Latest news with #IT
&w=3840&q=100)

Business Standard
an hour ago
- Politics
- Business Standard
Andhra CM welcomes PM Modi for International Yoga Day celebrations in Vizag
Naidu said that over two crore people will participate across one lakh-plus locations in Andhra Pradesh on Yoga Day, turning the event into a historic movement for health and unity Press Trust of India Amaravati Andhra Pradesh Chief Minister N Chandrababu Naidu on Friday welcomed Prime Minister Narendra Modi for the 11th International Yoga Day celebrations on June 21 at RK Beach in Vizag. Naidu said that over two crore people will participate across one lakh-plus locations in Andhra Pradesh on Yoga Day, turning the event into a historic movement for health and unity. PM Modi will participate in the International Yoga Day on Saturday in a 26-km-long corridor from RK Beach in the port city of Visakhapatnam that stretches up to Bhogapuram, where over 3 lakh people can perform Yoga simultaneously. "I warmly welcome Prime Minister Narendra Modi to RK Beach in the port city, for Yogandhra2025," said Naidu in a post on 'X', urging citizens to take part and make the event truly memorable. The CM appealed to all people of the state to join the grand celebration by finding their nearest venue and participating in large numbers. Meanwhile, IT Minister Nara Lokesh inspected a Yoga drill involving thousands of tribal students enacting Yoga postures such as Surya namaskar at Andhra University Engineering college ground in Vishakapatnam. Thousands of boys and girls donning their school uniforms followed the instructions being given by a master yoga instructor amid Vedic chants. (Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)


Hans India
2 hours ago
- Business
- Hans India
K'taka Minister Kharge writes to EAM Jaishankar seeking clarification on denial of clearance for US visit
Bengaluru: Minister for RDPR, IT and BT, Priyank Kharge, has written a letter to the External Affairs Minister S. Jaishankar on Friday seeking clarification on denial of political clearance for an official visit to the United States. In his letter, Minister Kharge stated, 'I am writing to seek a formal clarification from the Ministry of External Affairs on the denial of political clearance for my scheduled official visit to the United States from June 14-27, 2025." "The visit was planned around two significant international forums, the BIO International Convention in Boston and the Design Automation Conference (DAC) in San Francisco, as well as several official meetings with top companies, universities and institutions, where I was to represent the Government of Karnataka to explore collaborations, attract investments and create employment opportunities for the state,' he said. "In the absence of a formal communication from the Ministry outlining the reasons for denial, it becomes difficult to assess and plan future engagements of this nature. It also raises concerns about the consistency of the process, especially when the visits are official, sector-critical and in National Interest," Minister Kharge noted. 'I would, therefore, request the Ministry to kindly provide a formal explanation for the denial and consider a more transparent and consultative approach in handling such official engagements in the future,' Priyank Kharge demanded. Karnataka is the technology capital and growth engine of not just India, but the Asia-Pacific region. It has emerged as a global leader in innovation and start-ups, consistently maintaining its position at the forefront of information technology, biotechnology, electronics design and manufacturing, aerospace, space technology and Defence production, he further stated. This leadership has been built through a dynamic ecosystem powered by forward-looking State-led policies and deep global partnerships, earning Karnataka its status as a preferred destination for international collaboration and investment, Kharge stated. "Given Karnataka's unique leadership as stated above, the absence of ministerial-level representation during an official visit of such significance is a lost opportunity to further elevate India's engagement, strengthen confidence among global partners and demonstrate the seriousness with which we approach these sectors. More importantly, participation in such visits are aligned with our National priorities and would have directly supported the larger vision of 'Viksit Bharat' laid out by the Prime Minister," Kharge emphasised. Commenting on the Central government's denial of permission for his visit to the US, Minister Priyank Kharge had stated on Thursday that the NDA government was attempting to undermine Karnataka's success. Speaking to reporters at the Bengaluru International Airport after returning from a tour of Paris, Priyank Kharge had said, 'It seems they are trying to prevent Karnataka's success.' 'It is okay if they reject the permission, but there must be valid reasons for doing so. If they provide appropriate reasons, it becomes acceptable. However, the categorical denial of permission for the US visit is not right,' he stated. 'We were not going to the US to play 'Dandiya' (a traditional dance form). I will meet Chief Minister Siddaramaiah to discuss this matter. After the discussion, we will brief the media,' he said. "The Central government must provide valid reasons for refusing the visit to the US. Initially, the entire delegation was denied permission. Later, the delegation was cleared, but I was still denied permission,' Kharge said.

