Archive

Category Archives for "Network World Wireless"

Keeping track of Linux users: When do they log in and for how long?

The Linux command line provides some excellent tools for determining how frequently users log in and how much time they spend on a system. Pulling information from the /var/log/wtmp file that maintains details on user logins can be time-consuming, but with a couple easy commands, you can extract a lot of useful information on user logins.One of the commands that helps with this is the last command. It provides a list of user logins that can go quite far back. The output looks like this:$ last | head -5 | tr -s " " shs pts/0 192.168.0.14 Wed Aug 14 09:44 still logged in shs pts/0 192.168.0.14 Wed Aug 14 09:41 - 09:41 (00:00) shs pts/0 192.168.0.14 Wed Aug 14 09:40 - 09:41 (00:00) nemo pts/1 192.168.0.18 Wed Aug 14 09:38 still logged in shs pts/0 192.168.0.14 Tue Aug 13 06:15 - 18:18 (00:24) Note that the tr -s " " portion of the command above reduces strings of blanks to single blanks, and in this case, it keeps the output shown from being so wide that it would be wrapped around on Continue reading

IDG Contributor Network: IoT-enabled shipping containers sail the high seas improving global supply chains.

Global trade flows through shipping containers. Manufacturers depend on them to get raw materials in time and to ship finished products to market. IoT is being applied to monitor containers and make sure that their contents aren’t damaged or stolen.Inter-modal containers Containers have standardized dimensions, which lets transporters easily ship, stack and store them. There are over twenty million containers in motion right now. Containers are pre-filled which reduces the time that trucks need to get loaded. Their standard size allows them to be easily transferred between trucks, planes, ships and trains.Global supply chains based on containers enable manufacturers to minimize their costs with ‘just-in-time’ inventory. This makes it important to track containers’ location and the condition of their contents.To read this article in full, please click here

BrandPost: Integrations are Essential to Secure SD-WAN

Improved network security is a top business driver of SD-WAN adoption, as a previous blog in this series revealed. However, SD-WAN isn’t necessarily an off-the-shelf panacea for all your network security challenges. While the typical SD-WAN products include some native security capabilities, an enterprise must take an approach that combines native SD-WAN security with integrated, on-premises, and cloud-based security solutions.Some early adopters of SD-WAN have failed to take this comprehensive approach. For instance, EMA’s WAN Transformation research found that enterprises that have completed a production deployment of an SD-WAN solution are 1.3 times more likely than the average enterprise to have experienced a security breach in a remote site over the last year. EMA suspects that these particular enterprises have been oversold on the native security capabilities of their chosen vendors.To read this article in full, please click here

How SD-Branch addresses today’s network security concerns

Secure software-defined WAN (SD-WAN) has become one of the hottest new technologies, with some reports claiming that 85% of companies are actively considering SD-WAN to improve cloud-based application performance, replace expensive and inflexible fixed WAN connections, and increase security.But now the industry is shifting to software-defined branch (SD-Branch), which is broader than SD-WAN but introduced several new things for organizations to consider, including better security for new digital technologies. To understand what's required in this new solution set, I recently sat down with John Maddison, Fortinet’s executive vice president of products and solutions.To read this article in full, please click here

Xilinx launches new FPGA cards that can match GPU performance

Xilinx has launched a new FPGA card, the Alveo U50, that it claims can match the performance of a GPU in areas of artificial intelligence (AI) and machine learning.The company claims the card is the industry’s first low-profile adaptable accelerator with PCIe Gen 4 support, which offers double the throughput over PCIe Gen3. It was finalized in 2017, but cards and motherboards to support it have been slow to come to market.The Alveo U50 provides customers with a programmable low-profile and low-power accelerator platform built for scale-out architectures and domain-specific acceleration of any server deployment, on premises, in the cloud, and at the edge.To read this article in full, please click here

When should enterprises move to 5G?

Maybe not today and maybe not tomorrow, but eventually everyone will be on 5G. However, before rushing to implement it in your business be sure to know what the available benefits are and which types of users will notice a real improvement in their mobile experience.

Intel and Lenovo partner on HPC and AI initiatives

Intel and Lenovo this week announced a new partnership aimed at accelerating artificial intelligence (AI) and high-performance computing (HPC) products by bringing together their respective technologies.The collaboration will integrate Lenovo's TruScale Infrastructure and Lenovo Neptune liquid cooling technology with a variety of Intel technologies, including its Optane DC persistent memory, Intel oneAPI programming framework, and current and future generations of its Xeon Scalable processors. Read more data center stories NVMe over Fabrics creates data-center storage disruption How AI can improve network capacity planning HPE to buy Cray, offer HPC as a service Data center workloads become more complex How to get a handle on multicloud management TruScale is a consumption-based offering that allows customers to use on-premises data center hardware and services without having to purchase the equipment outright; enterprises pay for the use, and Lenovo monitors their activity. It's a model all of the major OEMs have adopted in response to the cloud.To read this article in full, please click here

