Home Blog Page 33

8 uncommon Linux instructions



This submit examines eight considerably uncommon Linux instructions which can be price realizing. However earlier than we get into the precise instructions, you possibly can run the command under to see whether or not these eight instructions are put in in your system. For every command, you’ll see the file system location for the command executable or a line that begins with “no command in (PATH)” the place “PATH” can be a show of your search path – the locations the place the command appears for them.

[shs@fedora ~]$  for cmd in sure shuf column pv tldr stat namei rev
do
which $cmd
executed

The output ought to appear to be this if all of the instructions are put in:

usr/bin/sure
/usr/bin/shuf
/usr/bin/column
/usr/bin/pv
/usr/bin/tldr
/usr/bin/stat
/usr/bin/namei
/usr/bin/rev

Now let’s check out what every of those instructions can do for you.

1. The sure command

The sure command will repeat the phrase “sure” or no matter string you present time and again (e.g., with a command like “sure Hiya World”) till you’ve seen sufficient and use ^c to cease the output. Be forewarned that the output will fill your display extremely quick. The extra helpful facet of this command is that you should use it to reply “sure” to a script that asks a whole lot of questions. Simply run a command like this and also you received’t must kind “sure” to no matter questions it is going to ask:

$ sure | scriptname

2. The shuf command

The shuf command will randomly shuffle the traces in a file as proven within the examples under.

$ shuf workers    $ shuf workers
Sam Adams Sally Rose
Elaine Henry John Doe
Joanne Zahn Mary Berry
Mary Berry David Bloom
Lisa Stone Joanne Zahn
John Doe Sam Adams
Ben Matson Eric Docker
Eric Docker Lisa Stone
David Bloom Elaine Henry
Sally Rose Ben Matson

Shuffled output may be helpful if you want random textual content for some activity or to check a script to make it possible for its output is what you anticipate to see.

3. The column command

The column command will show textual content in columns. Listed below are two examples of use it:

$ cat workers | column
John Doe Lisa Stone Joanne Zahn Eric Docker Ben Matson
Mary Berry Elaine Henry David Bloom Sam Adams Sally Rose
$ cat workers | column -t
John Doe
Mary Berry
Lisa Stone
Elaine Henry
Joanne Zahn
David Bloom
Eric Docker
Sam Adams
Ben Matson
Sally Rose

4. The pv command

The pv (pipe viewer) command supplies a helpful method to show the progress of information being despatched via a pipe. Right here’s an instance. Notice the output shows the progress and the velocity of the command.

$ pv largefile.zip | tar xzf -
348KiB 0:00:00 [37.4MiB/s] [============> ] 18%

5. The tldr command

The tldr command supplies a simplified man web page that shows a collection of examples on use the command you’re asking about.

]$ tldr date

date

Set or show the system date.
Extra info: https://www.gnu.org/software program/coreutils/handbook/html_node/date-invocation.html.

- Show the present date utilizing the default locale's format:
date +%c

- Show the present date in UTC, utilizing the ISO 8601 format:
date --utc +%Y-%m-%dTpercentH:%M:%SpercentZ

- Show the present date as a Unix timestamp (seconds for the reason that Unix epoch):
date +%s

- Convert a date specified as a Unix timestamp to the default format:
date --date @1473305798

- Convert a given date to the Unix timestamp format:
date --date "2018-09-01 00:00" +%s --utc

- Show the present date utilizing the RFC-3339 format (YYYY-MM-DD hh:mm:ss TZ):
date --rfc-3339 s

- Set the present date utilizing the format MMDDhhmmYYYY.ss (YYYY and .ss are optionally available):
date 093023592021.59

- Show the present ISO week quantity:
date +%V

6. The stat command

The stat command supplies significantly extra particulars on a file than the lengthy file listings supplied by the “ls -l” command. These embody the dates and instances of the newest updates and accesses.

$ stat workers
File: workers
Dimension: 112 Blocks: 8 IO Block: 4096 common file
System: 0,51 Inode: 4975 Hyperlinks: 1
Entry: (0644/-rw-r--r--) Uid: ( 1001/ shs) Gid: ( 1001/ shs)
Context: unconfined_u:object_r:user_home_t:s0
Entry: 2025-04-09 13:19:11.313070260 -0400
Modify: 2025-04-09 13:19:06.317039688 -0400
Change: 2025-04-09 13:19:06.317039688 -0400
Start: 2025-04-09 13:19:06.317039688 -0400

7. The namei command

The namei command breaks a pathname into listing ranges – displaying every listing on a separate line.