The Hindu
a day ago
- Business
- The Hindu
Officials told to spread awareness about ‘doorstep ration delivery for elderly'
Pushpa Amarnath, Vice-Chairperson, Karnataka State Guarantee Schemes Implementation Committee, said on Wednesday that provisions are in place for doorstep delivery of ration to cardholders aged 80 years and above and instructed Gram Panchayats to create awareness and ensure that eligible beneficiaries avail themselves of the facility. Speaking at the guarantee schemes' progress review meeting in Pandavapura, Ms. Amarnath addressed concerns related to the Gruha Lakshmi scheme. She noted that benefits to 1,422 women in the district had been withheld after being mistakenly flagged as Income Tax (IT) or GST payers. 'If it is confirmed that these beneficiaries are not actual taxpayers, the issue will be taken up at the State level and resolved, ensuring 100% implementation,' she said. Elaborating on the State government's commitment to food security, she said, 'No poor person should suffer from hunger under any circumstances. It is with this vision that the government has given top priority to the Anna Bhagya scheme.' She stressed that fair price shops must maintain both quantity and quality in food distribution and instructed officials to carry out surprise inspections to ensure compliance. 'No poor family should be denied government benefits,' Ms. Amarnath said. Deputy Commissioner Kumar said both rice and ragi are being supplied as part of the ration distribution and assured that the process will be completed within the next two days. A PAN card is not mandatory to open a bank account, he clarified. 'Necessary directions will be issued after consulting lead bank officials,' he added. Referring to 1,422 women flagged under Gruha Lakshmi, Zilla Panchayat CEO K.R. Nandini said that confirmation has been received from the GST and Income Tax departments that these women are not taxpayers. Committee member Rudrappa pointed out that linking PAN and Aadhaar during bank transactions is leading to incorrect classification of individuals as taxpayers, which needs to be addressed. During her visit, Ms. Amarnath met Jayalakshmamma, a vendor who sells flowers, fruits, and pooja items at the Pandavapura Railway Station with the help of the Gruha Lakshmi scheme. Ms. Jayalakshmamma said, 'The Gruha Lakshmi and Shakti schemes have been helpful for me. I am able to save ₹100 to ₹150 daily, thanks to the Shakti scheme. I sincerely thank the State government for the support.' The Vice-Chairperson felicitated Ms. Jayalakshmamma with a garland and congratulated her.


Tahawul Tech
a day ago
- Business
- Tahawul Tech
'It's time to stop managing storage and start managing data.' Charles Giancarlo, Pure Storage CEO
Pure Storage has introduced the Enterprise Data Cloud (EDC), a bold new standard in data and storage management simplicity that enables organizations to focus on business outcomes, not infrastructure. Fuelled by AI, data volumes are rising and business demands are evolving faster than ever. Traditional storage models create fragmentation, silos, and uncontrolled data sprawl. Organizations must adapt by shifting their mindset from managing storage to understanding how, where, and why their data is used. This will empower companies to reduce risks, costs, and operational inefficiencies. Solving the Problem of Data Management with an Enterprise Data Cloud An EDC is an industry-changing architectural approach to data storage and management. It gives organizations the ability to easily manage their data across their estate with unrivaled agility, efficiency and simplicity. With an EDC architecture, IT teams centrally manage a virtualized cloud of data with unified control — spanning on-premises, public cloud, and hybrid — enabling intelligent, autonomous data management and governance across the entire environment. Delivering the Enterprise Data Cloud with the Pure Storage Platform With an EDC architecture, organizations are better equipped to manage data at scale, reducing risk, and gaining increased control and insight across all environments. Redefining how data is delivered, governed, and consumed, the Pure Storage platform allows customers to build out their own EDC. The platform gives organizations the ability to unify data from across their estate into a virtualized cloud of data that is governed by an intelligent control plane for easy management, and delivered as a service. 