How to find what you’re looking for on Linux with find

There are a number of commands for finding files on Linux systems, but there are also a huge number of options that you can deploy when looking for them.For example, you can find files not just by their names, but by their owners and/or groups, their age, their size, the assigned permissions, the last time they were accessed, the associated inodes and even whether the files belong to an account or group that no longer exists on the system and so on.[Get regularly scheduled insights by signing up for Network World newsletters.] You can also specify where a search should start, how deeply into the file system the search should reach and how much the search result will tell you about the files it finds.To read this article in full, please click here

A $399 device that translates brain signals into digital commands

Scientists have long envisioned brain-sensing technology that can translate thoughts into digital commands, eliminating the need for computer-input devices like a keyboard and mouse. One company is preparing to ship its latest contribution to the effort: a $399 development package for a noninvasive, AI-based, brain-computer interface.The kit will let "users control anything in their digital world by using just their thoughts," NextMind, a commercial spinoff of a cognitive neuroscience lab claims in a press release.To read this article in full, please click here

Multicloud, security integration drive massive SD-WAN adoption

Increasing cloud adoption as well as improved network security, visibility and manageability are driving enterprise software-defined WAN (SD-WAN) deployments at a breakneck pace.According to research from IDC, software- and infrastructure-as-a-service (SaaS and IaaS) offerings in particular have been driving SD-WAN implementations in the past year, said Rohit Mehra, vice president, network infrastructure at  IDC. Read about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT For example, IDC says that its recent surveys of customers show that 95% will be using SD-WAN technology within two years, and that 42% have already deployed it. IDC also says the SD-WAN infrastructure market will hit $4.5 billion by 2022, growing at a more than 40% yearly clip between now and then.To read this article in full, please click here

Using AppleScript To Size A Window To 16×9 On MacOS

As part of an automation workflow I’m building around Elgato Stream Deck, I needed a way to size an application window to 16×9. This would be one component of a workflow that would allow me to launch an app, size the window, position it on the screen, and hide all the other windows with the push of a Stream Deck button.

The easy part was the Stream Deck configuration. The hard part was the AppleScript–I had never written one.

The Script

This AppleScript is crude, but it’s a start. I explain what the script is doing using inline comments, which in AppleScript are noted by the leading double-hyphens, although pound signs and (* *) delimiters for multi-line comments are also supported.

----------------------------------------------------------
-- SET VARIABLES
----------------------------------------------------------
-- theApp = name of the app MacOS will act upon
set theApp to "ApplicationName"

-- appWidth = how many pixels wide we'd like the window
-- appHeight is calculated as a 16:9 ratio of "appWidth"
-- Note that "as integer" means decimal portions of a 
-- calculation are truncated.
set appWidth to 1600
set appHeight to appWidth / 16 * 9 as integer

-- screenWidth = display pixel width
-- screenHeight =  Continue reading

Fortinet Firewall Update Tames 5G, IoT ‘Elephant Flows’

The company claims the appliance is capable of simultaneously juggling millions of connections per...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

3 Ways to Learn More About Intrinsic Security at RSAC 2020

Last year, we introduced powerful new innovations that make networking more secure and intrinsic to your infrastructure. These innovations included our Service-defined Firewall and introduction of optional distributed intrusion detection and prevention (IDS/IPS).

At RSAC 2020, VMware is making it easy to learn how intrinsic security can benefit your business with opportunities to engage us in 1:1 conversations, view demos and more.

Here are 3 ways that you can learn more about intrinsic security at RSAC 2020.

1.) Join Tom Gillis’ Breakout session:  Unshackle Legacy Security Restrictions for 2020 and Beyond

Tom Gillis, SVP/GM of Networking and Security at VMware, will be speaking at the RSA Conference in a breakout session. His session covers data center and branch security approaches and will feature demos across the VMware security portfolio including NSX Data Center, VMware NSX Advanced Load Balancer, and VMware SD-WAN.

Be sure to reserve a seat for his session!

2.) Meet with VMware Security Executives

Schedule an exclusive conversation with a security executive to discuss how intrinsic security for your network and workloads can enable proactive security that’s easy to operationalize.

Meeting time slots are limited so request a meeting now.

3.) Visit the Continue reading

Daily Roundup: Dell Sells RSA, Bags $2B

Dell bagged $2B with the sale of RSA; AT&T shared threat intelligence; and Orange teamed up...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

ExtraHop Extends Network Detection and Response to IoT

It becomes increasingly important as operators rollout 5G networks and enterprises connect billions...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Getting Started with Istio Using Docker Desktop

This is a guest post from Docker Captain Elton Stoneman, a Docker alumni who is now a freelance consultant and trainer, helping organizations at all stages of their container journey. Elton is the author of the book Learn Docker in a Month of Lunches, and numerous Pluralsight video training courses – including Managing Apps on Kubernetes with Istio and Monitoring Containerized Application Health with Docker.

