By: Lilly Fleming, Healthcare Marketing, HPE Aruba Networking.
Healthcare organizations have undergone substantial digital transformation over the last decade. There are more medical and personal IoT devices in the healthcare landscape than ever before, and this trend is not slowing down. The healthcare IT organization faces the difficult challenge of added complexities, including how they prioritize investments in digital tools, technology, and analytics. Channel Partners can help their healthcare customers meet the needs of their patients and stakeholders by enabling them to overcome these challenges.
To read this article in full, please click here
//m.amiribrahem.com/article/3702114/unlock-the-potential-for-naas-in-healthcare.html tk.rss_allBy: Scott Raynovich,
As end users adopt software-defined technology that can help them more easily deploy and manage secure networks, they are increasingly looking to the technologies known as secure access service edge (SASE) and secure service edge (SSE).
But digging deeper into these acronyms, it gets more complex. SASE and SSE products aren’t exactly product categories per se – but platforms for integrating a variety of network security functions. These wide-ranging features might include all the most popular features/acronyms, including Advanced Threat Protection (ATP), Cloud Access Security Broker (CASB), Data Loss Prevention (DLP), Firewall-as-a-Service (FWaaS), Intrusion Detection System/Intrusion Prevention System (IDS/IPS), Next-Generation Firewall (NGFW), Software-Defined Wide-Area Networking (SD-WAN), Secure Web Gateway (SWG), Unified Threat Management (UTM), and Zero Trust Network Access (ZTNA). The integration of these functions is a key driving force behind the growth of the SASE market.
Enterprises over the past several years have embraced SD-WAN for many reasons, including the flexibility of cloud architecture, enhanced security, centralized management of distributed locations, and improved application availability and performance. In turn, the popularity of SD-WAN has helped propel interest in secure access service edge (SASE), a network architecture that converges connectivity and security services.
The mkdir command can do more than create a single directory. It can create multiple directories at once and can even create an entire directory structure with a single command. The required command will be a tad complex, but not particularly challenging.
NOTE: If you try to set up a multi-level directory structure with a command like the one shown below, it won't work if the initial directories ("this" and "that") don't already exist.
$ mkdir this/that/the_other
mkdir: cannot create directory ‘this/that/the_other’: No such file or directory
Add a -p (for "parents") and the missing directories will be created and your this/that/the_other directory structure will be set up in your current directory as intended.
Private 5G/LTE networks for the enterprise are becoming increasingly common, but a new forecast from tech analyst firm IDC has found that several headwinds exist for the technology, which could slow its adoption over the next 18 to 24 months.
The report, authored by IDC research manager Patrick Filkins, predicted that private cellular networking infrastructure sales will grow from $2.4 billion in global revenue this year to $5.3 billion in 2027.
The use cases for private cellular networks are numerous and varied, according to IDC, encompassing everything from wide-area applications like grid networks for utility systems and transport networks to local networks for manufacturing facilities or warehouses.
The adoption of artificial intelligence is changing the way servers are being procured while having a quick and positive impact on firms that deploy AI technologies, according to a pair of research reports from Omdia.
In its upcoming cloud and data center market report, the research firm predicts a reduction in the number of server shipments for the first time since 2007. However, the server drop in 2007 was due to a global economic crisis. The current shift in server buying has a more positive spin.
Omdia found that demand for compute resources remains high. However, it also reports that demand for more expensive servers with specialized hardware for AI model training (translation: GPUs) are being prioritized over the typical enterprise server with just a CPU.
Network connectivity and security are key areas for IT investment as well as potential barriers to global success, according to new research.
Nearly half of CIOs claim that establishing and managing connectivity in new markets is the single most critical factor when it comes to ensuring successful global expansion, according to Expereo, which surveyed 650 large enterprise and mid-market CIOs across Asia, Europe and North America for its research. In addition, 49% of CIOs report that their board views global connectivity as “a business-critical asset to growth.”
China’s Ministry for Industry and Information Technology has said it wants to improve the country’s manufacturing capabilities, singling out the production of advanced semiconductor materials and automotive chips as areas that are in need of improvement.
In its recently released Opinions on Manufacturing Reliability Improvement report, the department said it was putting forward a plan that would make up for the shortcomings of basic product reliability and improve the quality of core components in three industries: machinery, electronics, and automotive.
If you’re fairly new to Linux, you might need some help getting started on the command line. But you made it here, so let’s run through a number of ways that you can get comfortable and up to speed fairly quickly.