VMware opens, reinforces hybrid-cloud migration software

VMware customers can now  migrate non-vSphere as well as incresed amounts of on-premises application workloads to a variety of cloud services with a new release of the company’s Hybrid Cloud Extension (HCX) application-mobility software.Introduced in 2017, VMware HCX lets vSphere customers tie together on-premises systems and applications with a variety of cloud services.  vSphere VMware's flagship virtualization platform.  More about backup and recovery: Backup vs. archive: Why it’s important to know the difference How to pick an off-site data-backup method Tape vs. disk storage: Why isn’t tape dead yet? The correct levels of backup save time, bandwidth, space HCX includes services such as routing and WAN optimization and can utilize other VMware products and services such as the firm’s core networking software, NSX. NSX is targeted at organizations looking to support multivendor cloud-native applications, bare-metal workloads, hypervisor environments and the growing hybrid and multicloud worlds.  HCX is also included in other VMware packages such as its VMware Cloud on AWS.To read this article in full, please click here

VMware opens, reinforces hybrid-cloud migration software

VMware customers can now migrate non-vSphere, as well as increased amounts of on-premises application workloads, to a variety of cloud services with a new release of the company’s Hybrid Cloud Extension (HCX) application-mobility software.Introduced in 2017, VMware HCX lets vSphere customers tie together on-premises systems and applications with a variety of cloud services. vSphere VMware's flagship virtualization platform.  More about backup and recovery: Backup vs. archive: Why it’s important to know the difference How to pick an off-site data-backup method Tape vs. disk storage: Why isn’t tape dead yet? The correct levels of backup save time, bandwidth, space HCX includes services such as routing and WAN optimization and can utilize other VMware products and services such as the firm’s core networking software, NSX. NSX is targeted at organizations looking to support multivendor cloud-native applications, bare-metal workloads, hypervisor environments and the growing hybrid and multicloud worlds.  HCX is also included in other VMware packages such as its VMware Cloud on AWS.To read this article in full, please click here

A data-transmission revolution is underway

Radical data communications technologies are in development in a slew of academic scientific labs around the world. While we’ve already seen, and gotten used, to a shift from data sent being over copper wire to light-based, fiber-optic channels (and the resulting capacity and speed increases), much of the thrust by engineers today is in the area of semiconductor improvements, in part to augment those pipes.The work includes a potential overall shift to photons and light, not wires on chips, and even more revolutionary ideas such as the abandonment of not only silicon, but also the traditional electron.To read this article in full, please click here

How to manipulate PDFs on Linux

While PDFs are generally regarded as fairly stable files, there’s a lot you can do with them on both Linux and other systems. This includes merging, splitting, rotating, breaking into single pages, encrypting and decrypting, applying watermarks, compressing and uncompressing, and even repairing. The pdftk command does all this and more.The name “pdftk” stands for “PDF tool kit,” and the command is surprisingly easy to use and does a good job of manipulating PDFs. For example, to pull separate files into a single PDF file, you would use a command like this:$ pdftk pg1.pdf pg2.pdf pg3.pdf pg4.pdf pg5.pdf cat output OneDoc.pdf That OneDoc.pdf file will contain all five of the documents shown and the command will run in a matter of seconds. Note that the cat option directs the files to be joined together and the output option specifies the name of the new file.To read this article in full, please click here

BrandPost: WAN Transformation: It’s More Than SD-WAN

As an IT leader, you’re expected to be the technology vanguard of your organization. It is you who must deflate technology hype and devise the technology plan to keep the organization competitive.Addressing the WAN is, of course, essential to that plan. The high costs and limited agility of legacy MPLS-based networks are well known. What’s less clear is how to transform the enterprise network in a way that will remain agile and efficient for decades to come.Many mistakenly assume SD-WAN to be that transformation. After all, SD-WAN brings agility, scalability, and cost efficiencies lacking in telco-managed MPLS services.  But while a critical step, SD-WAN alone is insufficient to address the networking challenges you’re likely to face today — and tomorrow. Here’s why.To read this article in full, please click here

Microsoft finds Russia-backed attacks that exploit IoT devices

The STRONTIUM hacking group, which has been strongly linked by security researchers to Russia’s GRU military intelligence agency, was responsible for an IoT-based attack on unnamed Microsoft customers, according to the company. a blog post from the company’s security response center issued Monday.Microsoft said in a blog that the attack, which it discovered in April, targeted three specific IoT devices – a VoIP phone, a video decoder and a printer (the company declined to specify the brands) – and used them to gain access to unspecified corporate networks. Two of the devices were compromised because nobody had changed the manufacturer’s default password, and the other one hadn’t had the latest security patch applied.To read this article in full, please click here