Istio is a service mesh – a software component that runs in containers alongside your application containers and takes control of the network traffic between components. It’s a powerful architecture that lets you manage the communication between components independently of the components themselves. That’s useful because it simplifies the code and configuration in your app, removing all network-level infrastructure concerns like routing, load-balancing, authorization and monitoring – which all become centrally managed in Istio.

There’s a lot of good material for digging into Istio. My fellow Docker Captain Lee Calcote is the co-author of Istio: Up and Running, and I’ve just published my own Pluralsight course Managing Apps on Kubernetes with Istio. But it can be a difficult technology to get started with because you really need a solid background in Kubernetes Continue reading

BrandPost: What You Need to Know about NVMe-oF™

The era of NVMe-over-Fabrics (NVMe-oF™) is quickly approaching. By 2025, most data centers will likely have adopted NVMe-oF for some part of their architecture1. Accessing data from a shared storage system will be essentially as fast and as low latency as accessing data from direct attached storage (DAS). The year 2025 seems like a lifetime from now but the reality is it will be here before you know it.Here are some of the top questions we hear from customers about this emerging technology. In this blog, our data center experts offer their responses, and point you to additional resources for understanding both the NVMe™ protocol and the fabric that stitches it together.To read this article in full, please click here

BrandPost: Stumbles, Fumbles, and Pratfalls: Steps to Avoid When Future-Proofing Your WAN

When SD-WAN was introduced, it was widely seen as an MPLS alternative. Today just about any credible, Internet-based SD-WAN solution can be used to replace a regional MPLS network. The bigger question is what happens the day after you networked your regional offices.How will your SD-WAN deliver predictable application experience overseas or where Internet routing is unpredictable? How will your SD-WAN adapt to the cloud and mobile users, the new tenants of the modern enterprise? In short, understanding how your SD-WAN will accommodate the unpredictable is essential if you hope to future-proof your WAN.To read this article in full, please click here

Post: Essilen Research, Fauna, Sisu, Educative, PA File Sight, Etleap, Triplebyte, Stream

Who's Hiring? 

  • Are you looking to improve how you hire technical talent? Essilen Research's free video series can help. Fix common issues in screening, interviewing, closing and on-boarding. Learn how world-class tech companies crush the hiring game!

  • Sisu Data is looking for machine learning engineers who are eager to deliver their features end-to-end, from Jupyter notebook to production, and provide actionable insights to businesses based on their first-party, streaming, and structured relational data. Apply here.

  • Triplebyte lets exceptional software engineers skip screening steps at hundreds of top tech companies like Apple, Dropbox, Mixpanel, and Instacart. Make your job search O(1), not O(n). Apply here.

  • Need excellent people? Advertise your job here! 

Cool Products and Services

  • Level up on in-demand technologies and prep for your interviews on Educative.io, featuring popular courses like the bestselling Grokking the System Design Interview. For the first time ever, you can now sign up for a subscription to get unlimited access to every course on the platform at a discounted price through the holiday period only. You'll also get to lock in this price as long as you're a subsciber. 

  • Stateful JavaScript Apps. Effortlessly add state Continue reading

Dell Sells RSA Security Biz for $2.075 Billion

The companies announced the deal a week before the annual RSA mega-cybersecurity conference kicks...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Network Break 271: Global Espionage Agita Kicks Up A Notch; Forescout Gets Bought For $1.9 Billion

Take a Network Break! Global espionage tensions ratchet up between the United States and China, the CIA is revealed to have owned a company that sold doctored cryptography systems to allies and adversaries, VMware adjusts its licensing, and more tech news. Guest analysts Keith Townsend and Ned Bellavance step in for a vacationing co-host.

Network Break 271: Global Espionage Agita Kicks Up A Notch; Forescout Gets Bought For $1.9 Billion

Take a Network Break! Global espionage tensions ratchet up between the United States and China, the CIA is revealed to have owned a company that sold doctored cryptography systems to allies and adversaries, VMware adjusts its licensing, and more tech news. Guest analysts Keith Townsend and Ned Bellavance step in for a vacationing co-host.

The post Network Break 271: Global Espionage Agita Kicks Up A Notch; Forescout Gets Bought For $1.9 Billion appeared first on Packet Pushers.

BrandPost: Performance Drives Innovation and Security Vendors Need to Keep Up

In 1969, the very first e-message was sent over the ARPANET from computer science Professor Leonard Kleinrock's UCLA laboratory to a network node located at Stanford. That event kicked off a digital revolution that has utterly transformed our world. And ever since that first defining moment, the one question that has driven nearly all subsequent digital innovation has been: “How can we do this even faster?”We are still wrestling with that same challenge today. The latest advances in computing, such as edge device hyperconnectivity and the hyperscalability achievements of advanced data center architectures are the result of the desire to achieve better performance. Speed is the driving force behind the digital transformation of today’s business infrastructures. It enables access to critical data and resources, drives business efficiencies, scales application development, increases productivity, generates revenue, and accelerates ROI.To read this article in full, please click here