In order to back up a database, you need to know how it’s delivered, but you also need to know which of the more than 13 types of database designs it employs. Here we’ll cover four of them—relational, key-value, document, and wide column—that generate a lot of backup questions.Understanding these models will help the backup team create a relationship and trust level with the database admins, and that will help both parties.[Get regularly scheduled insights by signing up for Network World newsletters.]
Four database types
Relational
A relational-database management system (RDBMS) is a series of tables with a defined schema, or layout, with records in rows of one or more attributes, or values. There are relationships between the tables, which is why it is called a relational database, and why backups generally have to back up and restore everything. Examples of RDMBSs include Oracle, SQL Server, DB2, MySQL, and PostgreSQLTo read this article in full, please click here
One of the things that I have always loved about Unix and then Linux is how it allows me to connect a series of commands together with pipes and get a lot of work done without a lot of effort. I can generate the output that I need in the form that I need it. It's not just the existence of the pipes themselves, but the flexibility of the Linux commands. You can run commands, select portions of the output, sort the results or match on specific strings and you can pare the results down to just what you want to see.In this post, we're going to look at a couple commands that demonstrate the power of the pipe and how easily you can get commands to work together.To read this article in full, please click here
As an IT pro, it’s not often that I get to tail a suspect, track down a stolen vehicle and provide digital evidence of the thief’s getaway. But that was all part of a day’s work as some colleagues and I kept tabs on the hijacked maintenance truck and ultimately recovered it with the help of a GPS-enabled mobile router.It happened last summer, and I was on the job the IT department of the transit authority I work for when word came in that one of our maintenance vehicles was stolen.The worker on the truck left it running when he stepped out of the vehicle to check what needed to be done at a city bus stop, and an opportunistic thief drove off with it—a six-figure heist given the value of the truck plus the maintenance gear it carried.To read this article in full, please click here
While working on a base-wide network cutover at a military installation recently, I was verifying configurations on core, distribution, and access-node devices. Using a local host computer on the network, I was connected to the distribution node via an Ethernet port in a separate room and successfully pinged the node to verify network connectivity.Then I tried to access the node using PuTTY via SSH (port 22), the recommended and secure method, and received this error message: “Network Error: Connection Refused. The network connection PuTTY tried to make to your device/server was rejected by the server.” This error usually happens because the server does not provide the service which PuTTY is trying to access.To read this article in full, please click here
Here’s one none of us saw coming: Intel is planning to launch a chip specifically designed for blockchain acceleration, including the mining Bitcoins, and much more. Intel has also announced the formation of a new custom compute group within its graphics business unit to develop the chip.In the blog post, Raja Koduri, senior vice president and general manager of the Accelerated Computing Systems and Graphics Group, announced the ASIC without using the Bonanza Mine name that would accelerate the algorithm specifically used in Bitcoin mining and blockchain in general.To read this article in full, please click here
Cisco, like many of its competitors, has found increased revenue from pent-up demand, but chip shortages and other supply constraints continue to loom large over the industry.“We remain one of the largest software companies in the world,” Cisco CEO Chuck Robbins told investment analysts on an earnings call for its fiscal second quarter ended in January. "In Q2, our software revenue grew by 6% to $3.8 billion, total subscription revenue accelerated to $5.5 billion, up 7% year over year."To read this article in full, please click here
Spending on cloud services reached a total of $178 billion in 2021, a 37% increase over the $130 billion spent in 2020 and twice the amount enterprises are spending on their data centers, according to Synergy Research Group. For the fourth quarter of 2021, total cloud spending was $50.5 billion.When the COVID-19 pandemic hit in 2020, it drove a major shift in worldwide IT operational and spending to the cloud as company shifted to working from home. That trend is only continuing, even with the pandemic tapering off and companies calling people back into the office.John Dinsdale, principal analyst with Synergy, said he expects the cloud market to continue to grow at the considerable pace. “There is absolutely no doubt that the cloud market will continue to grow rapidly. That is an environment in which leading cloud providers ought to be able to continue aggressively growing their revenues,” he said via email.To read this article in full, please click here
JPMorgan Chase & Co. spent $2 billion on new data centers last year, even as the multinational investment banking and financial services company continued to move data and applications to cloud platforms run by AWS, Google, and Microsoft.The $2 billion is part of the firm’s total annual spending on technology, which amounted to more than $12 billion last year, according to details shared in JPMorgan Chase’s fourth-quarter and full-year 2021 earnings presentation. Looking at the current year, the firm expects to increase its tech spending to roughly $15 billion. IT priorities in 2022 will be consistent with prior years and will include increases in cloud capabilities, data centers, digital consumer experience, and data and analytics.To read this article in full, please click here
IBM continues to evolve the services that will keep its z/OS mainframes at the heart of the growing enterprise cloud-application development.Big Blue has rolled out two new services—IBM Z and Cloud Modernization Stack 2022, and Wazi as-a-Service—that will let customers more easily develop and test mainframe applications as-a-service in a public cloud environment.How to build a hybrid-cloud strategy
IBM Z and Cloud Modernization Stack 2022.1.1 offers industry-standard tools to modernize z/OS applications on a pay-per-use basis. For example, the service includes support for features including:To read this article in full, please click here
Power, they say, corrupts, and absolute power corrupts absolutely. While that was said about politics, it sure seems like it was tailor-made for smart buildings.Facility-control technology is exploding because the concept is useful and often saves money. Unfortunately, smart devices have also proven to be an on-ramp for major intrusions. Smart buildings are surely absolutely powerful in a way; are they absolutely corruptible? Maybe, if we’re not very careful.[Get regularly scheduled insights by signing up for Network World newsletters.]
