The Fedora Project today announced the beta availability of Fedora 29 — the latest version of the free and open-source Fedora OS. The major additions to this release include:
Modularity support across all editions, allowing multiple versions of the same software (e.g., node.js) to be selected on a per-system basis and then deployed through containers
Better performance and reliability for ARM single boards (such as Pi) given enhanced ZRAM support for swap on ARMv7 and aarch64
The "freeze" (moving Fedora 29 out of the "beta" stage) is expected on October 9, 2018.To read this article in full, please click here
Rust is a fairly young and modern programming language with a lot of features that make it incredibly flexible and very secure. It's also becoming quite popular, having won first place for the "most loved programming language" in the Stack Overflow Developer Survey three years in a row — 2016, 2017, and 2018.To read this article in full, please click here
Chevron Corp. disclosed plans in September to add predictive maintenance in its oil fields and refineries by arming thousands of pieces of equipment with sensors by 2024 that will predict when equipment in the field will need to be serviced. To read this article in full, please click here(Insider Story)
In a few months, the internet will be a more secure place. That’s because the Internet Corporation for Assigned Names and Numbers (ICANN) has voted to go ahead with the first-ever changing of the cryptographic key that helps protect the internet’s address book – the Domain Name System (DNS). [ Now see: The hidden cause of slow internet and how to fix it. ]
The ICANN Board at its meeting in Belgium this week, decided to proceed with its plans to change or "roll" the key for the DNS root on Oct. 11, 2018. It will mark the first time the key has been changed since it was first put in place in 2010.To read this article in full, please click here
The selection process for our 10 hot hybrid-cloud startups to watch roundup began with 42 recommendations and nominations that came to me via HARO, LinkedIn, Twitter and subscribers to my Startup50 email newsletter.For this roundup, we focused on hybrid-cloud infrastructure and hybrid-cloud-enabling technologies. Thus, cloud-delivered applications that don’t enable clouds but, rather, rely on them, were eliminated. We also eliminated cloud security startups because they belong in their own roundup or in a security roundup.[ Now read 20 hot jobs ambitious IT pros should shoot for. ]
This left me with 23 startups. The next set of cuts were the easiest ones. Startups that were slow to respond to questions – missing deadlines and forcing me to chase them down just to get answers to my questions – were eliminated.To read this article in full, please click here
I’ve said it before, but it bears repeating: When it comes to the Internet of Things (IoT), the consumer market gets all the attention, but the real action may be in industrial applications, the so-called Industrial Internet of Things (IIoT).The IIoT is a huge market, and it’s based more on clearly defined cost savings than the always-fickle consumer preferences that seem to rule the consumer market. It also requires highly available infrastructure to connect everything and avoid expensive downtime — one reason why investment in IIoT firms has been hot this summer, with investments in companies such as Seeq, Element Analytics, Trendminer, Falkonry, and Toumetis.To read this article in full, please click here
Ciena
Fabio Medina, General Manager and Vice President of Sales – Latin America
With the move toward autonomous networking underway across the CALA region, as well as the rest of the world, one thing is very clear—the current modes of operation won’t cut it in the future. Fabio Medina, Ciena's General Manager for Caribbean and Latin America explains how the Adaptive Network is the solution to remaining competitive and on the cutting-edge.To read this article in full, please click here
As the cloud matures, many businesses are finding that not every application belongs in public clouds. Due to regulatory issues, security risks, data ownership concerns, and fears of cloud lock-in, many applications are stubbornly rooted in on-premises architectures.The startups in this roundup understand that, and rather than trying to sweet talk enterprises into forklift upgrades, these startups are willing to work under hybrid-cloud constraints.[ Now see After virtualization and cloud, what's left on premises?]
