By: Lilly Fleming, Healthcare Marketing, HPE Aruba Networking.
Healthcare organizations have undergone substantial digital transformation over the last decade. There are more medical and personal IoT devices in the healthcare landscape than ever before, and this trend is not slowing down. The healthcare IT organization faces the difficult challenge of added complexities, including how they prioritize investments in digital tools, technology, and analytics. Channel Partners can help their healthcare customers meet the needs of their patients and stakeholders by enabling them to overcome these challenges.
To read this article in full, please click here
//m.banksfrench.com/article/3702114/unlock-the-potential-for-naas-in-healthcare.html tk.rss_allBy: Scott Raynovich,
As end users adopt software-defined technology that can help them more easily deploy and manage secure networks, they are increasingly looking to the technologies known as secure access service edge (SASE) and secure service edge (SSE).
But digging deeper into these acronyms, it gets more complex. SASE and SSE products aren’t exactly product categories per se – but platforms for integrating a variety of network security functions. These wide-ranging features might include all the most popular features/acronyms, including Advanced Threat Protection (ATP), Cloud Access Security Broker (CASB), Data Loss Prevention (DLP), Firewall-as-a-Service (FWaaS), Intrusion Detection System/Intrusion Prevention System (IDS/IPS), Next-Generation Firewall (NGFW), Software-Defined Wide-Area Networking (SD-WAN), Secure Web Gateway (SWG), Unified Threat Management (UTM), and Zero Trust Network Access (ZTNA). The integration of these functions is a key driving force behind the growth of the SASE market.
Enterprises over the past several years have embraced SD-WAN for many reasons, including the flexibility of cloud architecture, enhanced security, centralized management of distributed locations, and improved application availability and performance. In turn, the popularity of SD-WAN has helped propel interest in secure access service edge (SASE), a network architecture that converges connectivity and security services.
The mkdir command can do more than create a single directory. It can create multiple directories at once and can even create an entire directory structure with a single command. The required command will be a tad complex, but not particularly challenging.
NOTE: If you try to set up a multi-level directory structure with a command like the one shown below, it won't work if the initial directories ("this" and "that") don't already exist.
$ mkdir this/that/the_other
mkdir: cannot create directory ‘this/that/the_other’: No such file or directory
Add a -p (for "parents") and the missing directories will be created and your this/that/the_other directory structure will be set up in your current directory as intended.
Private 5G/LTE networks for the enterprise are becoming increasingly common, but a new forecast from tech analyst firm IDC has found that several headwinds exist for the technology, which could slow its adoption over the next 18 to 24 months.
The report, authored by IDC research manager Patrick Filkins, predicted that private cellular networking infrastructure sales will grow from $2.4 billion in global revenue this year to $5.3 billion in 2027.
The use cases for private cellular networks are numerous and varied, according to IDC, encompassing everything from wide-area applications like grid networks for utility systems and transport networks to local networks for manufacturing facilities or warehouses.
The adoption of artificial intelligence is changing the way servers are being procured while having a quick and positive impact on firms that deploy AI technologies, according to a pair of research reports from Omdia.
In its upcoming cloud and data center market report, the research firm predicts a reduction in the number of server shipments for the first time since 2007. However, the server drop in 2007 was due to a global economic crisis. The current shift in server buying has a more positive spin.
Omdia found that demand for compute resources remains high. However, it also reports that demand for more expensive servers with specialized hardware for AI model training (translation: GPUs) are being prioritized over the typical enterprise server with just a CPU.
Network connectivity and security are key areas for IT investment as well as potential barriers to global success, according to new research.
Nearly half of CIOs claim that establishing and managing connectivity in new markets is the single most critical factor when it comes to ensuring successful global expansion, according to Expereo, which surveyed 650 large enterprise and mid-market CIOs across Asia, Europe and North America for its research. In addition, 49% of CIOs report that their board views global connectivity as “a business-critical asset to growth.”
China’s Ministry for Industry and Information Technology has said it wants to improve the country’s manufacturing capabilities, singling out the production of advanced semiconductor materials and automotive chips as areas that are in need of improvement.
In its recently released Opinions on Manufacturing Reliability Improvement report, the department said it was putting forward a plan that would make up for the shortcomings of basic product reliability and improve the quality of core components in three industries: machinery, electronics, and automotive.
If you’re fairly new to Linux, you might need some help getting started on the command line. But you made it here, so let’s run through a number of ways that you can get comfortable and up to speed fairly quickly.
Man pages
Every Linux command should have a "man page" (i.e., manual page) – an explanation of what the command does, how it works and the options that you can use to specify what you want the command to show you. For example, if you wanted to see the options for formatting the output of the date command, you should look at the man page with the command “man date”. It should among other things, show you the format of the date command like this:
Servers can consume more than half of the energy in modern data centers, which makes server efficiency attractive to companies looking to hit carbon-neutral sustainability targets. Plus, reducing energy usage can save money.
