COVID-19 upends disaster recovery planning

The COVID-19 pandemic exposed gaps in enterprise disaster recovery and business continuity planning in areas such as remote access, networking, SaaS applications and ransomware. Over the past year, IT execs have been scrambling to plug those gaps and update DR plans on the fly.More significantly, the pandemic triggered fundamental IT changes at many organizations, including a hasty migration of applications to the cloud, an acceleration of digital transformation efforts, the emergency provisioning of new systems and services outside of traditional procurement procedures, and, in many industries, the emergence a new category of full-time, work-at-home employees who are handling mission-critical data on their personal devices.To read this article in full, please click here

COVID-19 upends disaster recovery planning

The COVID-19 pandemic exposed gaps in enterprise disaster recovery and business continuity planning in areas such as remote access, networking, SaaS applications and ransomware. Over the past year, IT execs have been scrambling to plug those gaps and update DR plans on the fly.More significantly, the pandemic triggered fundamental IT changes at many organizations, including a hasty migration of applications to the cloud, an acceleration of digital transformation efforts, the emergency provisioning of new systems and services outside of traditional procurement procedures, and, in many industries, the emergence a new category of full-time, work-at-home employees who are handling mission-critical data on their personal devices.To read this article in full, please click here

Arm talks 40% and 50% better performance from 2 new server chips

Arm Holdings has disclosed details of its two new server-processor designs, Neoverse N2 and Neoverse V1, as well as an updated high-speed mesh to connect its processors.The two designs were introduced last September but Arm was mum on performance. Now it's talking numbers.The Neoverse V1 is designed for scale-up servers, especially high-performance computing (HPC). It supports for Scalable Vector Extension (SVE) and delivers more than a 50% performance increase over the N1 for HPC machine-learning workloads.To read this article in full, please click here

Anatomy of how you get pwned

Today, somebody had a problem: they kept seeing a popup on their screen, and obvious scam trying to sell them McAfee anti-virus. Where was this coming from?

In this blogpost, I follow this rabbit hole on down. It starts with "search engine optimization" links and leads to an entire industry of tricks, scams, exploiting popups, trying to infect your machine with viruses, and stealing emails or credit card numbers.

Evidence of the attack first appeared with occasional popups like the following. The popup isn't part of any webpage.




This is obviously a trick. But from where? How did it "get on the machine"?

There's lots of possible answers. But the most obvious answer (to most people), that your machine is infected with a virus, is likely wrong. Viruses are generally silent, doing evil things in the background. When you see something like this, you aren't infected ... yet.

Instead, things popping with warnings is almost entirely due to evil websites. But that's confusing, since this popup doesn't appear within a web page. It's off to one side of the screen, nowhere near the web browser.

Moreover, we spent some time diagnosing this. We restarted the webbrowser in "troubleshooting mode" with all Continue reading

802.1X: What you need to know about this LAN-authentication standard

When devics on enterprise LANs need to connect to other devices, they need a standard method for identifying each other to ensure they are communicating with the device they want to, and that's what 802.1x does. This article tells where it came from and how it works.802.1x defined IEEE 802.1X is a standard that defines how to provide authentication for devices that connect with other devices on local area networks (LANs).How to deploy 802.1x for Wi-Fi using WPA3 enterprise It provides a mechanism by which network switches and access points can hand off authentication duties to a specialized authentication server, like a RADIUS server, so that device authentication on a network can be managed and updated centrally, rather than distributed across multiple pieces of networking hardware.To read this article in full, please click here

802.1X: What you need to know about this LAN-authentication standard

When devics on enterprise LANs need to connect to other devices, they need a standard method for identifying each other to ensure they are communicating with the device they want to, and that's what 802.1x does. This article tells where it came from and how it works.802.1x defined IEEE 802.1X is a standard that defines how to provide authentication for devices that connect with other devices on local area networks (LANs).How to deploy 802.1x for Wi-Fi using WPA3 enterprise It provides a mechanism by which network switches and access points can hand off authentication duties to a specialized authentication server, like a RADIUS server, so that device authentication on a network can be managed and updated centrally, rather than distributed across multiple pieces of networking hardware.To read this article in full, please click here