$ namei -lx /usr/bin
f: /usr/bin
Dr-xr-xr-x root root /
drwxr-xr-x root root usr
dr-xr-xr-x root root bin

$ namei `pwd`
f: /dwelling/shs
d /
d dwelling
d shs

8. The rev command

The rev command reverses traces whether or not handed to the command as customary in or saved in a file.

$ echo Hiya, World! | rev
!dlroW ,olleH
$ echo Hiya, World! | rev | rev
Hiya, World!

Each 10.0s: date fedora: Wed Apr 9 14:00:42 2025

Wed Apr 9 02:00:42 PM EDT 2025

Wrap-up

Engaged on the Linux command line may be each worthwhile and enjoyable, and there’s all the time one thing new to be taught.

Autonomous trucking developer Kodiak Robotics to go public through SPAC

0


Autonomous trucking developer Kodiak Robotics to go public through SPAC

Kodiak delivers freight each day for its prospects throughout the southern United States utilizing its autonomous expertise. | Supply: Kodiak Robotics

Kodiak Robotics Inc. yesterday introduced that it is going to be going public through a special-purpose acquisition firm, or SPAC. The developer of AI-powered autonomous car expertise agreed to be acquired by Ares Acquisition Company II, or AACT, an affiliate of Ares Administration Corp. By this mixture, Kodiak will turn into a publicly listed firm.

“It is a exceptional milestone for the Kodiak staff and reinforces our confidence within the vital worth proposition we see in our differentiated driverless expertise,” said Burnette, founder and CEO of Kodiak. “We consider getting into the general public markets will speed up our technique to broaden our present associate relationships, present our expertise to a broader buyer base, and ship enhanced options throughout the business trucking and public-sector industries.”

Based in 2018 by Don Burnette, an trade veteran, Kodiak stated it has developed expertise to handle vital challenges within the transportation trade. These embrace driver shortages, calls for for shorter supply timelines, and rising prices. The firm’s single-platform automated driving system, the Kodiak Driver, combines superior synthetic intelligence software program with modular {hardware}.

The Kodiak Driver integrates classes from business trucking and public-sector purposes to repeatedly enhance AI fashions and improve reliability and effectivity in a variety of environments, stated the Mountain View, Calif.-based firm. It claimed that prospects can simply combine its expertise with their present operations, offering a versatile, scalable, “Driver-as-a-Service” system tailor-made to their wants.

Kodiak Robotics marks current milestones

The Kodiak Driver has logged greater than 2.6 million autonomous miles in real-world circumstances. Kodiak Robotics additionally stated it developed the system for scalability and flexibility to all car sorts.

By its partnership with Atlas Power Options, the corporate stated driverless vans have surpassed 750 hours of economic driverless operations throughout West Texas’s Permian Basin and not using a human driver on board. It stated it expects to assist Atlas in additional increasing its fleet in 2025. Final month, it secured a agency dedication from Atlas to order an preliminary 100 vans.

Kodiak Robotics tailor-made its Driver-as-a-Service enterprise mannequin to fulfill buyer wants by charging both a per-truck or a per-mile recurring license charge. Right now, the corporate is incomes recurring income by means of its partnership with Atlas, and it owns and operates autonomous vans that generate a charge paid per supply.

Along with Atlas, Kodiak has collaborated with main trade gamers, together with Bridgestone, C.R. England, J.B. Hunt, Martin Brower, and Werner Enterprises. As well as, the U.S. Division of protection has awarded a contract to the corporate, which has acquired roughly $30 million to adapt its autonomous expertise for U.S. Military automobiles.

In 2024, Kodiak delivered to first driverless trucking product to a buyer. It added that its techniques can carry down prices and improve security within the business trucking and public-sector markets. By partnering with AACT and accessing the general public markets, Kodiak stated it expects to speed up its go-to-market technique.

The corporate gained a 2024 RBR50 Robotics Innovation Award for its autonomous take a look at pickup truck for the U.S. army.


SITE AD for the 2025 Robotics Summit registration.
Register now so you do not miss out!