Man pages
Every Linux command should have a "man page" (i.e., manual page) – an explanation of what the command does, how it works and the options that you can use to specify what you want the command to show you. For example, if you wanted to see the options for formatting the output of the date command, you should look at the man page with the command “man date”. It should among other things, show you the format of the date command like this:
Servers can consume more than half of the energy in modern data centers, which makes server efficiency attractive to companies looking to hit carbon-neutral sustainability targets. Plus, reducing energy usage can save money.
To help reach that goal, here are five ways to boost server efficiency, according to recent research from the Uptime Institute, which is focused on improving the performance, efficiency, and reliability of business-critical infrastructure.
- Upgrade to a newer server generation. For decades, server energy efficiency has consistently improved thanks to improved efficiency of processors that power them.
- Pick servers with high compute capacity as measured in number of transactions per second. Those are the most energy efficient.
- Go for high core count. In general, efficiency improves with the number of cores, although there is some tapering off at the highest end.
- Be aware that while a server can be more energy efficient, its actual overall power consumed (Watts) can increase even as its efficiency (transactions per second per Watt) increases.
- Embrace power-management features in two ways: by reducing core CPU voltage and frequency as utilization increases, and by moving unneeded cores to idle state.
For its analysis, Uptime focused servers that use AMD EPYC or Intel Xeon processors, and it examined server generations from 2017, 2019, and 2021 using data from The Green Grid’s SERT database (additional details on the SERT data can be found at the end of the article).
To reduce the risk of service problems, Cisco is making it harder for organizations to use weak cryptographic algorithms when setting up authentication for OSPF packets on certain Catalyst Edge Platforms and Integrated Services Routers (ISR).
Newer versions of Cisco’s IOS XE software (Release 17.11.1 and later) no longer support those algorithms—DES, 3DES, and MD5—by default, Cisco stated in a field Notice.
Specifically, the algorithms are no longer default options for the open shortest path first v 3 (OSPFv3) protocol, which uses the IPsec secure socket API to add authentication to OSPFv3 packets that distribute routing information.
Virtualization technology provider VMware has announced that it is partnering with AMD, Samsung, and members of the RISC-V keystone community for the development and operations of confidential computing applications.
RISC-V is a hardware standards organization that is designing low-power processors; the Keystone Enclave is an open source project for building customizable trusted execution environments (TEEs).
The aim of the new partnership among VMware, AMD, Samsung and RISC-V participants is to collaborate to contribute to the open-source Certifier Framework project for confidential computing. The Certifier Framework is an open-source project started by VMware in 2022 to tackle the key barriers in the development of confidential computing applications.
The software that runs Cisco’s new Firewall 4200 Series now includes the ability to see into encrypted traffic without decrypting it, which the vendor says will allow enterprise customers to better protect hybrid and multicloud applications.
The enhanced Cisco Encrypted Visibility Engine (EVE) is part of the 7.4 version of the Secure Firewall operating system. Version 7.4 also includes zero-trust capabilities and improved application access control. The 4200 Series’ operating system also helps improve overall firewall performance – it’s twice as fast as previous high-end Cisco firewalls, the company says.
EVE, which has been available since version 7.2 of the software, takes things further than traditional firewalls because it now lets customers detect the client application within an encrypted tunnel, according to Rick Miles, vice president of product management, cloud and network security in Cisco’s security business group.
As adoption of artificial intelligence (AI) technology accelerates, IT organizations are concerned that their existing infrastructure isn’t powerful enough to keep up.
AI hardware – especially training hardware – is becoming more and more power hungry, according to Equinix, which just released its 2023 Global Tech Trends Survey.
The power draw from traditional racks in a data center is between 5 kW and 10 kW per rack. But, increasingly, newer generations of GPU-based racks are pushing power draws north of 30 kW per rack, and in some cases as high as 72 kW per rack, according to Kaladhar Voruganti, senior technologist at Equinix. “So, definitely, it's very hard to host this type of infrastructure in private data centers,” he said.
Snapshots are a very popular way to create virtual copies of an entire system in order to facilitate very quick (or even instant) recovery. A properly designed snapshot-based recovery system can recover very large volumes in just minutes and can often do so to a point in time just minutes ago. In contrast, a typical restore of such size would likely take many hours and would typically lose at least a day’s worth of data.
There are two distinct approaches when it comes to creating snapshots: copy-on-write and redirect-on-write. Let’s talk about the advantages and disadvantages associated with each method, as they will greatly determine the impact on system performance, and therefore your ability to keep snapshots for a long time.
The Linux find command can locate files based on almost any criteria that you might need. This post describes the many criteria you can use to find what you’re looking for – even when you can’t remember what you named a file or when you last changed it or added content.