'It's time to stop managing storage and start managing data. With AI increasing the potential value of enterprise data, and cyber-threats imperiling it, data storage architectures and the tools for managing data have not kept pace. Only Pure Storage has innovated an architectural approach that enables enterprise customers to manage their global data estate. Pure Fusion allows customers to create their own global Enterprise Data Cloud empowering them to manage their data with the control, automation and tracking needed to lead in a data-driven world,' said Charles Giancarlo, Chairman and CEO, Pure Storage. At the heart of this autonomous platform is Pure Fusion™, unifying storage as a pool of adaptable resources. Pure Fusion is natively built into the arrays, which are self-discoverable so they can automatically discover a broader fleet without requiring in-depth storage admin configuration. Administrators can manage the fleet from any system because every array is an endpoint. NEW: Pure Fusion with Workload Automation Pure Fusion now has presets and remote provisioning for fleetwide file, block and object. Admins have increased flexibility based on the specific needs of each workload and no longer need to pre-plan and tune deployments, which reduces risk of non-compliance and improves resiliency by ensuring that workloads are provisioned correctly from the beginning. Reducing the Risk of Human Error and Strengthening Security Today, enterprises struggle with increased risk, lack of compliance and inefficiencies resulting from manual operations around provisioning, migration and more. To eliminate these issues, automation spans the full stack of the platform with policy-driven orchestration and self-service capabilities. Built-in compliance and improved cyber resilience embedded across the platform further minimize risk through security and governance policies. These new capabilities completely redefine intelligent storage management. NEW: Workflow Orchestration The Pure Storage platform now delivers orchestrated workflows that can be deployed across the entire IT environment. Built on the thousands of existing connectors to third-party applications including Cisco, Microsoft, VMware, ServiceNow and Slack, presets and application 'recipes' can be easily deployed across storage, compute, network, database and application configurations. Customers will be able to run pre-set recipes or build custom ones specific for their environment, or utilize partner recipes for application to infrastructure automation. NEW: World Class Anomaly Threat Detection with Rubrik Security Cloud Rubrik is the first cyber recovery partner to integrate with Pure Fusion and its new workflow orchestration, streamlining cyber recovery across data environments. When Rubrik Security Cloud detects a threat, Pure Fusion automates the tagging of indelible SafeMode snapshots with Rubrik's ransomware scanning — pinpointing clean data for fast restore. For surgical or granular recovery needs, Rubrik backups provide a secondary path. Managed through Pure1 Workflow Automation, this integration reduces manual effort, improves compliance, and delivers near-zero RTO — so organizations can recover quickly and confidently with minimal disruption. NEW: CrowdStrike LogScale and Pure Storage Hunt Threats and Retain Logs CrowdStrike and Pure Storage have partnered to deliver the first validated on-premises storage solution specifically optimized for Falcon LogScale deployments. Combining Pure Storage's resilient, secure, high-performance storage infrastructure with Falcon LogScale's powerful log analytics, instant search, and security capabilities, organizations gain unmatched scalability and accelerated threat detection, hunting, investigation and response — while maintaining the control of on-premises, self-hosted environments. NEW: Pure Protect VMware to VMware Recovery Now offering recovery for VMware to VMware, in addition to recovery to AWS, on-premises to cloud, and self-service disaster recovery assessments, Pure Protect™ is designed for today's hybrid environments, streamlining recovery workflows with on-demand recovery and flexible failover options so customers can cost-effectively maintain business continuity. NEW: AI Copilot is now Generally Available The AI Copilot is an always-on assistant that delivers personalized, fleet-aware insights — with agents available for topics including security information, performance issues, digital commerce, sustainable operations, and support center. Matt Kimball, Vice President & Principal Analyst, Moor Insights & Strategy, noted, 'Pure's Enterprise Data Cloud represents a tangible shift in how enterprises manage data and represents real change at the architectural level. By abstracting the complexity of hybrid environments into a unified, policy-driven platform, Pure is enabling organizations to bring clarity and control to data management at scale. With automation, intelligence, and simplicity built in, Pure is delivering on the vision of an enterprise data cloud in a way that's actionable today. It's a bold, thoughtful approach — and one that sets a new bar for the industry.' The full benefits of an Enterprise Data Cloud require a platform created from the ground up to enable this model. Pure Storage brings together infrastructure, intelligence, and integrated services into one consistent experience.