SPAC deal grants entry to $551M

In keeping with the merger announcement, Kodiak Robotics’ pre-money fairness totaled $2.5 billion. The mixed firm can have entry to roughly $551 million of money held in AACT’s belief account at closing. That is assuming no redemptions of present AACT shares and relies on the belief worth per share as of Dec. 31, 2024.

Different institutional buyers have invested or dedicated greater than $110 million to assist the transaction. These embrace associates of Soros Fund Administration, ARK Investments, and Ares.

“We consider Kodiak’s scalable expertise, mixed with its established community, place the corporate to fulfill the evolving and rising calls for of its prospects and communities,” stated Allyson Satin, chief working officer of AACT and a associate at Ares.

The boards of administrators of each Kodiak and AACT have unanimously authorised the proposed enterprise mixture. Kodiak stated it expects the merger to shut within the second half of 2025. It’s topic to approval by AACT and Kodiak stockholders and the satisfaction or waiver of customary closing circumstances.

Upon the closing of the proposed enterprise mixture, the mixed firm might be named Kodiak AI Inc. Its widespread inventory and public warrants might be listed on a nationwide inventory alternate and commerce underneath the ticker symbols KDK and KDK WS, respectively.

Auto Manufacturers Main the US EV Revolution — CHARTS



Join CleanTechnica’s Weekly Substack for Zach and Scott’s in-depth analyses and excessive stage summaries, join our day by day e-newsletter, and/or observe us on Google Information!


Which auto manufacturers and auto teams are actually ruling the US pure electrical car (EV) market? How a lot competitors is there on the high now? Let’s roll into the numbers and charts and see.

Initially, sure, regardless of Tesla shedding gross sales 12 months over 12 months for 2 years in a row, it’s nonetheless far and away the king of the US EV market. (And, once more, this ain’t no democracy.) That stated, whereas Tesla was to this point within the lead that it was unfathomable it may ever be caught, Ford is now on the level the place it “simply” must develop its EV gross sales 5.7 instances over with a view to catch the chief. I do know — that’s nonetheless actually, actually distant. But it surely’s one thing one may think about occurring over time … if Ford was rising its EV gross sales extra notably. The Ford Mustang Mach-E elevated its gross sales by 2,018 items 12 months over 12 months and the Ford E-Transit grew by 865 items, however the F-150 Lightning’s gross sales declined by 556 items 12 months over 12 months. Ford obtained nearer to Tesla far more due to Tesla’s giant drop in gross sales.

Anyway, after Tesla’s 43.2% share and Ford’s 7.6% share, Chevrolet’s 6.5% share of the US EV market was the one different share above 5%. BMW, as a smaller premium model, does pretty nicely to attain 4.6% market share, and you then’ve obtained mass-market builders Hyundai (4.3%), Honda (3.2%), Volkswagen (3.2%), and Kia (2.9%) earlier than EV startup Rivian (2.9%, however a decrease 2.9%) and luxurious automaker Cadillac (2.7%). The remainder, nicely, do they deserve point out at such low volumes?

I believe most attention-grabbing there’s how shortly Honda shot up from being a zero-EV-sales laggard to sixth within the rating. It’s model status and buyer loyalty pushed it ahead shortly, regardless of the Honda Prologue really being a Chevy Blazer EV beneath (and with the Prologue even beating the Blazer EV).

Taking a look at auto teams or alliances collectively, Tesla stays in the identical place, after all, however GM appears far more vital and harmful (to Tesla’s #1 spot) after consolidating all of its manufacturers and EV fashions. In truth, GM’s 10.8% share is strictly ¼ of Tesla’s 43.2% share. May this competitors get attention-grabbing someday? I don’t know. We’re a good distance off from that, however a minimum of its a dialogue that could possibly be had now. What GM wants, although, is to double the output of a few of its extra widespread fashions (most notably, the 2024 CleanTechnica Automobile of the 12 months Chevy Equinox EV) and in addition roll out some extra widespread electrical fashions. Then it may get attention-grabbing.

Discover that we’re speaking about GM not Ford now, as Ford Motor Firm’s obtained a narrower model and EV mannequin portfolio. Ford depends utterly on … Ford for its EV gross sales. It’s a bit bizarre in a market the place luxurious car manufacturers have the very best proportion of their gross sales coming from EVs that Lincoln has been sitting on its fingers, however that is the place we’re.

