Using chpasswd to change account passwords on Linux

The chpasswd command allows admins to change account passwords by piping username and password combinations to it.This can be done one-account-at-a-time or by putting all of the accounts to be modified in a file and piping the file to the command.[Get regularly scheduled insights by signing up for Network World newsletters.] How to use chpasswd Using the chpasswd command requires root privilege. You can switch to the root account and run a command like this:# echo nemo:imafish | chpasswd Better yet, you can use sudo with a command like this:To read this article in full, please click here

Rockport Networks debuts the “switchless” network

A startup called Rockport Networks has exited stealth mode with an intriguing product: a switchless network. It claims the Rockport Switchless Network product can move data faster and with better latency than switched networks.In a Rockport Switchless Network, switching functionality has been reassigned to intelligent endpoint network cards where these devices (nodes) become the network. Each device has an FPGA and can connect up to 24 endpoints to a dedicated 1U SHFL (pronounced “shuffle”) optical device using passive cabling.[Get regularly scheduled insights by signing up for Network World newsletters.] SHFLs need no power or cooling and can be linked together to scale out the network. Ethernet and InfiniBand traffic can be carried over the Rockport network. The network cards are standard, low-profile half height, half length (HHHL) PCIe cards.To read this article in full, please click here

Rockport Networks debuts the “switchless” network

A startup called Rockport Networks has exited stealth mode with an intriguing product: a switchless network. It claims the Rockport Switchless Network product can move data faster and with better latency than switched networks.In a Rockport Switchless Network, switching functionality has been reassigned to intelligent endpoint network cards where these devices (nodes) become the network. Each device has an FPGA and can connect up to 24 endpoints to a dedicated 1U SHFL (pronounced “shuffle”) optical device using passive cabling.[Get regularly scheduled insights by signing up for Network World newsletters.] SHFLs need no power or cooling and can be linked together to scale out the network. Ethernet and InfiniBand traffic can be carried over the Rockport network. The network cards are standard, low-profile half height, half length (HHHL) PCIe cards.To read this article in full, please click here

Wacky as Facebook’s metaverse sounds, enterprises will have to deal with it

In our modern world, “metaverse” is the term applied to an artificial reality, a virtual world inhabited by avatars that represent real people and perhaps other AI virtual beings, too.What makes the concept relevant to enterprises are the Facebook decision to embrace metaverse as the future, the fact that others like Microsoft are following along, and the promise that it could redefine meetings, sales calls, support, and even work overall. Network planners would then have to consider its impact on traffic and connectivity.[Get regularly scheduled insights by signing up for Network World newsletters.] One big get-it-approved problem with the metaverse for enterprise is likely to be security. Facebook has had a lot of recent bad press for favoring profit over the welfare of its users, and that sort of thing sets compliance officers a-tingle, so self-hosting might be a solution. Executing that is partly a software issue and partly a network issue.The former, we can assume, would be handled by open-source development arising out of the interest Facebook has created. The latter isn’t as easy to dismiss.To read this article in full, please click here

Hedge 107: Career Advice with Terry Slattery

Whether you’re just starting in your technology career, or you’re an old hand who likes to go back to basics and understand how to move forward in your career, this episode of the Hedge is for you. Terry Slattery joins Tom Ammon and Russ White to discuss the things you can do to build a successful career as in the world of network engineering.

download

10 limitations of MU-MIMO in Wi-Fi

Multi-user MIMO allows multiple Wi-Fi devices to simultaneously receive multiple data streams. For example, a wireless access point (AP) can send data to four different Wi-Fi devices at the same time. MU-MIMO can greatly increase the network's throughput and is a real asset for high density networks.MIMO – which stands for multiple input multiple output – technology has evolved over the years since the debut of the single-user mode (SU-MIMO), which was introduced more than a decade ago with the 802.11n wireless standard. Learn more about MU-MIMO and Wi-Fi 6To read this article in full, please click here

Kyndryl has spun off from IBM as a $19B managed service firm

Kyndryl, formerly IBM’s Managed Infrastructure Services unit, is officially an independent company.From the start the spinoff will be big, with more than 90,000 employees, $19 billion in annual revenue, operations in over 60 countries, and a customer base that includes 75% of the Fortune 100. Its goal of modernizing customer infrastructure will remain at the center of its strategy, but it wants to expand.[Get regularly scheduled insights by signing up for Network World newsletters.] Company executives say by spinning out of IBM, Kyndryl will have more freedom to partner with other major tech companies and cloud hyperscalers such as Google, AWS, and Microsoft. Plus it can invest in its workforce as well as focus on developing services for hot markets such as 5G, edge computing, cloud, and security.To read this article in full, please click here

