Cloud services provider Vultr has launched what it claims is the first GPU virtualization platform for smaller and midsize companies that don’t need the much more powerful and much more expensive options offered by the big cloud players.When Nvidia introduced its Ampere A100 processor in 2020, it emphasized that it was the first graphics processor to support Multi-Instance GPU, or MIG. This allows for partitioning the GPU into seven virtual GPUs, in much the same way a hypervisor partitions CPU cores.Now Vultr says it’s the first cloud provider to offer fractional A100 GPU instances to customers through its Vultr Talon platform. The company notes there’s no one size fits all when it comes to customer workloads. Other cloud services providers that offer GPU instances make the full GPU available for a hefty price. Talon is a much smaller instance with a much lower price for customers who just need a snack, not a seven-course meal.To read this article in full, please click here
When you think of data-center networking, you almost certainly think of Ethernet switches. These gadgets have been the foundation of the data-center network for decades, and there are still more Ethernet switches sold into data-center applications than any other technology. Network planners, though, are starting to see changes in applications, and those changes are suggesting that it’s time to think a bit harder about data center network options. Your data center is changing, and so should its network.To read this article in full, please click here
It's quite easy to get bash to concatenate strings and do simple math on Linux, but there are a number of options for you to use. This post focusses on concatenating strings, but also shows how one of the operators (+=) also plays a primary role in incrementing numbers.Concatenating strings
In general, the only time that you'd want to concatenate strings on Linux is when one string is already defined and you want to add more to it. For example, if you have a script that greets the person running it, you might set up a string in the script to prepare the greeting and then add the person's username or name before displaying it.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here
Semiconductor manufacturer and infrastructure software giant Broadcom will acquire virtualization and enterprise cloud vendor VMware in a deal worth roughly $61 billion in stock and cash, the companies announced on Thursday. Broadcom will also assume $8 billion of VMware net debt as part of the deal.The deal, which is still subject to customary regulatory approval and closing conditions, will see the existing Broadcom Software Group fully rebranded as VMware.The deal is the latest in Broadcom's years-long pattern of high-profile acquisitions. The company acquired network switching vendor Brocade in 2016 for almost $6 billion, development and security software firm CA Technologies in 2018 for $19 billion, and security firm Symantec's enterprise security business in 2019 for over $10 billion.To read this article in full, please click here
Hybrid cloud and multicloud have become the norm as enterprises look to improve business agility and scalability, but adoption is not without challenges.A new study from Cisco and 451 Research sought to gauge how enterprises are doing with their cloud environments and examine the benefits and challenges of using cloud-based services. 451 Research interviewed 2,500 cloud, DevOps, and networking professionals for the Cisco-sponsored survey.
Read more: Hybrid cloud success: 5 things to forget about, 4 things to rememberTo read this article in full, please click here
While elevated privilege attacks remain a critical security concern when using Microsoft products, a new report says that the raw number of vulnerabilities is dropping.
Silicon Valley chipmaker Broadcom is working on a deal to acquire cloud service and virtualization provider VMware, although an agreement is not expected to be imminent, according to published reports.VMware's market cap sits around $40 billion, although no proposed purchase price has been disclosed as yet. If a deal is eventually reached, it would be the latest in a long line of acquisitions for Broadcom, which has built itself up, in large part, on the basis of multiple high-profile buyouts.The company acquired network switching manufacturer Brocade in November 2016 for nearly $6 billion, development and security software firm CA Technologies in November 2018 for $19 billion, and the enterprise security division of Symantec in August 2019 for more than $10 billion.To read this article in full, please click here
Nmap, short for Network Mapper, is a free and open source tool used for vulnerability checking, port scanning and, of course, network mapping. Despite being created back in 1997, Nmap remains the gold standard against which all other similar tools, either commercial or open source, are judged.Nmap has maintained its preeminence because of the large community of developers and coders who help to maintain and update it. The Nmap community reports that the tool, which anyone can get for free, is downloaded several thousand times every week.To read this article in full, please click here
The U.S. Cybersecurity and Infrastructure Agency issues emergency security directive over VMware vulnerabilities CVE-2022-22972 and CVE-2022-22973, which threat actors are likely to exploit.
