power S1024 and Power E1050 platforms cover a range of workloads.The E1050 is a four-socket system optimized for data-intensive enterprise workloads. In terms of how it ranks, the E1050 is a step below the top end of the Power10 portfolio, which is the existing E1080 four-socket rack server.The new scale-out systems are the single-socket S1014, described as ideal for entry-level SMBs and remote offices, and the S1022 and S1024 systems, which are two-socket systems aimed at higher-end uses.To read this article in full, please click here
Nvidia, the darling of high performance computing (HPC), is bringing new attention to quantum computing. The company has launched its Nvidia Quantum Optimized Device Architecture, or QODA. This hybrid platform is designed to make quantum computing more accessible by enabling programming of both quantum applications and classical applications in a single, consolidated environment. According to Nvidia, it's aimed at speeding breakthroughs in quantum research and development across AI, HPC, health, finance and other disciplines.To read this article in full, please click here
It’s time to take a hard look at whether you’re devoting enough resources to securing your network infrastructure. Short answer: You’re probably not.If you work for a hyperscaler, your organization is probably doing everything it can to secure the network. For almost everyone else, it is pretty safe to assume that the answer is no.This is not necessarily a blameworthy failing. In many cases it is down to available resources and perceived risk: Given too little money for cybersecurity and too little time from too few people to tackle all possible risks in the network, what should network cybersecurity staff focus on? They tend to focus less on the inward-facing aspects of their networks and more on explicitly outward-facing pieces.To read this article in full, please click here
Juniper Networks has upgraded its cloud-based management platform and introduced a new switch family for campus and branch networks.On the management side, Juniper says the goal is to simplify network operations for organizations with a mix of campus, branch, micro-site, and remote-worker settings, and it is doing that by adding features to its Mist AI/ML cloud-based management platform and its Marvis virtual network assistant.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here
By: Tom Hollingsworth, Networking Expert.Crucial to any user experience is consistency. After all, users can be fickle. They want things now. They might even want it to be fun, but more importantly, they require a consistent experience. Between increased speed or consistency, users most always pick consistency. No matter where they log in or on what device they happen to be using, especially when it comes to real-time communications experiences on an app, they want the same treatment time and time again. It’s crucial to their success.That consistent experience requirement also extends to aspects they may not see or even realize is vital to the capabilities they rely upon. Chief among them is security policy. Policy enforcement should not be predicated or determined by whether they are using a company-issued laptop inside the proverbial corporate firewall or not.To read this article in full, please click here
Deloitte's new Zero Trust Access service and HCL's collaboration with Palo Alto Networks mark a sustained trend towards offering Zero Trust security services for clients.
Chipmakers STMicroelectronics (STM) and GlobalFoundries (GF) have announced plans to build a jointly operated 300mm semiconductor wafer manufacturing facility in France.According to a statement on STM’s website, STM and GF will receive “significant financial support” from the French government to fund the project. The announcement forms part of French president Emmanuel Macron’s efforts to attract more foreign investors to the country.To read this article in full, please click here
RHEL 9.0, the latest major release of Red Hat Enterprise Linux, delivers tighter security, as well as improved installation, distribution, and management for enterprise server and cloud environments.The operating system, code named Plow, is a significant upgrade over RHEL 8.0 and makes it easier for application developers to test and deploy containers.Available in server and desktop versoins, RHEL remains one of the top Linux distributions for running enterprise workloads because of its stability, dependability, and robustness. To read this article in full, please click here
Most IT executives are probably familiar with the concepts of DevOps and DevSecOps. There’s a new model generating considerable buzz that is particularly relevant to networking professionals: NetDevOps.As with other emerging technologies, the definition of NetDevOps varies depending on who is providing it. But at a basic level, the term refers to the application of DevOps principles to computer networking.“NetDevOps is a pretty hot [and] hyped topic,” says Andrew Lerner, research vice president for networking at Gartner. “But the first question is, what is it, as there are different definitions and perceptions.”How to choose an edge gateway
What is NetDevOps?
Under the Gartner definition, NetDevOps entails applying the DevOps concepts of continuous integration/continuous deployment (CI/CD) to networking activities. Other terms used to describe this model include NetOps 2.0, network as code and GitOps networking, Lerner says.To read this article in full, please click here
File names on Linux systems can be as long as 255 characters. While determining which files in a directory have the longest names might not be the most exciting task at hand, doing this with a script poses some interesting challenges that invite equally interesting solutions.To start, consider passing the output of the ls command, which is used to list files, to a wc command that counts the characters like this:$ ls myreport.txt | wc -c
13
If you counted the letters in “myreport.txt” by looking at “myreport.txt”, you likely noticed that there are 12, not 13 letters in that file name. This is because, just as in the command below, echo sends the requested text through the pipe along with a newline character at the end.To read this article in full, please click here
An overwhelming majority of enterprises continue to move workloads from the cloud back to on-premises data centers, although it is a smaller percentage than before, according to IDG research.A survey found that 71% of respondents expect to move all or some of their workloads currently running in public clouds back to private IT environments over the next two years. Only 13% expect to run all their workloads in the cloud, according to the survey sponsored by Supermicro.In the past, those expecting to move workloads back from the cloud was as high as 85%, according to Natalya Yezhkova, research vice president in IDC’s enterprise infrastructure practice.To read this article in full, please click here
The latest PCI Express (PCIe) specification again doubles the data rate over the previous spec.PCI Express 7.0 calls for a data rate of 128 gigatransfers per second (GT/s) and up to 512 GB/s bi-directionally via x16 data lane slot (not every PCI Express slot in a PC or server uses 16 transfer lanes), according to PCI-SIG, the industry group that maintains and develops the specification.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]
The slower, previous spec, PCI Express 6.0 has yet to come to market, and doubling the rate with each version has become the norm.To read this article in full, please click here