Intel pulls the plug on Omni-Path networking fabric architecture

Intel’s battle to gain ground in the high-performance computing (HPC) market isn’t going so well. The Omni-Path Architecture it had pinned its hopes on has been scrapped after one generation.An Intel spokesman confirmed to me that the company will no longer offer Intel OmniPath Architecture 200 (OPA200) products to customers, but it will continue to encourage customers, OEMs, and partners to use OPA100 in new designs. “We are continuing to sell, maintain, and support OPA100. We actually announced some new features for OPA100 back at International Supercomputing in June,” the spokesperson said via email.[ Learn who's developing quantum computers. ] Intel said it continues to invest in connectivity solutions for its customers and that the recent acquisition of Barefoot Networks is an example of Intel’s strategy of supporting end-to-end cloud networking and infrastructure. It would not say if Barefoot’s technology would be the replacement for OPA.To read this article in full, please click here

Is your enterprise software committing security malpractice?

Back when this blog was dedicated to all things Microsoft I routinely railed against the spying aspects of Windows 10. Well, apparently that’s nothing compared to what enterprise security, analytics, and hardware management tools are doing.An analytics firm called ExtraHop examined the networks of its customers and found that their security and analytic software was quietly uploading information to servers outside of the customer's network. The company issued a report and warning last week.ExtraHop deliberately chose not to name names in its four examples of enterprise security tools that were sending out data without warning the customer or user. A spokesperson for the company told me via email, “ExtraHop wants the focus of the report to be the trend, which we have observed on multiple occasions and find alarming. Focusing on a specific group would detract from the broader point that this important issue requires more attention from enterprises.”To read this article in full, please click here

How to get the most out of network performance-management tools

(Editor’s note: Enterprise Management Associates took a look at how individual organizations use multiple network performance management (NPM) tools and how they try to integrate them to improve efficiency. In this article, EMA’s research director for network management Shamus McGillicuddy presents findings from “Network Performance Management for Today’s Digital Enterprise,” a recent survey of 250 network managers that suggests best practices for dealing with this issue.)The typical IT organization has three to six network performance management (NPM) tools installed today, and if they remain siloed, network operations will be fragmented and inefficient – a persistent challenge for network managers for many years.To read this article in full, please click here

BrandPost: Managed or DIY SD-WAN? Survey Reveals Lessons from Early Adopters

When IT decision-makers research new technologies or products, the opinions of their peers often carry more weight than recommendations by vendors and industry pundits.  That’s why Frost & Sullivan is sharing the results of our 2018 SD-WAN survey. The survey provides insights from IT leaders across a range of industries and company sizes about their SD-WAN decisions and deployments.To read this article in full, please click here

IBM fuses its software with Red Hat’s to launch hybrid-cloud juggernaut

IBM has wasted no time aligning its own software with its newly acquired Red Hat technoloogy,saying its portfolio would be transformed to work cloud natively and augmented to run on Red Hat’s OpenShift platform.IBM in July finalized its $34 billion purchase of Red Hat and says it will use the Linux powerhouse's open-source know-how and Linux expertise to grow larger scale hybrid-cloud customer projects and to create a web of partnerships to simplify carrying them out.To read this article in full, please click here

Self-organizing micro robots may soon swarm the industrial IoT

Miniscule robots that can jump and crawl could soon be added to the industrial internet of things’ arsenal. The devices, a kind of printed circuit board with leg-like appendages, wouldn’t need wide networks to function but would self-organize and communicate efficiently, mainly with one another.Breakthrough inventions announced recently make the likelihood of these ant-like helpers a real possibility.[ Also see: What is edge computing? and How edge networking and IoT will reshape data centers ] Vibration-powered micro robots The first invention is the ability to harness vibration from ultrasound and other sources, such as piezoelectric actuators, to get micro robots to respond to commands. The piezoelectric effect is when some kinds of materials generate an electrical charge in response to mechanical stresses.To read this article in full, please click here

Cisco pays $8.6M to settle security-software whistleblower lawsuit

Cisco has agreed to pay $8.6 million to settle claims it sold video security software that had a vulnerability that could have opened federal, state and local government agencies to hackers.Under terms of the settlement Cisco will pay $2.6 million to the federal government and up to $6 million to 15 states, certain cities and other entities that purchased the product. The states that settled with Cisco are California, Delaware, Florida, Hawaii, Illinois, Indiana, Minnesota, Nevada, New Jersey, New Mexico, New York, North Carolina, Tennessee, Massachusetts and Virginia.RELATED: A conversation with a white hat hacker According to Cisco, the software, which was sold between 2008 and 2014 was created by Broadware, a company Cisco bought in 2007 for its surveillance video technology and ultimately named it Video Surveillance Manager.To read this article in full, please click here

1 61 62 63 64 65 406