If corruption means overall bad-ness, then hacking a smart building surely qualifies. It could let intruders mess with lights, heating and air conditioning, and maybe other critical systems, too. We also know from news stories that a hacker could use a successful smart building intrusion to sneak into other business applications, potentially compromising them and critical company information. It’s important to address these risks, and that means starting with how they arise.To read this article in full, please click here
Global capital expenditure on data center infrastructure is set to grow by 10% over the next five years, to a total of $350 billion by 2026, in spite of the general move toward cloud in the enterprise, according to a report released earlier this month by Dell’Oro Group.Part of that spending growth will be driven by hyperscalers like Google, Amazon and Microsoft buying up data center equipment for their own public clouds, but an underrecognized trend is that the cloud isn’t for every organization, according to the report’s author, research director Baron Fung.To read this article in full, please click here
By 2025, 51% of IT spending by enterprise IT groups that can transition to cloud—application and infrastructure software, business process services, and system infrastructure—will shift to the cloud, according to Gartner. Accelerating levels of cloud adoption are expected as organizations respond to a new business and social dynamics, according to Michael Warrilow, research vice president at Gartner, and this is driving a faster rate of cloud shift than pre-COVID-19 forecasts predicted.To read this article in full, please click here
By 2025, 51% of IT spending by enterprise IT groups that can transition to cloud—application and infrastructure software, business process services, and system infrastructure—will shift to the cloud, according to Gartner. Accelerating levels of cloud adoption are expected as organizations respond to a new business and social dynamics, according to Michael Warrilow, research vice president at Gartner, and this is driving a faster rate of cloud shift than pre-COVID-19 forecasts predicted.To read this article in full, please click here
The high-tech community is still trying to figure out the long-term impact of the serious vulnerability found late last year in the open-source Apache Log4j software, and so is the US Senate.“Open source is not the problem,” stated Dr. Trey Herr, director of the Cyber Statecraft Initiative with Atlantic Council think tank during a US Senate Committee on Homeland Security & Government Affairs hearing this week. “Software supply-chain security issues have bedeviled the cyber-policy community for years.”Experts have been predicting a long-term struggle to remedy the Log4j flaw and its impact. Security researchers at Cisco Talos for example stated that Log4j will be widely exploited moving forward, and users should patch affected products and implement mitigation solutions as soon as possible.To read this article in full, please click here
The Linux fold takes lines of text and breaks them into chunks based on the arguments that you provide. With no arguments, fold will break lines at 80 characters.The first example below uses a single-line text file that includes indications of character positions. First, we count the number of characters and lines in the file using the wc -l and wc -l command:$ wc -c wide_text
251 wide_text
$ wc -l wide_text
1 wide_text
So, this file has 251 characters (including a carriage return) and a single line of text. Next, we display the file using the cat command:To read this article in full, please click here
Now it is official Nvidia has announced that its proposed acquisition of ARM Holdings from SoftBank Group Corp. has been terminated.The parties agreed to terminate the agreement because of “significant regulatory challenges preventing the consummation of the transaction,” despite considerable efforts by the parties to assuage concerns over the deal.[Get regularly scheduled insights by signing up for Network World newsletters.]
Arm will now start preparations for an initial public offering (IPO), possibly during the fiscal year ending March 31, 2023.To read this article in full, please click here
Intel has joined RISC-V International association, an open hardware standards organization dedicated to designing and building ultralow-power processors. The news comes on the heels of another Intel announcement, that it is investing $1 billion in foundry services.Bob Brennan, vice president of customer solutions engineering for Intel Foundry Services (IFS), will be joining both the RISC-V Board of Directors and Technical Steering Committee. Intel is also partnering with several RISC-V leaders, including Andes Technology, Esperanto Technologies, SiFive and Ventana Micro Systems.[Get regularly scheduled insights by signing up for Network World newsletters.]
The RISC-V ecosystem uses an open collaboration model, similar to how Linux and other open-source software products are developed. This is unique in chip design. Developers have freedom to design their processors for specific domains and industries. RISC-V started as a project at UC Berkeley and has gained many supporters, but Intel is by far the biggest supporter to back the project.To read this article in full, please click here
Network providers have asked for $5.6 billion to cover the cost of replacing deployed wireless equipment made by Huawei and ZTE, whose gear has been banned from US carrier networks.Congress had set aside $1.9 billion for the program, but a preliminary total of applications for reimbursement revealed a shortfall of $3.7 billion. FCC Chairperson Jessica Rosenworcel seeks Congress to make up whatever the actual amount turns out to be.Wireless equipment manufactured by Huawei and ZTE have been placed on a restricted list by the Commerce Department over concern that they could be a security threat to the US.To read this article in full, please click here
Cisco has released a new version of it SD-WAN software that adds the ability to reinforce links between remote users and Microsoft Office 365 applications and better support voice and video networks.The new features are part of the latest release of Cisco’s core SD-WAN software that can control the connectivity, management, and services between data centers and remote branches or cloud instances. SD-WAN deployments typically include routers and switches or virtualized customer-premises equipment (vCPE) all running some version of software that handles policy, security, networking functions, and other management tools.To read this article in full, please click here