By: Trent Fierro, Content and Operations at HPE Aruba Networking.
At the start of a new year, it’s often time for life-changing decisions. Some that are fun, like vowing to take more time off from work, and some that can make the fun decision come true. Like, looking for ways to better manage your wired, wireless, or SD-WAN deployments via Network as a Service (NaaS) or AI for IT Operations (AIOps) options.
To help, we’ve put together a short eBook that walks you through how a large retailer is using the Aruba Global Services team and Aruba Central with built-in AIOps features keep their many remote sites running at their best. In this scenario, the customer chose a NaaS partner that takes advantage of AIOps tools to deliver the insights and efficiency that allows their IT team to focus on more pressing tasks.
To read this article in full, please click here
//m.banksfrench.com/article/3695586/aiops-for-naas-efficiency-and-how-aruba-global-services-uses-it.html tk.rss_allIBM reached a quantum-computing milestone in March with the first U.S. deployment of an on-site, private-sector, IBM-managed quantum computer. The IBM Quantum System One, installed at the Cleveland Clinic, is the world's first quantum computer to be specifically dedicated to healthcare research, with the goal of helping the Cleveland Clinic accelerate biomedical discoveries, according to IBM.
The announcement didn't surprise Scott Buchholz, global quantum computing lead at enterprise advisory firm Deloitte. "IBM is a leader in the race to build useful, scalable quantum computers," he says. "Their research teams have been working to build the software, hardware, and supplier ecosystem necessary to support the long-term development of these important technologies."
5G (short for fifth generation) is an umbrella term that describes the collection of standards and technologies that define the current generation of wireless network connectivity. First rolled out in commercial applications in 2019, 5G promised a significant increase in network speeds and a decrease in latency compared to 4G LTE networks.
Initially, many operators offered 5G-branded services that mixed 4G and 5G technologies and in practice provided speeds closer to the former. But 5G has become near-universal in the U.S. and most developed countries, and just about any new cellular wireless device you purchase today will be 5G-enabled.
In the public mind, 5G is mostly associated with cell phones, and those remain by far its most widespread use case. But 5G is also the first wireless technology that telecoms are using to compete with cable or fiber for fixed home internet use. It also has a number of industrial uses. 5G does all this safely, and anything you might read about the supposed dangers of 5G is simply false.
Cisco continues to invest in its customer experience (CX) group, which provides product lifecycle management and aims to ensure that customers get what they want out of their technology purchases.
Alistair Wildman, senior vice president of Cisco Global Customer Experience, says his team of 20,000 is primed to make sure enterprises are effectively choosing, implementing, and using the technologies they purchase to achieve their business goals. Cisco CX offers a suite of services to help customers optimize their network infrastructure, security, collaboration, cloud and data center operations – from planning and design to implementation and maintenance.
The other day I was talking to an analyst about trends in networking and how important the zero-trust security model has become. With zero trust, a user or device is only trusted after confirming their identity or status. It moves security away from implied trust that is based on network location and evaluates trust on a per-transaction basis.
Many organizations are incorporating zero-trust strategies into their architectures, replacing implicit trust for network edges and remote users with consistent convergence of networking and security. This change in mindset has led to specific projects that involve zero trust, such as zero-trust network access (ZTNA) initiatives.
There are a number of ways to view files on Linux, because, after all, files on Linux are multifaceted. They have names, they have content, they have access permissions, and they have dates and times associated with their "birth" (when they were initially added to the file system) as well as when they were last changed and last accessed. This post covers the commands that allow you to view all these details.
Listing files
The easiest and most obvious way to list files is with the ls command. By default, ls will list files in the current directory in name order, but you can reverse that by adding the -r option.
Qualcomm is acquiring fabless Israel-based automobile chip maker Autotalks in a bid to add safety features to its Snapdragon Digital Chassis product family and strengthen its semiconductor product portfolio for the booming car-to-cloud communications and autonomous-driving market.
The Snapdragon Digital Chassis product family is designed to provide assisted and autonomous driving technology, as well as in-car infotainment and cloud connectivity.
Autotalks has been working on vehicle-to-everything (V2X) communications since 2009, Qualcomm noted in its announcement of the deal on Monday. The Israel-based company provides automotive dual-mode global V2X technology compatible with multiple V2X standards that are designed to reduce collisions and improve mobility, Qualcom said.
