Digging for DNS answers on Linux

Dig is a powerful and flexible tool for interrogating DNS name servers. It performs DNS lookups and displays the answers that are returned from the name servers that were involved in the process along with details related to the search. System and DNS administrators often use dig to help troubleshoot DNS problems. In this post, we’ll take a deep dive into how it works and see what it can tell us.To get started, it’s helpful to have a good mental image of how DNS or domain name system works. It’s a critical part of the global Internet because it provides a way to look up and, thereby, connect with servers around the world. You can think of it as the Internet’s address book and any system that is properly connected to the Internet should be able to use it to look up the IP address of any properly registered server.To read this article in full, please click here …

Read more

How to loop forever in bash on Linux

There are a number of ways to loop forever (or until you decide to stop) on Linux and you can do this on the command line or within scripts.The for and while commands make the job quite easy. There are only a few things to keep in mind with respect to syntax and tactics.[ Also see Invaluable tips and tricks for troubleshooting Linux. ]
Using while
One of the easiest forever-loops involves using the while command followed by the condition “true”. You don’t have to bother with logic like while [ 1 -eq 1 ] or similar tests. The while true test means the loop will run until you stop it with CTRL-C, close the terminal window or log out. Here’s an example:To read this article in full, please click here …

Read more

COVID-19 fallout: Q1 enterprise data center sales dip, but public cloud grows

This should come as no surprise, but spending on data-center hardware and software dipped in Q1 and cloud sales grew, but neither as much as you would think.Q1 figures from Synergy Research Group show that spending on enterprise software and hardware shrank globally by a modest 2% year on year to $35.8 billion, with the biggest non-cloud players, such as Microsoft, Dell, HPE, Cisco and VMware, down 4%.[Get regularly scheduled insights by signing up for Network World newsletters.]
When it comes to public cloud infrastructure, sales rose 3% to $9.66 billion year on year. The top vendors were Chinese ODMs that hyperscalers like: Dell, Microsoft, Inspur and Cisco.To read this article in full, please click here …

Read more

BrandPost: Shared Responsibility for Cloud Security: What You Need to Know

The COVID-19 pandemic changed business practices worldwide. The traditional workplace transformed; for many, the “new norm” is now a home office and a virtual workplace with employees holding meetings via video teleconferencing tools and communicating through email and applications like Slack, Microsoft Teams, and Google Hangouts. The cloud is busier than ever, making cloud security more important than ever.In the public cloud, there’s a shared responsibility between the Cloud Service Provider (CSP) and the user (you). Security for things like data classification, network controls, and physical security need clear owners. The division of these responsibilities is known as the shared responsibility model for cloud security. Check out this chart to see where the responsibilities lie within different cloud environments.To read this article in full, please click here …

Read more

BrandPost: Verizon DBIR: Ransomware and the Public Sector

Verizon’s Data Breach Investigations Report (DBIR) provides an annual analysis of security incidents and data breaches. The information and analysis are categorized by sector. Public sector organizations are key contributors to the report each year.The report highlights that “the Public Administration sector is an illustration of what good partner visibility into an industry looks like. The bulk of our data in this vertical comes from partners inside the United States federal government who have a finger on the pulse of data breaches inside Public Administration.”The 2020 DBIR found that ransomware continues to be a top cyber-attack and that this type of attack disproportionately affects the public administration sector (60% of malware vs. 27% of malware in all sectors). Fortunately, it’s possible to limit the success of ransomware attacks through good cyber hygiene and defensive strategies.To read this article in full, please click here …

Read more

Dell launches servers for HPC and AI with updated VMware software

Dell Technologies launched two servers for high-performance computing (HPC) and artificial intelligence (AI) that include an updated version of VMware’s virtualization software and are available through Dell’s On Demand flexible consumption model.First up is the Dell EMC Ready Solutions for AI: GPU-as-a-Service. Yes, that is its full title. This server offers virtual GPU pools by leveraging VMware vSphere 7 with Bitfusion. Bitfusion is a hardware virtualization technology VMware acquired last year. The new Ampere architecture from Nvidia supports GPU partitioning but the older generations did not, which is where Bitfusion comes in.To read this article in full, please click here …

Read more

How to backup essential data but not the garbage

Something as simple as how you tell your backup product which files and databases to backup can have a massive impact on your recoverability. Proper backup selection is essentially a balance between ensuring that everything that should be backed up is indeed backed up, while also trying not to backup worthless data.Physical server inclusion
Virtually all backup products require some initial installation and configuration at the level of a physical server. This means that for any of the tactics mentioned in this article to work, one must first install the appropriate software and authorization on each physical server in the data center. This means every VMware or Hyper-V server (not to be confused with each VM on those servers), every physical UNIX or Windows server, and any cloud services that are being backed up. Someone must make that initial connection and authentication before the backup system can perform its magic.To read this article in full, please click here …

Read more

BrandPost: Huawei iBMC Supercharges Intelligent Management of Servers

A server is a high-performance computer that provides external services in a network environment. To provide quality services, servers need to deliver and maintain high performance for a long time using effective management. Currently, most mainstream servers run on the x86 architecture, but more people are realizing that a single architecture fails to meet today’s soaring computing requirements. With more enterprises accelerating their digital transformation, the demand for computing power is higher than ever, and this trend is generating tremendous market activity.According to IDC, the global market space of computing power in 2016 was 9.5 million servers, and this figure is estimated to reach 14.2 million by 2023. When tens of thousands of high-performance servers are deployed in data centers, conventional manual maintenance cannot detect and resolve issues in a timely manner. As a result, it is imperative for enterprises to achieve efficient and intelligent O&M management for their mass cloud-based services. This has impacted the server industry, which in recent years has undergone huge changes. High performance and low cost are no longer the only concerns for enterprises. Instead, enterprises are also looking to intelligent and efficient device O&M to ease pressure on O&M personnel and reduce running costs.To read this article in full, please click here …

Read more

BrandPost: Huawei Ascends Technology in an Intelligent Era: Winning with an Ecosystem

Artificial Intelligence (AI) is no longer just a catch phrase, but is slowly becoming a new type of general computing technology. Inevitable it is one of the key drivers of technological innovation and thus social and economic revolution. Huawei never stops investing in AI research and development of such capacities to support ground-breaking cooperation among 5G, cloud, edge, and devices, reshaping various industries, such as financial services, transportation, power supply, manufacturing and more.Such technologies usually require collaboration to obtain fruitful results. For that, Huawei has been spending a whole lot of efforts in building an ecosystem which include academia, industries and relevant communities to AI development, which advances both technology and those sectors together. With an open approach, opening up hardware, making software open-source and pursuing shared success with our partners.To read this article in full, please click here …

Read more

What is Wi-Fi and why is it so important?

Most people are aware of the wireless icon symbol on a computer or smartphone that indicates a successful wireless LAN connection, but fewer understand the origins of the technology that has been dubbed as Wi-Fi.Interestingly, the term Wi-Fi originally did not represent the technology itself, but rather was a branding term devised to promote and support interoperability between different wireless LAN systems. Wi-Fi was never a shortened version of wireless fidelity; it was  just a pun on the word hi-fi (high fidelity), an homage to high-quality audio technology.The term Wi-Fi was created by the Wireless Ethernet Compatibility Alliance, which later became the Wi-Fi Alliance. In April 2000, the group announced the first set of Wi-Fi Certified products, starting with IEEE 802.11b products. Now more than 20 years later, there are more than 15 billion Wi-Fi products in use around the world, according to the alliance.To read this article in full, please click here …

Read more