In truth Ford Motor Firm isn’t even third, with Hyundai–Kia taking the final podium place. Hyundai and Kia get a variety of reward for his or her EVs, and they’re doing “higher than the remainder,” however I’ve been disillusioned with these automakers for years that they don’t push out their EV fashions extra. They’ve potential, and everyone knows that it’s those with potential who can actually allow you to down. It’s good to see Hyundai–Kia in third, not tenth, however I believe we may actually see much more EV gross sales from Hyundai and Kia in the event that they put a bit of extra effort into it.

Volkswagen Group rounds out the highest 5, being the German model of GM with a boatload of manufacturers to profit from. It’s not doing horribly, simply beating a variety of different giant automakers because of its extensive and compelling lineup, nevertheless it may definitely be doing significantly better and is one other firm I hoped to see a bit of extra from. I’d like to see Volkswagen Group — like Ford Motor Co. and Hyundai–Kia — rise above 30,000 gross sales 1 / 4 quickly. Subsequent quarter? Although, after all, they’re now on the whims of a tariff-crazed lunatic who’s extra intent on firing individuals, deporting individuals, and elevating residing prices for individuals than really doing one thing to assist Individuals. We’ll see what the remainder of the 12 months brings, however I suppose I can’t say I’m hopeful.

Whether or not you may have solar energy or not, please full our newest solar energy survey.




Have a tip for CleanTechnica? Need to promote? Need to counsel a visitor for our CleanTech Discuss podcast? Contact us right here.


Join our day by day e-newsletter for 15 new cleantech tales a day. Or join our weekly one if day by day is simply too frequent.


Commercial



 


CleanTechnica makes use of affiliate hyperlinks. See our coverage right here.

CleanTechnica’s Remark Coverage




ssh – How can 1gig hyperlink be slower to WAN than 10gig hyperlink, on the identical machine?


I am utilizing the next command to check community pace to my.distant.server:

dd if=/dev/random | pv -L 39M | ssh my.distant.server "dd of=/dev/null"

Once I set en0 to 10Gb, efficiency drops considerably (15MB/s add).
However once I set en0 to 1Gb, I get significantly better outcomes (56MB/s add).

This occurs regardless of the 10Gb hyperlink working completely in each different state of affairs!

  • 10Gb performs reliably, giving me round 900MB/s through Samba, and over 10Gbps to an area server utilizing iperf
  • netstat -ibn | grep -i en0 exhibits no errors or collisions on both 1Gb or 10Gb
  • iperf to my.distant.server exhibits anticipated efficiency (56MB/s add) — it is solely SSH that’s gradual!

I’ve analyzed tcpdump captures, and this is what I discovered when utilizing 10Gb:

  • SACK packets seem → packets are arriving out of order on the server (this does not occur on 1Gb)
  • packet measurement is smaller (1440 bytes with 10Gb vs 8640 with 1Gb)

The shopper is macOS. I in contrast settings utilizing sysctl -a and ifconfig en0 for each 10Gb and 1Gb, and confirmed no sudden variations when switching between them.

I’ve examined a number of Mac Studios (together with a brand-new M3 Extremely) utilizing each built-in Ethernet and an OWC exterior Thunderbolt 10Gb adapter. All of them seem to make use of the identical driver:
AppleEthernetAquantiaAqtionInterface

May this sort of conduct be attributable to one thing aside from a buggy community driver? Are there any concepts or workarounds I may strive?

(For now, my plan is to make use of two totally different NICs: one 10GbE for LAN and one 1GbE for WAN.)

Some extra weirdness from testing:

  • When connecting through the VPN IP of the distant server, 10Gb efficiency improves barely (25MB/s vs 15MB/s), however continues to be worse than 1Gb
  • Once I use Cyberduck (SFTP over port 22) to connect with the identical my.distant.server, I constantly get anticipated speeds (50+MB/s)

Issues I’ve tried:

  • sshhpn enabled on each shopper and server (sure, I get the “warning: enabled none cipher” message exhibiting it’s energetic)
  • throttling SSH utilizing pv -L
  • guaranteeing dd makes use of symmetric bs=… choices on each ends
  • sadly, I don’t have entry to non-Apple machines with 10Gb NICs for testing
  • tweaking each related sysctl setting I may discover or that was advisable in macOS efficiency tuning guides

Cisco Safe Consumer’s Cloud Transformation


It began over 16 years in the past. Cisco Safe Consumer, then referred to as AnyConnect, rapidly rose to prominence because the go-to VPN answer for organizations worldwide. It grew to become synonymous with dependable, safe distant connectivity, serving to companies bridge the hole between their groups and the assets they wanted.