To help reach that goal, here are five ways to boost server efficiency, according to recent research from the Uptime Institute, which is focused on improving the performance, efficiency, and reliability of business-critical infrastructure.
- Upgrade to a newer server generation. For decades, server energy efficiency has consistently improved thanks to improved efficiency of processors that power them.
- Pick servers with high compute capacity as measured in number of transactions per second. Those are the most energy efficient.
- Go for high core count. In general, efficiency improves with the number of cores, although there is some tapering off at the highest end.
- Be aware that while a server can be more energy efficient, its actual overall power consumed (Watts) can increase even as its efficiency (transactions per second per Watt) increases.
- Embrace power-management features in two ways: by reducing core CPU voltage and frequency as utilization increases, and by moving unneeded cores to idle state.
For its analysis, Uptime focused servers that use AMD EPYC or Intel Xeon processors, and it examined server generations from 2017, 2019, and 2021 using data from The Green Grid’s SERT database (additional details on the SERT data can be found at the end of the article).
To reduce the risk of service problems, Cisco is making it harder for organizations to use weak cryptographic algorithms when setting up authentication for OSPF packets on certain Catalyst Edge Platforms and Integrated Services Routers (ISR).
Newer versions of Cisco’s IOS XE software (Release 17.11.1 and later) no longer support those algorithms—DES, 3DES, and MD5—by default, Cisco stated in a field Notice.
Specifically, the algorithms are no longer default options for the open shortest path first v 3 (OSPFv3) protocol, which uses the IPsec secure socket API to add authentication to OSPFv3 packets that distribute routing information.
Virtualization technology provider VMware has announced that it is partnering with AMD, Samsung, and members of the RISC-V keystone community for the development and operations of confidential computing applications.
RISC-V is a hardware standards organization that is designing low-power processors; the Keystone Enclave is an open source project for building customizable trusted execution environments (TEEs).
The aim of the new partnership among VMware, AMD, Samsung and RISC-V participants is to collaborate to contribute to the open-source Certifier Framework project for confidential computing. The Certifier Framework is an open-source project started by VMware in 2022 to tackle the key barriers in the development of confidential computing applications.
The software that runs Cisco’s new Firewall 4200 Series now includes the ability to see into encrypted traffic without decrypting it, which the vendor says will allow enterprise customers to better protect hybrid and multicloud applications.
The enhanced Cisco Encrypted Visibility Engine (EVE) is part of the 7.4 version of the Secure Firewall operating system. Version 7.4 also includes zero-trust capabilities and improved application access control. The 4200 Series’ operating system also helps improve overall firewall performance – it’s twice as fast as previous high-end Cisco firewalls, the company says.
EVE, which has been available since version 7.2 of the software, takes things further than traditional firewalls because it now lets customers detect the client application within an encrypted tunnel, according to Rick Miles, vice president of product management, cloud and network security in Cisco’s security business group.
As adoption of artificial intelligence (AI) technology accelerates, IT organizations are concerned that their existing infrastructure isn’t powerful enough to keep up.
AI hardware – especially training hardware – is becoming more and more power hungry, according to Equinix, which just released its 2023 Global Tech Trends Survey.
The power draw from traditional racks in a data center is between 5 kW and 10 kW per rack. But, increasingly, newer generations of GPU-based racks are pushing power draws north of 30 kW per rack, and in some cases as high as 72 kW per rack, according to Kaladhar Voruganti, senior technologist at Equinix. “So, definitely, it's very hard to host this type of infrastructure in private data centers,” he said.
Snapshots are a very popular way to create virtual copies of an entire system in order to facilitate very quick (or even instant) recovery. A properly designed snapshot-based recovery system can recover very large volumes in just minutes and can often do so to a point in time just minutes ago. In contrast, a typical restore of such size would likely take many hours and would typically lose at least a day’s worth of data.
There are two distinct approaches when it comes to creating snapshots: copy-on-write and redirect-on-write. Let’s talk about the advantages and disadvantages associated with each method, as they will greatly determine the impact on system performance, and therefore your ability to keep snapshots for a long time.
The Linux find command can locate files based on almost any criteria that you might need. This post describes the many criteria you can use to find what you’re looking for – even when you can’t remember what you named a file or when you last changed it or added content.
Basic find syntax
The basic syntax for the find command looks like this:
$ find [starting location] [criteria] [options] [action to take]
The starting location can be a directory name (e.g., /var/log), the current directory (.), your home directory whether you’re sitting in it or not (~), or a directory relative to your current position (e.g., ./bin). You can be as specific as you want when entering the starting location.