Basic find syntax
The basic syntax for the find command looks like this:
$ find [starting location] [criteria] [options] [action to take]
The starting location can be a directory name (e.g., /var/log), the current directory (.), your home directory whether you’re sitting in it or not (~), or a directory relative to your current position (e.g., ./bin). You can be as specific as you want when entering the starting location.
US semiconductor manufacturers such as Nvidia and AMD will face new controls on exports of their chips to China, with the US Department of Commerce set to announce the restrictions as early as July, according to a report in the Wall Street Journal.
In 2022, after the US placed new restrictions on exports to China of chips used in AI systems, Nvidia said it would offer a new export-compliant advanced A800 chip to the country, in addition to making changes to its H100 so that it would also comply with the changes to regulations.
However, new restrictions could see sales of A800 chips to China banned unless Nvidia obtains a special US export license, according to the Wall Street report, citing people familiar with the situation.
By: Gabriel Gomane, Sr Product Marketing Manager, HPE Aruba Networking.
The advent of digital transformation has brought about a complete overhaul in the workplace and revolutionized the way we access applications. This transformation can be attributed to four pivotal factors: the emergence of hybrid working, the migration of business applications to the cloud, the rapid proliferation of IoT devices, and the growing concerns surrounding cybersecurity risks.
To enable this transformation, organizations can deploy SASE and tailor their SASE journey to align with their specific security and business goals. They can start their SASE journey by securing remote workers with ZTNA or they can begin by addressing application performance issues in branches with SD-WAN. There are no right or wrong choices, but it’s rather a matter of prioritizing specific use cases.
Cisco again opened its checkbook this week and snatched up privately held broadband-network monitoring company SamKnows for an undisclosed amount.
Founded in 2008, the London-based firm uses a global network of software agents located in everything from home systems to mobile devices and service provider netoworks to get a real-time measurement of internet performance and customer experience. Through a central dashboard the company can analyze the results and identify faults and the root cause of problems to help with remediation.
SamKnows technology will be integrated into Cisco’s ThousandEyes cloud-based network intelligence software that analyzes everything from the performance of local and wide-area networks to ISP, cloud, and collaboration-application performance to the health of the internet.
PuTTY is a great tool for connecting between systems of different types. In case you’re not familiar with the tool, the name has no connection to Silly Putty. Instead, the capitalization of the TTY part of the name suggests its connection with the acronym tty. It provides an easy way to log into a Linux system from Windows as well as many other systems.
Say you want to log into your Linux system from a Windows system. This tool will allow you to set up a connection (IP address, host name, etc.) and control the size, colors and font to be used. This post explains how to set PuTTY up to optimize your view of the Linux command line. PuTTY was actually born on Windows to make this kind of connection possible.
The reliability of services delivered by ISPs, cloud providers and conferencing services (a.k.a. unified communications-as-a-service (UCaaS)) is an indication of how well served businesses are via the internet.
ThousandEyes is monitoring how these providers are handling the performance challenges they face. It will provide Network World a roundup of interesting events of the week in the delivery of these services, and Network World will provide a summary here. Stop back next week for another update, and see more details here.
Cato Networks’ new deep learning algorithms are designed to identify malware command and control domains and block them more quickly than traditional systems based on domain reputation, thanks to extensive training on the company’s own data sets.
Cato, a SASE provider based in Tel Aviv, announced the new algorithmic security system today. The system is predicated on the idea that domain reputation tracking is insufficient to quickly identify the command servers used to remotely control malware. That’s because most modern malware uses a domain generation algorithm (DGA) to rapidly generate pseudorandom domain names — which the deployed malware also has a copy of.
Japanese semiconductor equipment maker JSR has accepted a buyout offer of $6.4 billion (909.3 billion yen) from the Japanese government, in the country’s latest move to bolster its domestic chip industry.
JSR is the world's leading maker of photoresists , the chemicals used for the process of printing circuit designs on chip wafers. It is also one of three Japanese companies that controls the world’s supply of fluorinated polyimide and hydrogen fluoride, compounds which are used to make the semiconductors found in supercomputers, AI-harnessing data centers and iPhones.
Under the plan, Japan Investment Corp (JIC) – state-backed investment enterprise of Japan, specializing in private equity and venture capital investments primarily in Japan – would offer JSR $31.25 (4,350 yen) per share, a price that represents a 35% premium on the company’s share price when the markets closed on Friday. The resulting deal will see the company go private and provide Japan with a greater control over a technological process of which it is already a global leader.