Geeky Gadgets
a day ago
- Geeky Gadgets
VLAN Myths Busted : What They Really Do (and Don't Do)
Have you been told that VLANs are the ultimate solution to your network woes? That they'll magically secure your infrastructure, eliminate complexity, and solve all your traffic management headaches? If so, you're not alone—but you've also been misled. VLANs are powerful, yes, but they're not the all-encompassing fix they're often made out to be. In fact, many IT professionals and enthusiasts alike are wrong about what VLANs actually do and how to use them effectively. Misunderstandings about their purpose and limitations can lead to costly mistakes, inefficient networks, and even security vulnerabilities. It's time to separate fact from fiction and rethink what you know about VLANs. In this video SpaceRex uncovers the truth about VLANs—what they are, what they're not, and why they matter. You'll discover how VLANs provide logical segmentation and traffic isolation, but also why they're not a standalone security solution. We'll explore common misconceptions, such as the belief that VLANs eliminate the need for routing, and highlight practical applications that can transform your network's performance. Whether you're a seasoned network administrator or just starting to configure your first VLAN, this guide will challenge your assumptions and equip you with a clearer understanding of how to use VLANs effectively. Sometimes, the key to mastering a tool is unlearning what you thought you knew. Understanding VLAN Basics What Are VLANs? VLANs are virtualized networks that allow you to create isolated segments within a single physical network infrastructure. By assigning devices to specific VLANs, you can logically separate traffic, even when devices share the same physical hardware. This segmentation is achieved using VLAN IDs, which uniquely identify each virtual network. Devices within the same VLAN can communicate directly, while those in different VLANs remain isolated unless explicitly configured to communicate through routing. Key Characteristics of VLANs: Logical Segmentation: VLANs divide a physical network into smaller, logical networks. VLANs divide a physical network into smaller, logical networks. Traffic Isolation: Devices in separate VLANs cannot communicate without routing. Devices in separate VLANs cannot communicate without routing. Flexibility: VLANs enable dynamic network configurations without altering physical setups. This logical separation enhances network organization and simplifies management, making VLANs an essential tool for modern network design. Why VLANs Matter: Their Purpose and Benefits The primary purpose of VLANs is to optimize network management and resource utilization. By virtualizing physical switches, VLANs reduce the need for additional hardware and cabling, offering a cost-effective solution for networks of all sizes. Their benefits extend beyond cost savings, providing significant advantages in performance and organization. Traffic Isolation: VLANs create distinct boundaries within a network, making sure that traffic remains organized and controlled. VLANs create distinct boundaries within a network, making sure that traffic remains organized and controlled. Enhanced Performance: By minimizing unnecessary broadcast traffic, VLANs improve overall network efficiency and reduce congestion. By minimizing unnecessary broadcast traffic, VLANs improve overall network efficiency and reduce congestion. Cost Efficiency: The ability to segment networks without additional hardware reduces infrastructure expenses. The ability to segment networks without additional hardware reduces infrastructure expenses. Improved Scalability: VLANs simplify network expansion by allowing logical segmentation without physical reconfiguration. These benefits make VLANs a versatile solution for both small-scale and enterprise-level networks. VLANs Explained: Benefits, Limitations, and Misunderstandings Watch this video on YouTube. Advance your skills in NAS storage by reading more of our detailed content. Common Misconceptions About VLANs Despite their widespread use, VLANs are often misunderstood. Addressing these misconceptions is crucial to using VLANs effectively. VLANs as a Security Solution: While VLANs isolate traffic, they do not inherently prevent unauthorized access. Effective security requires additional measures such as firewalls, access controls, and proper configuration. While VLANs isolate traffic, they do not inherently prevent unauthorized access. Effective security requires additional measures such as firewalls, access controls, and proper configuration. VLANs Eliminate Routing Needs: Communication between VLANs requires a router or Layer 3 switch. Without proper routing and security protocols, inter-VLAN traffic can expose vulnerabilities. Understanding these limitations ensures that VLANs are used appropriately, complementing