Arista has expanded its security software to let customers control authorized network access and communication between groups from the data center to the cloud.The new software, Macro-Segmentation Service (MSS)-Group, expands the company’s MSS security-software family, which currently includes MSS Firewall for setting security policies across customer edge, data-center and campus networks. Additionally, the company’s MSS Host focuses on data-center security policies.See how AI can boost data-center availability and efficiency
MSS software works with Arista Extensible Operating System (EOS) and its overarching CloudVision management software to provide network-wide visibility, orchestration, provisioning and telemetry across the data center and campus. CloudVision’s network information can be utilized by Arista networking partners including VMware, Microsoft and IBM’s Red Hat.To read this article in full, please click here
Dell Technologies, its VMware subsidiary, and SK Telecom have partnered to provide OneBox MEC, a single-box approach that provides enterprises with an integrated, private-5G and edge-computing platform.
5G resources
What is 5G? Fast wireless technology for enterprises and phones
How 5G frequency affects range and speed
Private 5G can solve some problems that Wi-Fi can’t
Private 5G keeps Whirlpool driverless vehicles rolling
5G can make for cost-effective private backhaul
CBRS can bring private 5G to enterprises
Consulting giant Deloitte believes private 5G networks will become the preferred choice of networks for many of the world’s largest businesses, especially for industrial environments such as manufacturing plants, logistics centers, and ports.To read this article in full, please click here
In this post, we examine a bash script that takes a string of letters, rearranges them in every possible way and checks each permutation to identify those that are English words. In the process, we'll take a close look at the script and calculate how hard it might have to work.Note that, in the algorithm used, each letter arrangement must use all of the letters in the string provided. Words formed by substrings are not considered.How to loop forever in bash on Linux
First, the script expects the scrambled string to be provided as an argument and prompts for it if none is provided. It then checks out each arrangement of letters to find those that exist in the system's words file – in this case, that's /usr/share/dict/words. Here are the first lines in the script:To read this article in full, please click here
Nvidia is offering a certification program to steer customers and partners to buy GPU servers specifically tailored for artificial intelligence (AI) workloads from top-tier OEMs and ODMs.The program, called Nvidia-Certified Systems, is similar to those offered by Intel and AMD. It tells customers that these servers with these configurations are best optimized for running AI workloads at peak performance and in large-scale deployments.
READ MORE: How AI can create self-driving data centersTo read this article in full, please click here
US mobile carriers see an opportunity to broaden their role in the enterprise marketplace as the rush to deploy 5G continues, but it’s unclear whether their strategy will be sufficient to achieve that goal, according to industry analysts.
5G resources
What is 5G? Fast wireless technology for enterprises and phones
How 5G frequency affects range and speed
Private 5G can solve some problems that Wi-Fi can’t
Private 5G keeps Whirlpool driverless vehicles rolling
5G can make for cost-effective private backhaul
CBRS can bring private 5G to enterprises
Verizon, AT&T and T-Mobile are cornerstones of America’s Internet infrastructure, but their role has been largely restricted to data transport for most of their history. The provide data pipelines, but efforts to monetize their networks beyond the simple provision of transport for other companies’ data have met with mixed success, at best.To read this article in full, please click here
While the move to 400G Ethernet has so far been a largely hyperscaler and telco-network event, the ambition for those users, as well as data-center customers is ultimately to move to at least 800Gbps and possibly 1.6Tbps.And while 800Gbps seems to be a solid goal for Ethernet networking visionaries, the challenges—such as the optics, power, and architecture required to make the next speed leap—seem formidable.The need for increased speed in data centers and cloud services is driven by myriad things including the continued growth of hyperscale networks from players like Google, Amazon and Facebook, but also the more distributed cloud, artificial intelligence, video, and mobile-application workloads that current and future networks will support.To read this article in full, please click here
I'm a sucker for the underdog, so shame on me for focusing on the big guys for so long. It's time to change that with some news from ExaGrid, a competitor of Dell EMC and HP Enterprise in the data backup appliance market.Earlier this month, ExaGrid announced it has increased the capacity of its Tiered Backup Storage appliances while also reducing its offerings from nine systems to seven. Appliances of any size can be mixed and matched in a cluster of up to 32 appliances.ExaGrid also changed the naming convention of the appliances to better reflect their capacity. For example, the discontinued bottom-of-the-line EX3000 had 3TB of full backup capacity, while the new bottom-end appliance is the EX6, with 6TB of full backup capacity storage.To read this article in full, please click here
Linux users should immediately patch a serious vulnerability to the sudo command that, if exploited, can allow unprivileged users gain root privileges on the host machine.Called Baron Samedit, the flaw has been “hiding in plain sight” for about 10 years, and was discovered earlier this month by researchers at Qualys and reported to sudo developers, who came up with patches Jan. 19, according to a Qualys blog. (The blog includes a video of the flaw being exploited.)To read this article in full, please click here
Any time you have a text file on a Linux system that you want to keep private regardless of the privileges that other users with accounts on the system may have, you can resort to encryption. One easy way to do this is to use a feature that is built into the vim editor. You will have to provide a password that will you then need to remember or store in a password safe, but the process is straightforward. The file name will not be changed in any way, and the content of the file can be recovered in much the same way that it was encrypted.To begin, let's say that we have a file that begins like this:$ head -3 mysecret
I feel the need to put my deepest darkest secret into a text file on my Linux
system. While this likely isn't common practice, I'm not sure that I can trust
anyone with it. But a penguin? That's a different story! So here goes ...
