Fedora Linux has been recognized as a "digital public good" by the Digital Public Goods Alliance (DPGA), a strategy group set up by UNICEF to promote sustainable development through open-source solutions that contribute to an equitable world.The reasons Fedora was recognized include that Fedora:
promotes best practices and adheres to standards
creates an innovative platform for hardware, clouds, and containers that enables software developers and community members to build tailored solutions for their users
is free of charge and comes with permissions to use, copy, modify, merge, publish, distribute, sublicense and/or sell copies of the software without restrictions other than that the same permissions must be granted to anyone using resulting products
adheres to privacy and other applicable international and domestic laws
shares personal information in limited and acknowledged ways
causes no harm
follows privacy policy guidelines and makes privacy policy available to partners
Finding installed packages on Fedora Linux systems
DPGA also notes that Fedora is actively used in 483 countries.To read this article in full, please click here
Cisco has patched three critical security holes in its IOS XE software that's used across a variety of its core routers and switches.The three critical warnings are part of a big release of 32 security alerts, many of which are IOS XE-related, including firewall, SD-WAN and wireless access vulnerabilities.Linux security: Cmd provides visibility, control over user activity
Of the critical patches, the worst is a weakness in the Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers; it's rated as a 10 out of 10 on the Common Vulnerability Scoring System (CVSS).To read this article in full, please click here
At first glance, Intel doesn’t look like a company under siege. In its last fiscal year, it recorded $77.8 billion in sales and $20 billion in profit. Its market capitalization is $220 billion as of mid-September 2021.And yet it is. When you’re the leader, all your competition is gunning for you. Intel is wrestling with a loss of leadership in manufacturing and process nodes, it’s losing share to a very resurgent AMD, an unrelenting Nvidia is challenging Intel for AI dominance, the Atom processor failed spectacularly against Arm in the mobile market, and it’s on its third CEO in three years.
More about Intel:
A closer look at two newly announced Intel chips
Intel shifts to a multiarchitecture model
Intel revises its chip terminology and branding
CEO Gelsinger shakes up Intel
But Intel revels in the competition. “Our success in so many markets makes us targets for lots of companies,” said Lisa Spelman, corporate vice president and general manager of the Xeon and memory group. “So it’s not a surprise that we have competitors that want a piece of that.” To read this article in full, please click here
Nutanix is releasing enhancements to its AOS operating system and Era database-management service designed to make it easier for enterprises to manage data, workloads, and business-continuity security tools in hybrid cloud environments via software-defined networking capabilitiesAOS and Era are both components of the Nutanix Cloud Platform. AOS 6, the new version of Nutanix's hyperconverged infrastructure (HCI) software, is designed to simplify network management across multiple clouds and enable enterprises to build virtual private clouds. Nutanix announced the updates at its .NEXT event this week.To read this article in full, please click here
When it comes to storing data, there is no ‘one-size-fits-all’ solution, so before you decide where or how to store your data, first understand the amount and type you have and why you need to store it.How to make sure data that should be backed up gets backed up
So how do you formulate a sound data-storage management strategy? IDG asked dozens of storage and data management experts, which resulted in these top 14 suggestions regarding what steps you need to take to choose the right data storage solution(s) for your organization—and how you can better ensure your data is properly protected and retrievable.To read this article in full, please click here
Lenovo is expanding its TruScale pay-per-use model to cover all its data-center products—servers, storage—and client-side devices—laptops, tablets.This transition to a fully integrated, end-to-end, as-a-service model is part of the company’s “One Lenovo” strategy of providing its entire portfolio of clients and servers as a fully managed, on-premises cloud environment through TruScale leasing.One Lenovo simply means laptops and desktops will be sold along with data-center products together all under one sales program. Lenovo will launch a new channel program in 2022 to encompass the One Lenovo strategy.The everything-as-a-service announcement came at the company’s virtual Lenovo Tech World 2021 eventTo read this article in full, please click here
Virtualization is an essential part of modern IT infrastructure that presents many routine management tasks to sysadmins, among them increasing virtual hard-drive space when necessary. In my line of work, because of expanding log files, scaling for growing processes, and new tasks for existing servers, this is something I do at least once a month.Here’s how to do it in a Microsoft Server Hyper-V hypervisor running Windows Server 2016 using either Hyper-V Manager or Failover Cluster Manager.To read this article in full, please click here
The ethtool utility on Linux allows you to view and change some of your network-driver and interface-card settings, especially for wired devices. These include their speed, whether the interface uses auto-negotiation, and whether it runs in half- or full-duplex mode. Ethtool also provides an easy way to view or troubleshoot your network interface.More than likely, ethtool is already available on your Linux system. However, to check, you can use one or both of these commands:$ which ethtool
/usr/sbin/ethtool
$ sudo ethtool —version
ethtool version 5.13
To get a sense of how this utility can control settings, run a command like the one below. The -h means “help”. You’ll likely find yourself looking at 10 pages or so of syntax like what is shown here.To read this article in full, please click here
Tape is definitely not the best choice for primary recovery, but it does have features that make it a credible option for restoring systems and data that have fallen victim to ransomware without having to pay the ransom.The cloud has many more upsides than tape as a recovery tool in general, but there are circumstances where tape should be seriously considerd, and ransomware recovery is one of them.How to choose the best NVMe storage array
When cloud’s not good enough
Using the cloud for ransomware recovery—or not—has become somewhat of a religious discussion in many circles. Choosing the cloud offers many positive things, including cost, speed, and immediate availability—all great advantages when responding to a ransomware attack.To read this article in full, please click here