Kyndryl has spun off from IBM as a $19B managed service firm

Kyndryl, formerly IBM’s Managed Infrastructure Services unit, is officially an independent company.From the start the spinoff will be big, with more than 90,000 employees, $19 billion in annual revenue, operations in over 60 countries, and a customer base that includes 75% of the Fortune 100. Its goal of modernizing customer infrastructure will remain at the center of its strategy, but it wants to expand.[Get regularly scheduled insights by signing up for Network World newsletters.] Company executives say by spinning out of IBM, Kyndryl will have more freedom to partner with other major tech companies and cloud hyperscalers such as Google, AWS, and Microsoft. Plus it can invest in its workforce as well as focus on developing services for hot markets such as 5G, edge computing, cloud, and security.To read this article in full, please click here

The Power of AI and the Science of Operations (Part 1)

A variety of industry experts cite Artificial Intelligence and Automation as key emerging trends.  But if you look around your organizations, you will see the evidence of AI projects and also an increasing focus on using automation in a variety of ways.  IBM and Red Hat together can help you build on and apply these trends to your IT operations. 

In this article, which is part 1 of the 2 articles that I intend to write, we will show how complex application environments produce more data than the humans tasked with running those environments can feasibly understand. And how the combination of an AIOps platform like Instana with an enterprise automation platform like Ansible Automation Platform can give human operators the edge they need to keep business critical applications running and users satisfied.

 

So much data, so little time

Having worked as an operation engineer in the past, I am aware of the all-too-familiar challenge of receiving a storm of alerts and trying to locate the root cause of an anomaly so as to isolate the problem and recover the services in the shortest possible time. However, conventional monitoring tools are often only able to raise Continue reading

DDoS Attack Trends for Q3 2021

DDoS Attack Trends for Q3 2021
DDoS Attack Trends for Q3 2021

The third quarter of 2021 was a busy quarter for DDoS attackers. Cloudflare observed and mitigated record-setting HTTP DDoS attacks, terabit-strong network-layer attacks, one of the largest botnets ever deployed (Meris), and more recently, ransom DDoS attacks on voice over IP (VoIP) service providers and their network infrastructure around the world.

Here’s a summary of the trends observed in Q3 ‘21:

Application-layer (L7) DDoS attack trends:

  • For the second consecutive quarter in 2021, US-based companies were the most targeted in the world.
  • For the first time in 2021, attacks on UK-based and Canada-based companies skyrocketed, making them the second and third most targeted countries, respectively.
  • Attacks on Computer Software, Gaming/ Gambling, IT, and Internet companies increased by an average of 573% compared to the previous quarter.
  • Meris, one of the most powerful botnets in history, aided in launching DDoS campaigns across various industries and countries.

Network-layer (L3/4) DDoS attack trends:

  • DDoS attacks increased by 44% worldwide compared to the previous quarter.
  • The Middle East and Africa recorded the largest average attack increase of approximately 80%.
  • Morocco recorded the highest DDoS activity in the third quarter globally — three out of every 100 packets were part of a DDoS Continue reading

Why Does Internet Keep Breaking?

James Miles sent me a long list of really good questions along the lines of “why do we see so many Internet-related outages lately and is it due to BGP and DNS creaking of old age”. He started with:

Over the last few years there are more “high profile” incidents relating to Internet connectivity. I raise the question, why?

The most obvious reason: Internet became mission-critical infrastructure and well-publicized incidents attract eyeballs.

Ignoring the click baits, the underlying root cause is in many cases the race to the bottom. Large service providers brought that onto themselves when they thought they could undersell the early ISPs and compensate their losses with voice calls (only to discover that voice-over-Internet works too well).

Why Does Internet Keep Breaking?

James Miles sent me a long list of really good questions along the lines of “why do we see so many Internet-related outages lately and is it due to BGP and DNS creaking of old age”. He started with:

Over the last few years there are more “high profile” incidents relating to Internet connectivity. I raise the question, why?

The most obvious reason: Internet became mission-critical infrastructure and well-publicized incidents attract eyeballs.

Ignoring the click baits, the underlying root cause is in many cases the race to the bottom. Large service providers brought that onto themselves when they thought they could undersell the early ISPs and compensate their losses with voice calls (only to discover that voice-over-Internet works too well).

Red Hat Enterprise Linux 9 drops in beta version

Red Hat Enterprise Linux version 9 released today as a beta, bringing about a dozen major new features focused on security and compliance, simplified management and automation. But the biggest news might be the lack of changes to the management and administration tools from the previous version, which could make adoption fairly painless.The key new management features include enhanced web-console performance metrics for easier diagnosis of problems, live kernel patching without the need for downtime, and an easier way to create new OS images.[Get regularly scheduled insights by signing up for Network World newsletters.] Many of those features make RHEL 9 better-suited to use in edge environments, according to IDC vice president Dave McCarthy, who noted that automation seemed to be a particularly important focus in the new version.To read this article in full, please click here