Now, not wanting to risk your deepest darkest secret to fellow users, you use vim with its -x (encryption) option.To read this article in full, please click here
Gartner projects worldwide IT spending will total $3.9 trillion in 2021, an increase of 6.2% over 2020 when spending declined a little over 3%.All IT spending segments—from data-center systems to communications services—are forecast to return to growth in 2021, according to Gartner . Enterprise software is expected to have the strongest rebound, 8.8%, as remote work environments are expanded and improved. The devices segment will see the second highest growth in, 8%, and is projected to reach $705.4 billion.To read this article in full, please click here
For the first year since the dot-com bubble popped, IT salaries were largely flat in 2020, and tens of thousands of jobs were lost in 2020, according to a report from independent management consultants Janco Associates.Hardest-hit were middle management jobs at both large enterprises and smaller companies, where salaries actually dropped by about 0.08%, while executive and staff-level jobs remained steady or grew by a similarly small amount.“What’s been hard hit, mostly, are IT organizations and SMBs,” said Victor Janulaitis, the CEO of Janco, which published the report. “That’s where the majority of the IT jobs are in the marketplace today.”To read this article in full, please click here
There are a lot of commands available on Linux for looking at network settings and connections. In today's post, we're going to run through some very handy commands and see how they work.To read this article in full, please click here(Insider Story)
The news that Pat Gelsinger is departing as CEO of VMware to take over at Intel generated a positive response for Intel and an equally negative response for VMware. Intel's stock jumped 7% on the day of the news, while VMware's stock fell 7%, and investment bank Piper Sandler slashed its VMware price target from $178 down to $157.Most of the discussion has been around Gelsinger and his return to Intel. VMware, meanwhile, has been overlooked in the process. So what's the outlook for VMware, which has lost more talent than just its CEO in recent months? To read this article in full, please click here
There are many ways to evaluate the speed of your wireless LAN (WLAN), whether you’re trying to troubleshoot issues, ensure bandwidth-intensive clients will work well, fine-tune the performance, or just curious about your Wi-Fi speeds.
Wi-Fi resources
Test and review of 4 Wi-Fi 6 routers: Who’s the fastest?
How to determine if Wi-Fi 6 is right for you
Five questions to answer before deploying Wi-Fi 6
Wi-Fi 6E: When it’s coming and what it’s good for
The simple Internet-speed apps or websites can be useful, but sometimes you need to measure the actual Wi-Fi throughput. For this you usually need a testing platform with a server and clients.To read this article in full, please click here
One of the most anticipated features of Wi-Fi 6 wireless routers is improved throughput over their Wi-Fi 5 predecessors, and we wanted to check whether they deliver.
Wi-Fi resources
How to determine if Wi-Fi 6 is right for you
Five questions to answer before deploying Wi-Fi 6
Wi-Fi 6E: When it’s coming and what it’s good for
Four vendors – Extreme, Cisco, EnGenius and Meraki (owned by Cisco) – provided access points (AP) for our test. Since the routers support both Wi-Fi 5 (802.11ac) and Wi-Fi 6 (802.11ax), we tested them against two Wi-Fi 5 and two Wi-Fi 6 clients and recorded the average throughput and the peak throughput during one-minute tests.To read this article in full, please click here
This spring the FCC opened up a new swath of unlicensed wireless spectrum in the 6GHz band that’s intended for use with Wi-Fi and can provide lower latency and faster data rates. The new spectrum also has a shorter range and supports more channels than bands that were already dedicated to Wi-Fi, making it suitable for deployment in high-density areas like stadiums.To read this article in full, please click here(Insider Story)
Cisco has noted and fixed two critical and a number of high-degree vulnerabilities in its SD-WAN software portfolio.Most of the vulnerabilities could let an authenticated attacker execute command injection attacks against an affected device, which could let the attacker utilize root privileges on the device.The first critical problem–with a Common Vulnerability Scoring System rating of 9.9 out of 10–is vulnerability in the web-based management interface of Cisco SD-WAN vManage Software. “This vulnerability is due to improper input validation of user-supplied input to the device template configuration,” Cisco stated. “An attacker could exploit this vulnerability by submitting crafted input to the device template configuration. A successful exploit could allow the attacker to gain root-level access to the affected system.”To read this article in full, please click here
The pro-Trump rioters who invaded the Capitol on January 6 came with smartphones to record and celebrate what they thought was a righteous effort to prevent president-elect Joe Biden from taking office two weeks later.Now those electronic devices, along with the GPS data they generated, are being used to track the location of rioters within the building as federal law enforcement officials continue to make arrests and build criminal cases.Among the acts being investigated: breaking through police barriers, smashing windows, and assaulting police officers and media members. Five people died including a Capitol Hill police officer who was bludgeoned with a fire extinguisher.To read this article in full, please click here
Cloud migration is a necessary step for digital transformation, which is proceeding faster than planned at many enterprises because of the COVID-19 pandemic, according to research from Cloud Industry Forum (CIF), a cloud computing organization based in the United Kingdom.The cloud is an important steppingstone for getting off legacy on-prem technologies and outfitting today's more flexible, remote workforce. Supporting a remote workforce requires a digital transformation, and to do that, companies need the cloud – public, private, or hybrid. CIF found that in many sectors, remaining productive during lockdown depended on their cloud-readiness.To read this article in full, please click here
(Editor’s note: A recent Enterprise Management Associates survey of 303 WAN managers found that native monitoring is an important factor in choosing SD-WAN products, but many respondents say additional third-party monitoring tools are also needed. This article by EMA Vice President of Research Networking Shamus McGillicuddy explores some of the survey results included in the report “Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic” that is based on the survey.)To read this article in full, please click here