Ongoing US diplomatic efforts to keep Chinese-made equipment out of as many networks as possible appear to be bearing fruit, as Germany eyes a ban on Huawei and ZTE 5G equipment, which would follow in the footsteps of several other European nations.
Sweden, Norway, and the UK have already implemented bans on Chinese-made equipment, following the US line that such hardware poses a national security threat thanks Huawei and ZTE’s close ties to the government in Beijing.
News of a prospective German ban was originally broken in March by German newspaper Die Zeit, citing government sources.
Microsoft is reportedly partnering with AMD to help the chip maker develop advanced processors that support artificial AI workloads. Microsoft’s increased demand for chips that can support AI applications is due to the number of AI-based products and services it has recently released in collaboration with OpenAI, creator of ChatGPT.
As a result, Microsoft has decided to collaborate with AMD to provide an alternative to Nvidia, which dominates the market for graphics processing units (GPUs) used for AI applications, according to a Bloomberg report.
Broadcom said it will spend $2 billion a year to accelerate research and development for VMware products and services.
In making the investment assurance, Broadcom CEO Hock Tan wrote in a blog post: “By extending our multi-cloud strategy, we will invest in extending VMware’s software stack to run and manage workloads across private and public clouds, which means any enterprise can run application workloads easily, securely, and seamlessly on-prem, or in any cloud platform they prefer.”
“If companies can run VMware as a private cloud on-prem, they should be able to take their same application workloads to the public cloud without needing to re-engineer that application or worry about being locked into the public cloud providers that they choose,” Tan stated.
Cisco today announced a new finance program that encourages customers to buy products and services now without having to start paying for them till 2024.
Specifically the Cisco Capital Business Acceleration Program will let customers purchasing Cisco products before July 29, 2023, and defer all payments until 2024. Payments deferred until 2024 would be based on the total amount financed and contract terms, the vendor stated.
Cisco said another flexible payment option is available for its partners to let their customers buy Cisco technology today, and pay later, the vendor said in a statement.
The entirety of Cisco’s portfolio is eligible for the program, including hardware, software, and services, as well as select partner services and third-party hardware. In addition the Cisco Refresh portfolio of Cisco certified remanufactured products is also eligible for organizations that want to acquire used gear, the vendor stated.
Cisco continues to signal its desire to become a major software player, most recently with its emphasis on API advancements and its commitment to building a bigger development community around that effort.
The average enterprise uses 1,935 applications—a 15% increase from five years ago, according to Cisco. And each of these apps is accessible via dozens of APIs from vendors, developers and homegrown sources.
“We are conducting 8 billion API calls on a monthly basis. And just to give you an idea of the proliferation of that adoption, at the end of 2018 it was 20 million,” said Anne Gentle, developer experience manager with Cisco.
Last year, Cisco announced its API First strategy, which prioritizes API development in all Cisco products to ensure efficient communication among applications, services and systems.
The proportion of companies implementing a data center infrastructure sustainability program will rise from about 5% in 2022 all the way to 75% by 2027, as sustainability becomes an increasingly central consideration for cost optimization and risk management, according to new data from Gartner Research.
Respondents to a recent global survey of 221 IT leaders conducted by Gartner said that sustainability is already on the march within their organizations, with 42% saying that environmentally friendly choices are helping to drive business growth and provide a differentiator to their competition, and 29% reporting that it’s helping to create strategic value through industry partnerships.
Amazon Web Services has launched a service that secures user access to its cloud applications without requiring a VPN.
AWS Verified Access, which the company previewed last November, validates every application request using Zero Trust principles before granting access to applications. Since AWS previewed the networking service, it has added two new features: AWS Web Application Firewall (WAF) and the ability to pass signed identity context to customers’ application endpoints.
Most enterprises have what they describe as a cordial relationship with their network vendors, but roughly a third say their relationship is guarded, and more than a few say it’s suspicious. That’s a pretty broad range of views, but every enterprise I’ve chatted with says there are things they don’t want their vendors to do, and don’t like it if the vendors do them. Most also say they take steps to prevent these things, and the steps they recommend are really interesting.