rather than replacing other network management and security tools. How VLANs Work VLANs operate by tagging network traffic with VLAN IDs, which allow switches to direct traffic to the appropriate VLAN. This process ensures that devices within the same VLAN can communicate seamlessly while maintaining isolation from other VLANs. Key Operational Features: Direct Communication: Devices within the same VLAN communicate without routing, reducing latency. Devices within the same VLAN communicate without routing, reducing latency. Inter-VLAN Routing: Traffic between VLANs is routed through a Layer 3 device, which can enforce access controls and firewall rules. Traffic between VLANs is routed through a Layer 3 device, which can enforce access controls and firewall rules. Tagged and Untagged Traffic: VLAN IDs are used to tag traffic, while untagged traffic is assigned to a default VLAN. Trunk ports play a critical role in VLAN setups by allowing multiple VLANs to share a single physical connection between switches. This reduces cabling complexity and enhances scalability, making VLANs an efficient solution for growing networks. Practical Applications of VLANs VLANs offer a wide range of practical applications, making them a valuable tool for network organization and optimization. Their versatility allows them to address various challenges in both small and large-scale environments. Device Isolation: VLANs can separate sensitive devices, such as security cameras or IoT devices, from general network traffic to enhance security. VLANs can separate sensitive devices, such as security cameras or IoT devices, from general network traffic to enhance security. Departmental Segmentation: Organizations can create distinct VLANs for different teams or departments, making sure that traffic remains organized and manageable. Organizations can create distinct VLANs for different teams or departments, making sure that traffic remains organized and manageable. Data Center Efficiency: VLANs reduce cabling requirements and improve scalability in data centers, streamlining operations. VLANs reduce cabling requirements and improve scalability in data centers, streamlining operations. Guest Networks: VLANs can provide isolated networks for guest users, making sure they do not interfere with internal traffic. By logically separating traffic, VLANs simplify troubleshooting, improve resource allocation, and enhance overall network performance. Getting Started: VLAN Configuration Basics Configuring VLANs involves setting up switches and routers to assign ports to specific VLANs. Proper configuration is essential to ensure VLANs function as intended, providing both isolation and connectivity where required. Steps for VLAN Configuration: Port Assignment: Assign switch ports to specific VLANs for tagged or untagged traffic, depending on the network design. Assign switch ports to specific VLANs for tagged or untagged traffic, depending on the network design. Trunk Ports: Configure trunk ports to carry traffic for multiple VLANs across a single link, reducing cabling complexity. Configure trunk ports to carry traffic for multiple VLANs across a single link, reducing cabling complexity. Dynamic VLANs: Use dynamic configurations to adapt to changing network requirements and improve flexibility. A well-configured VLAN setup ensures efficient traffic management and seamless communication between devices. Security Considerations for VLANs While VLANs provide traffic isolation, they are not a standalone security solution. Misconfigurations or vulnerabilities can expose networks to risks such as VLAN hopping, where attackers exploit weaknesses to bypass VLAN boundaries. Best Practices for VLAN Security: Implement strict firewall rules and access controls to regulate inter-VLAN traffic. Regularly audit VLAN configurations to identify and address potential vulnerabilities. Apply enhanced security measures to VLANs that handle sensitive or external-facing traffic. A layered security approach, combining VLANs with other protective measures, is essential to safeguard your network. Advanced VLAN Features Modern VLAN implementations offer advanced features that enhance their functionality and adaptability, making them suitable for complex network environments. Dynamic VLANs: Automatically adjust configurations to meet changing network demands, improving flexibility and efficiency. Automatically adjust configurations to meet changing network demands, improving flexibility and efficiency. Virtual Interfaces: Enable devices to operate on multiple VLANs simultaneously, optimizing resource usage and simplifying network design. These advanced capabilities make VLANs an indispensable tool for managing sophisticated networks, making sure they remain efficient and scalable as requirements evolve. Media Credit: SpaceRex Filed Under: Hardware, Top News Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.