Red Hat announces Red Hat Edge initiative

During this week's Red Hat Summit, the company announced enhanced support for edge networking in its upcoming RHEL 8.4 release. The Red Hat Edge initiative promises new capabilities that will make RHEL a more powerful foundation for the open hybrid cloud.The Red Hat Edge aims to extend Red Hat’s open hybrid cloud portfolio to the edge. This will involve everything from telecommunications and transportation to smart automobiles and enterprise devices. With Red Hat technologies, the edge-ready technology stack uses Red Hat Enterprise Linux along with: Red Hat OpenShift – making it possible to deploy Kubernetes platform in both space- and resource-constrained locations Red Hat Advanced Cluster Management – adding Kubernetes management capabilities across the hybrid cloud Red Hat Ansible Automation Platform – automating workflows Red Hat Integration – connecting applications and data across edge and open cloud deployments Red Hat Data Services – storing, analyzing and distributing data across edge and data centers The company is also expanding its predictive analytics offering, Red Hat Insights, across the open hybrid cloud with the launch of Red Hat Insights for Red Hat OpenShift and Red Hat Ansible Automation Platform and with expanded capabilities for Red Hat Enterprise Linux (RHEL). Continue reading

Red Hat announces Red Hat Edge initiative

During this week's Red Hat Summit, the company announced enhanced support for edge networking in its upcoming RHEL 8.4 release. The Red Hat Edge initiative promises new capabilities that will make RHEL a more powerful foundation for the open hybrid cloud.The Red Hat Edge aims to extend Red Hat’s open hybrid cloud portfolio to the edge. This will involve everything from telecommunications and transportation to smart automobiles and enterprise devices. With Red Hat technologies, the edge-ready technology stack uses Red Hat Enterprise Linux along with: Red Hat OpenShift – making it possible to deploy Kubernetes platform in both space- and resource-constrained locations Red Hat Advanced Cluster Management – adding Kubernetes management capabilities across the hybrid cloud Red Hat Ansible Automation Platform – automating workflows Red Hat Integration – connecting applications and data across edge and open cloud deployments Red Hat Data Services – storing, analyzing and distributing data across edge and data centers The company is also expanding its predictive analytics offering, Red Hat Insights, across the open hybrid cloud with the launch of Red Hat Insights for Red Hat OpenShift and Red Hat Ansible Automation Platform and with expanded capabilities for Red Hat Enterprise Linux (RHEL). Continue reading

The Common Room: How an Artist Is Connecting Rural Indonesia One Village at a Time

A young person scrolls through Instagram to see the latest updates on their favorite profiles. To many around the world this doesn’t seem strange, but for a hamlet outside of a small village in Indonesia’s rural southwest, it’s revolutionary. And it’s in part thanks to the work of an Internet entrepreneur named Gustaff Harriman Iskandar. […]

The post The Common Room: How an Artist Is Connecting Rural Indonesia One Village at a Time appeared first on Internet Society.

OpenShifting The Hybrid Cloud Into High Gear

The cloud and the related edge already are rapidly influencing almost every aspect of IT, from the technology that is being adapted and created to how that technology is being consumed, as illustrated by the growing numbers of established hardware vendors – including Hewlett Packard Enterprise, Dell, and Cisco Systems – that now are offering more of their portfolio as services.

OpenShifting The Hybrid Cloud Into High Gear was written by Jeffrey Burt at The Next Platform.

Day Two Cloud 095: Grappling With The Open Source Business Model

Today on Day Two Cloud we get into a whole lot of things. For example, what is IT's value in the age of cloud? How can IT figure out what's actually providing value to the business vs. undifferentiated heavy lifting? How companies built on open-source software make their money? Our guest is Stu Miniman, Director of Market Insights at Red Hat.

The post Day Two Cloud 095: Grappling With The Open Source Business Model appeared first on Packet Pushers.