The startups below federate data, making it available from any cloud to any application; provide application virtualization software, which enables enterprises to move workloads to and from various clouds at will; provide cloud file systems that optimize and mobilize data, and much more.To read this article in full, please click here
Remember when we thought smartwatches and wearable technology were going to change the world?According to much of the consumer tech press, the new Apple Watch Series 4 stole the show from the iPhones announced in Apple’s big fall press event. Reviews were generally positive for the new wearable device, and along with the new edge-to-edge display and other improvements, much of the love centered around new heart-health monitoring features, including an electrocardiogram (ECG), low heart rate detection, and atrial fibrillation (AFib) detection. There’s also a new fall-detection feature designed to automatically summon help if needed.To read this article in full, please click here
Remember when we thought smartwatches and wearable technology were going to change the world — and the enterprise? That doesn't seem to be happening quite yet.According to much of the consumer tech press, the new Apple Watch Series 4 stole the show from the iPhones announced in Apple’s big fall press event. Reviews were generally positive for the new wearable device, and along with the new edge-to-edge display and other improvements, much of the love centered around new heart-health monitoring features, including an electrocardiogram (ECG), low heart rate detection, and atrial fibrillation (AFib) detection. There’s also a new fall-detection feature designed to automatically summon help if needed.To read this article in full, please click here
Good Linux command line tricks don’t only save you time and trouble. They also help you remember and reuse complex commands, making it easier for you to focus on what you need to do, not how you should go about doing it. In this post, we’ll look at some handy command line tricks that you might come to appreciate.Editing your commands
When making changes to a command that you're about to run on the command line, you can move your cursor to the beginning or the end of the command line to facilitate your changes using the ^a (control key plus “a”) and ^e (control key plus “e”) sequences.You can also fix and rerun a previously entered command with an easy text substitution by putting your before and after strings between ^ characters -- as in ^before^after^.To read this article in full, please click here
Lenovo and NetApp's storage alliance, joint venture in China, and new series of all-flash and hybrid flash products announced at Lenovo's Transform event, put them both in a much stronger position in the data center against rivals Dell EMC and HPE.The storage offerings include two familes, each subdivided into all-fash and hybrid -flash products, jointly developed by Lenovo and NetApp and available now worldwide. Several of the products support NVMe (non-volatile memory express), the extremely fast communications protocol and controller able to move data to and from SSDs via the PCIe-bus standard. NVMe SSDs are designed to provide two orders of magnitude speed improvement over prior SSDs.To read this article in full, please click here
Consumer demand for instant 24-hour access to personal bank data has taken the financial world in a new direction in less than one generation. Not only do bank IT departments now rival those of software development companies, but banking networks and infrastructure are at least as complex as a tech firm’s. Personal financial information has become one of the most protected and heavily regulated types of data in the world, and security measures and compliance programs consume the largest percentage of a financial institution’s IT budget.Knowing all this, it’s no wonder the “rip and replace” fad of the early 2000’s never materialized in the banking world. With everyone assuming the turn of the millennium meant “out with the old and in with the new,” companies were ready to rip the mainframes out of their infrastructure to prepare for whatever was next. But what came next never really materialized — or continued to prove inferior to the sheer processing power of the mainframe, which remains the only real choice for high-demand business computing.To read this article in full, please click here
Greater cooperation among standards bodies, corporations, city governments and other stakeholders is needed so IoT and existing smart-building technology can work together to deliver the full potential of smart cities, according to a Georgia Tech study.The problem is that standards are lacking for current in-building systems, let alone having standards so they can share with newer IoT devices.[ Check out our corporate guide to addressing IoT security. ]
One vendor of automation software for, say, elevators might use a much different data format than the manufacturer of a given building’s HVAC systems, making it difficult to integrate these two critical systems into the same framework.To read this article in full, please click here
There is a status quo in the networking industry that is the enemy of innovation. The major hardware equipment makers collectively benefit by propagating the many layers of equipment and protocols. This “deep state” that exists within our innovation economy must be defeated to unleash the next wave of innovative networking, which will be software-based and ideally designed to support business applications and services.One leader of the Networking Industrial Complex has a certified army of mercenaries that are compensated by unsuspecting enterprises to architect networks. These mercenaries attend training camps to be reprogrammed on a frequent basis. Examinations are held to ensure compliance. This entire system ensures that networking architectures, techniques and methods will not change. It’s no wonder many executives of companies are handing the keys to IT and networking to third parties.To read this article in full, please click here
Millennials have now captured the crown as the largest generation in the U.S. workforce, according to Pew Research Center. This shift has left many organizations scrambling to reinvent themselves to be more attractive to this generation’s top talent.Perhaps businesses will adopt “tiny offices” to mirror the tiny house movement…For those who are looking to enter an industry that makes a difference, is fast-paced and constantly innovating, look no further than the radio frequency (RF) industry. It’s at the core of consumers’ favorite technologies, such as smartphones and tablets, and is truly all around us with the emergence of the Internet of Things (IoT).To read this article in full, please click here
A number of Wi-Fi analytics tools have been brought to market over the past few years, and while most organizations have yet to dip their toes in the Wi-Fi analytics waters, our research shows that those who have are realizing significant benefits.To read this article in full, please click here(Insider Story)
Cisco is betting heavily that artificial intelligence and machine learning will play an enormous part in future networks and data centers.To read this article in full, please click here(Insider Story)
Being hired as the resident IoT data scientist can come with a lot of pressure. Oftentimes the only one on the team with the unique ability to turn data into business intelligence, data scientists are responsible for making key IoT decisions, setting plans, ensuring execution and meeting deliverables. On top of this, there can be a number of stumbling blocks out of the gate that make it hard to reach goals. Being aware of these challenges not only helps put a data scientist on the shortest route to success, it makes it easier to identify where and when more help will be needed.Here are some of the most challenging requirements data scientists face when starting an IoT project:To read this article in full, please click here
Projects involving virtualization, cloud architectures, advanced networking and cutting-edge digital technologies are critical to pushing a company into the future. As a result, missteps can be costly. Take a good idea on paper, execute it poorly, and your desire to create value will end up squandering value.Given the complexity of IT transformation projects, there are many ways to get them wrong. If you've ever been called upon to assist companies stuck in the middle of such projects (as has our team, many times) it’s easy enough to identify several sure-fire ways to derail them – and corresponding ways to keep them on track. Here are five:1. Trivialize the effort required
Have you ever sat in a meeting and heard an executive dismiss the difficulty of a project? "That sounds easy!," he or she might say. Whether it’s a desire for the project to be completed, a lack of knowledge about the details, the planning fallacy or some other error, following that lead is a good way to set yourself up for failure.To read this article in full, please click here