Global uncertainties created by ongoing COVID closures and the war in Ukraine continues to impact business for Cisco and its networking competitors.Cisco’s 3Q earnings announced this week show another round of backlog growth—this time to $15 billion with an additional $2 billion in software backlog and a $200 million earnings hit from the company pulling business from Russia over its invasion of Ukraine. Overall quarterly revenue of $12.8B was flat year-over-year while total product revenue was up 3%.Two big factors affected Q3 earnings the most, according to Cisco CEO Chuck Robbins. "The first is the war in Ukraine which resulted in us ceasing operations in Russia and Belarus and had a corresponding revenue impact,: he said. "The second relates to COVID-related lock down in China, which began in late March. These lockdowns resulted in an even more severe shortage of certain critical components."To read this article in full, please click here
Pure Storage and data-warehouse developer Snowflake have partnered to bring Snowflake’s cloud-based data-warehousing technology on-premises.Under the new relationship, the Snowflake Data Cloud compute engine will be run on Pure Storage’s FlashBlade file- and object-storage array. Pure has another line of storage devices, called FlashArray, but those serve a different purpose, notes Rob Lee, CTO of Pure Storage.“I look at FlashArray as our scale-up platform, and FlashBlade as our scale out platform,” he said. “We tend to see FlashArray applied much more to transactional database-type workloads, like OLTP, trading databases, billing databases, where you have high update rates, and we tend to see FlashBlade applied to data warehouses or analytics types of environments where you don't have a ton of transactional change, but you've got a lot of analysis, a lot of read-type workloads,” he said.To read this article in full, please click here
When the now-familiar concept of the Internet of Things (IoT) was new, what we really were envisioning a massive deployment of “things”, mostly sensors, connected directly to the internet and, like the internet, available to many companies to form the basis for new applications. Neither the business model nor the privacy/security issues of that approach were easily validated, so we’ve fallen back to something that largely takes the internet out of IoT. But what replaces it?Answer: The Network of Things or NoT, and if you’ve never heard of that concept, you’re at the first step of understanding the problem.To read this article in full, please click here
The increased deployment of core business applications in the cloud and the shift to remote work brought on by the pandemic have obliterated any notion of the traditional “corporate moat” style of security.Today’s hybrid workplace, where employees are on the road, working from home and maybe visiting the office once or twice a week, has forced network and security teams to adopt a more flexible approach to managing the network, identities, and authentication.Zero Trust Network Access (ZTNA) has emerged as the preferred approach to address today’s security challenges. The concept is relatively simple: Instead of building a layered perimeter defense of firewalls, IDS/IPSes and anti-virus software, Zero Trust assumes that every user or device is untrusted until it becomes sufficiently verified.To read this article in full, please click here
Google Cloud is rolling out new security services designed to address enterprise challenges including securing open-source software and accelerating the adoption of zero-trust architectures.At its annual Google Cloud Security Summit, the company said it's building on its Invisible Security effort, which promises to bake security into tools and services that enterprises and other customers use most.One example is a new service called Assured Open Source Software (Assured OSS), which is aimed at making it easier for organizations to securely manage their open-source dependencies."Today patching security vulnerabilities in open source software often feels like a high-stakes game of whack-a-mole: fix one, and two more pop up," wrote Sunil Potti, vice president and general manager of Google Cloud Security, in a blog about the new services. "This helps explain research done by Sonatype software that shows that there’s a 650% year-over-year increase in cyberattacks aimed at open source software (OSS) suppliers."To read this article in full, please click here
Cisco is urging customers to replace flawed memory sticks in some of its Unified Computing System (UCS) servers before they fail.The problem is caused by a manufacturing error in 24 dual in-line memory modules (DIMM) that exhibit persistent correctable memory errors that if left in place could knock the servers offline. The problem is found in 16GB, 32GB, and 64GB memory DIMMs.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]
Cisco describes the flaws as manufacturing deviations that affect memory modules used to make up the DIMMs. All of the problem parts were manufactured during the middle-to-end of 2020, according to a Cisco alert.To read this article in full, please click here
Red Hat, one of the open source software world's biggest players, rolled out a raft of new features for its flagship enterprise Linux distribution — several of which were focused on edge computing — this week at its annual Summit gathering,The Red Hat Edge initiative is a project designed to streamline the processes of deploying and managing edge infrastructure, and, under its banner, the company announced several new features like automation technology via Ansible and advanced cluster management for Kubernetes, among others.To read this article in full, please click here
Enterprise networking has never been so prominent for Juniper Networks as it is right now.For the first time in Juniper’s history, its enterprise networking business was the largest of its three core divisions – cloud, service provider and enterprise – in the first quarter of 2022. Enterprise networking revenue grew 18% year-over-year in Q1 to $433 million, while Q1 cloud and service provider revenue came in at $307 million and $428 million, respectively.A variety of things came together to make that happen – everything from pent-up demand and pandemic-delayed network refresh cycles to enterprise digital transformation and an influx of spending to support hybrid workers, said Manoj Leelanivas, Juniper Networks' chief operating officer, in an interview ahead of the company’s Global Summit event this week. To read this article in full, please click here
Data management specialist Cohesity is launching a new data isolation and recovery tool called FortKnox, in a bid to help customers protect their data from ransomware attacks.FortKnox provides an additional layer of off-site protection for customers by keeping data in a secure ‘vault,’ with physical separation, network and management isolation to keep threat actors from accessing sensitive data.An object lock requires a minimum of two or more people to approve critical actions, such as changes of vault policy, and access can be managed using granular role-based access control, multi-factor authentication, and encryption both in-flight and at rest.To read this article in full, please click here
Multiple vulnerabilities have been discovered in Cisco's Enterprise NFV Infrastructure Software (NFVIS). The worst of the vulnerabilities could let an attacker escape from the guest virtual machine (VM) to the host machine, Cisco disclosed. The other two problems involve letting a bad actor inject commands that execute at the root level and allowing a remote attacker to leak system data from the host to the VM.NFVIS is Linux-based infrastructure software designed to help enterprises and service providers to deploy virtualized network functions, such as a virtual router, firewall and WAN acceleration, Cisco stated.To read this article in full, please click here
Dell is offering an expanded ecosystem of multicloud data management tools for its customers with a focus on data recovery services, adding recovery vault support for on-premises as well as public cloud assets."Our customers want help reducing complexity and are seeking solutions that use a common approach to managing data wherever it lives — from public clouds, to the data center, to the edge," said Chuck Whitten, co-chief operating officer, Dell Technologies, in a statement. "We are building a portfolio of software and services that simplifies on-premises and multicloud environments and offers." To read this article in full, please click here