For the longest time, single-socket servers were the bottom of the server hierarchy, using "server" chips weaker than what you might find on a desktop. There were even servers that used the Atom processor. These were departmental servers doing the most menial of tasks, like file and print serving.But that's changing. Driven by high-core-count processors, and no doubt a desire to reduce costs, single-socket servers are getting some hefty workloads. AMD has led the way on this with its 32-core and 64-core EPYC processors that can do more with one chip than what a five-year-old dual-socket server can do. Dell has the servers available.To read this article in full, please click here
In a wide-ranging Investor Day conference Cisco executives outlined what they described as a $900 billion total market of high-level technology targets the networking giant expects to be a dominant force in developing toward in the next four years.Those targets include the six areas Cisco has been building toward for the past couple years, including agile networks, optimized applications, hybrid work, the Internet of the future, end-to-end security and edge networking capabilities but also other areas such as cloud security, hybrid cloud, IoT and more. The 10 most powerful companies in enterprise networking 2021
“We have built a portfolio designed for the modern world, and driven compelling new innovation from Cisco Plus and the Webex Suite to Silicon One and Secure X just a few examples of key technologies that we have provided over the past few years,” said Chuck Robbins, Cisco CEO. To read this article in full, please click here
Palo Alto Networks has bolted together its SD-WAN and security technologies to offer an integrated, cloud-based, secure-access service edge (SASE) offering aimed at simplifying distributed enterprises.Called Prisma SASE, the package brings together the company’s core Prisma Access package of cloud-based, next-generation security gateways with its Prisma SD-WAN technology it got when it bought CloudGenix for $420 million last year.To read this article in full, please click here
Whether in an existing network or a new one, there is an aspect of design that cannot be skipped: deciding if handing out IP addresses will be dynamic (automatic) or manual (one-by-one) or—the most common—a combination of the two.By choosing to distribute them dynamically you are choosing to use a dynamic host configuration protocol (DHCP) service somewhere on your network, and there can be some tricks to that regardless of what server you use. For this discussion, I will describe how to use user classes on a Windows DCHP Server to specify a range of IP addresses and to assign range-specific DHCP options.To read this article in full, please click here
Secure access service edge (SASE) is a network architecture that rolls SD-WAN and security into a single, centrally managed cloud service that promises simplified WAN deployment, improved security, and better performance.According to Gartner, SASE’s benefits are transformational because it can speed deployment time for new users, locations, applications and devices as well as reduce attack surfaces and shorten remediation times by as much as 95%.With the pandemic, adoption of SASE has been on an upward swing. A June report from Sapio Research, commissioned by Versa Networks, finds 34% of companies are already using SASE, and another 30% plan to in the next six to 12 months.To read this article in full, please click here
Juniper Networks is embracing an open campus-fabric management technology supported by other major networking vendors and at the same time making it simpler to use by removing much of the manual work it can require.The company is adding Ethernet VPN-Virtual Extensible XLAN (EVPN-VXLAN) support to its Mist AI cloud-based management platform let customers streamline network operations.EVPN-VXLAN separates the underlying physical network from the virtual overlay network offering integrated Layer 2/Layer 3 connectivity as well as programmability, automation and network segmentation among other features. The open technology is offered in a variety of forms by most networking vendors including Cisco, Arista, Aruba and others.To read this article in full, please click here
IBM announced the general availability of the industry’s first magnetic tapes and drives based on the LTO-9 Ultrium specification for massive data capacity and resilience.The Linear Tape-Open (LTO) 9 spec features a 50% improvement in capacity over LTO-8, which translates to 18TB native capacity, or 45TB after data is compressed. Fujifilm and Sony announced media last month, but IBM is the first with a drive.To read this article in full, please click here
Most of us don't often think about swap space unless we run into a problem on our systems that suggests we don't have enough. Even so, viewing and gauging the adequacy of swap space on a system is not overly complicated, and knowing what's normal for your system can help you spot when something is wrong. So let's check out some commands that can help you look into your swap space. But first, let's review some fundamentals.What swap space is and how it's used
Swap space is disk space that acts something like an extension of memory. It gets used when the system's physical memory (RAM) is full and the system needs more memory resources. It's called "swap" because the system will move some inactive pages in memory into the swap space so that it can accommodate more data in RAM. In other words, it provides a way to free up RAM on a busy system.To read this article in full, please click here
Gartner says the current paucity of skilled IT workers is foiling the adoption of cloud, edge computing, and automation technologies.In its "2021-2023 Emerging Technology Roadmap" based on surveying 437 global firms, Gartner found that IT executives see the talent shortage as the most significant barrier to deploying emerging technologies, including compute infrastructure and platform services, network security, digital workplace, IT automation, and storage.To read this article in full, please click here
Since he helped build the highly successful ship that is VMware, it is widely expected the company’s CEO Raghu Raghuram, appointed in June, won’t rock that boat too much, at least in the near term. VMware
Raghuram is credited with helping build and grow the company’s core virtualization and multicloud business as well as its software-defined data center strategy. VMware also credits Raghuram with driving partnerships with Dell Technologies and hyper-scaler customers.To read this article in full, please click here
VMware and Lenovo have collaborated on edge computing systems, with the goal of making them more robust and resilient.
Tech Spotlight: Edge Computing
4 essential edge computing use cases (Network World)
Edge computing's epic turf war (CIO)
Securing the edge: 5 best practices (CSO)
Edge computing and 5G give business apps a boost (Computerworld)
Amazon, Google, and Microsoft take their clouds to the edge (InfoWorld)
As part of the deal, Lenovo's Infrastructure Solutions Group (ISG) will pre-load VMware's edge software on its ThinkSystem SE350 Edge servers, a pair of ruggedized servers designed specifically for edge deployments. This includes vSphere, vSan, and Tanzu.To read this article in full, please click here