However know-how by no means stands nonetheless. As threats advanced and workforces grew to become extra dynamic, so did Cisco Safe Consumer. Over time, it remodeled from a trusted VPN shopper right into a multifaceted safety software, providing a variety of superior providers by means of its modular design. Its potential to adapt to trendy calls for made it an indispensable a part of enterprise safety.

For a lot of its journey, deploying Cisco Safe Consumer adopted a well-recognized sample. Directors used tried-and-true strategies: pre-deploying through software program administration programs, delivering it by means of Cisco VPN headends, or instantly putting in it on particular person endpoints. These strategies have been dependable and efficient, standing the take a look at of time as organizations relied on them to maintain customers linked and safe.

However, as with the shopper itself, the best way organizations handle and deploy it’s evolving. Enter the following chapter within the Cisco Safe Consumer story—the place cloud-first methods, built-in instruments, and streamlined deployment pave the best way for a brand new period of endpoint safety.

Revolutionizing Endpoint Safety: Cisco Safe Consumer and XDR

Managing endpoint safety in at present’s panorama isn’t any small job. Enter the Cisco Safe Consumer, now deployable and manageable by means of Consumer Administration in Cisco XDR. For these not utilizing XDR, the standalone Safe Consumer Cloud Administration (CSCCM) software gives comparable performance, with a shared, easy deployment course of.

How Cisco XDR Transforms Your SOC

Sam, a Safety Analyst, and Remi, an Incident Responder, work in a busy Safety Operations Heart (SOC), always managing threats and incidents. They’re typically overwhelmed by the quantity of alerts and the complexity of noticed assaults. However with Cisco XDR, their roles grow to be extra centered and efficient.

Cisco XDR gives Sam with a unified view of safety throughout Cisco and third-party sources, eliminating blind spots. Sam now not wants to change between instruments or fear about lacking essential threats. With AI-driven insights, Cisco XDR hurries up detection and response, serving to Sam establish potential dangers sooner and extra precisely.

When an incident happens, Remi advantages from Cisco XDR’s integration with MITRE ATT&CK mappings, which gives detailed context concerning the assault. This helps Remi perceive the techniques and methods being utilized by adversaries, permitting him to rapidly shut safety gaps and reply with precision.

The ability of noise discount and job automation in Cisco XDR additionally helps Sam and Remi keep centered. By filtering out irrelevant alerts and automating routine duties, they’ll spend extra time addressing high-priority incidents, enhancing their productiveness and response occasions.

For Sam and Remi, Cisco XDR isn’t only a software—it’s a game-changer that makes their SOC extra environment friendly, proactive, and higher outfitted to deal with the evolving risk panorama.

Simplified Administration

The mixing of AMP for Endpoints (Cisco Safe Endpoint) into Cisco Safe Consumer means fewer shoppers to handle and a extra intuitive interface. Shifting from SecureX to XDR or CSCCM is seamless, guaranteeing a easy transition with out shedding essential capabilities.

With Cisco Safe Consumer in XDR, you’re not simply managing endpoints—you’re constructing a safe, environment friendly, and resilient future.

Configuration Familiarity for directors

Lin, the Endpoint Administrator, is tasked with deploying the Cisco Safe Consumer to distant endpoints. She begins by both creating new profiles utilizing the built-in profile editor or importing pre-configured profiles from earlier deployments.

Subsequent, Lin units up the deployment configuration by choosing the required modules—such because the AnyConnect VPN module, Umbrella, and NVM—and associates the suitable profiles with every module to be put in.

The deployment ends in two installer choices:

  • Community Installer: A light-weight installer that features solely the Cloud Administration shopper. Throughout set up, it robotically fetches the remaining mandatory parts.
  • Full Installer: A bigger package deal that incorporates all configured profiles and modules, together with the Cloud Administration shopper, for full set up.

After choosing the suitable installer choice, Lin downloads the installer and distributes it to the endpoints utilizing the identical technique as every other software program deployment. This might contain a programs administration answer like Microsoft Endpoint Configuration Supervisor (MECM), previously referred to as SCCM; Cellular Gadget Administration (MDM), or Enterprise Mobility Administration (EMM) options.