Vendors shouldn’t finger-point
The top don’t-do for vendors by far is finger-pointing, meaning trying to deflect responsibility for an issue by blaming someone else. I remember well a meeting where the CIO of a healthcare company sprained his shoulder when he threw a ten-pound, bound listing of problem proofs at a network vendor VP who didn’t want to admit responsibility. (He him square in the chest, by the way.) This is surely an extreme reaction, but every single enterprise in the over-200 I’ve talked to about this in the last year said that their network vendors had evaded a problem or obstructed problem determination at least once.
Modern networks require more dynamic changes than traditional networks, and the solution to building these dynamic capabilities is network automation, which means the job of network engineers is changing.
Historically, network reconfigurations required manual work that might require network downtime while changes were made. Network automation has the potential to mitigate this downtime by re-routing network traffic or scheduling the downtime for off-peak hours.
To meet the challenges of this change, traditionally trained network engineers may benefit from certifications in automation. Engineers need ways to minimize the time-consuming, error-prone manual changes that ever-changing workloads demand.
The US and the EU have put heavy diplomatic pressure on the government of Malaysia, urging it to bar Chinese networking equipment vendor Huawei from its state-owned 5G network, according to a report in the Financial Times.
Letters from the US ambassador to the country, Brian McFeeters, and from the head of the EU delegation to Malaysia, Michalis Rokas, warned of potential legal problems and national security issues, if the country succumbs to what the Financial Times described as heavy lobbying by Huawei.
“Senior officials in Washington agree with my view that upending the existing model would undermine the competitiveness of new industries, stall 5G growth in Malaysia, and harm Malaysia’s business-friendly image internationally,” wrote McFeeters, according to the Financial Times. “Allowing untrusted suppliers in any part of the network also subjects Malaysia’s infrastructure to national security risks.”
The hype surrounding 5G ranges from Jetsons-like futurism to deep-in-the-rabbit-hole conspiracy theories. On the consumer side, 5G is still serving up more sizzle than steak, mainly because the technology is so new, handsets so few, and infrastructure still mostly 4G LTE or earlier, so developers are still figuring out how to take advantage of its capabilities.
Today’s enterprise networks span on-premises and cloud environments, and it has become a lot harder for IT teams to maintain performance, reliability and security when some parts of the network are unknown or off-limits to traditional performance monitoring tools.
“If you cannot get visibility into all the components comprising the digital experience, everything that is between the end user clicking the mouse to the deepest part of a cloud or data center network, then you are flying blind, you are incurring a lot of risk, and you could be overspending, too,” says Mark Leary, research director for network analytics and automation at research firm IDC.
You probably use some bash builtins fairly often whether or not you think of them as builtins or simply as commands. After all, bash builtins are commands, but not implemented as separate executables. Instead, they are part of the bash executable. In other words, they are "built into" bash, thus the term "bash builtins".
If you're looking for a particular builtin, the which command isn't going to find it for you because it only looks through a collection of executables. This includes system commands like /bin/echo as well as scripts for which you have execute permission. Here's an example of which not finding anything:
Security, AI, and network-as-a-service (NaaS) were top of mind for Aruba Networks execs at their Atmosphere customer conference this week.
“Ten years ago for most network operators their main job was making sure connectivity was reliable and security was someone else’s problem. It was outside their perimeter," said David Hughes, senior vice president, chief product and technology officer with Aruba. "But today all perimeters have dissolved and the network has expanded,” .
“The networking team is now responsible for making sure connectivity is secure from the start. Bolting it on somewhere won’t cut it anymore, it needs to be built into the network,” Hughes said.
IBM is now offering bare metal instances in the cloud powered by its LinuxONE hardware with a pitch that enterprises can consolidate workloads and reduce energy consumption compared to x86 servers under similar conditions.
The LinuxONE servers feature the Telum processor that IBM uses in its z16 mainframe, but they're designed to run multiple flavors of enterprise Linux rather than the mainframe z/OS.
IBM shipped the fourth generation of its LinuxONE product line last September, dubbed LinuxONE Emperor, promising both scale-out and scale-up performance and requiring a lot less hardware than standard x86 servers. More recently, it introduced LinuxONE Rockhopper, a smaller-scale system for more modest deployments.