Perception into your cloud-deployed endpoints

A key benefit of cloud deployment—whether or not by means of XDR or CSCCM—is the Consumer Stock. Lin, the Endpoint administrator, advantages from the truth that endpoints deployed through the cloud commonly sync with the administration platform, guaranteeing the stock stays correct and updated in actual time.

The Purchasers web page gives Lin a centralized, detailed view of all Safe Consumer gadgets throughout the group. With each chart and desk codecs, it gives an intuitive overview of deployed endpoints, making monitoring simpler and streamlining the administration of the whole endpoint ecosystem.

Managing Endpoints with Ease: A Unified View

One of many key benefits of cloud deployment—whether or not utilizing XDR or CSCCM—is the Consumer Stock. Equipment, the IT administrator, and Lin, the community administrator, each profit from this function, as endpoints deployed through the cloud robotically sync with the administration platform. This ensures the stock stays correct and updated in actual time, offering them with precious insights into endpoint standing and safety.

The Purchasers web page gives Equipment and Lin a centralized, detailed view of all Safe Consumer gadgets inside the group. With each chart and desk codecs, it gives an intuitive, at-a-glance overview of deployed endpoints. This simplifies monitoring and helps streamline the administration of the whole endpoint ecosystem, enabling each directors to effectively coordinate and deal with any points that come up.

Ongoing Administration of Deployments:

After the preliminary deployment, Equipment, the IT administrator, and Lin, the endpoint administrator, might establish a gaggle of endpoints that want extra modules or up to date profiles for the present configurations. To deal with this, Lin can create a brand new deployment, choose the related shoppers from the stock, and use the Transfer Deployment function. As soon as the chosen endpoints connect with the cloud once more, they may robotically transition to the brand new deployment and set up the up to date modules and profiles.

This streamlined course of ensures that endpoints stay present with the most recent configurations, enabling the crew to rapidly reply to evolving necessities with out the necessity for handbook intervention.

When and When To not Make Modifications

Each endpoint could have a Cloud Administration Module and a Cloud Administration Profile. The Cloud Administration (CM) profile directs the endpoint to how typically to contact the cloud for check-ins. If there have been any modifications to the endpoint’s present deployment, these modifications will likely be utilized in the course of the check-in course of.

The check-in Interval units how typically every Safe Consumer endpoint checks in with the cloud for brand spanking new product variations and up to date profile settings. Shorter check-in intervals end in extra community site visitors, whereas longer intervals imply that your endpoints is not going to obtain updates as rapidly.

The Product Replace Window lets you select to let product updates occur every time they’re obtainable or specify a time vary for them to be put in. This lets you limit updates to your off-hours or extra handy occasions.

Centralized Entry to Important Logging and Gadget Occasions

The Audit Logs gives an in depth document of actions taken within the system, capturing who carried out every motion, when, and the way. It tracks duties comparable to creation, modification, and deletion carried out by directors. Every entry consists of important info—IP deal with, motion (message), operation sort, goal, timestamp, and person particulars—providing clear visibility into current modifications and admin exercise inside the system.

The Gadget Occasions web page gives key info comparable to Host Identify, Final Up to date timestamp, OS Sort, OS Model, and UID. Increasing every occasion entry reveals deployment exercise particulars, together with Occasion Time, Occasion Sort, Timestamp, and IP Handle. Moreover, admins can view full endpoint particulars by pivoting by means of the clickable UID hyperlink.

Conclusion

Cisco Safe Consumer has advanced from a standard VPN answer right into a unified, complete safety shopper that adapts to various safety wants with its modular structure. This single-agent method not solely enhances operational effectivity by consolidating a number of safety features but in addition simplifies deployment and administration for Safety, Community, and IT groups.

With new cloud-based administration choices, comparable to Consumer Administration in Cisco XDR and the standalone Cisco Safe Consumer Cloud Administration (CSCCM) software, directors achieve larger flexibility and management over deployment workflows. These improvements underscore Cisco’s dedication to delivering sturdy, scalable, and versatile safety options tailor-made to the complexities of at present’s dynamic IT environments.

References


We’d love to listen to what you assume. Ask a Query, Remark Under, and Keep Linked with Cisco Safe on social!

Cisco Safety Social Channels

Instagram
Fb
Twitter
LinkedIn

Share: