Remove page t
article thumbnail

Technology Short Take 158

Scott Lowe

DNS, BGP, hardware-based security, Kubernetes, Linux—they’re all in here. Shank Mohan explains some details on NSX-T Tier-1 Service Router (SR) placement. See this page for instructions on how to enable BBR on Debian 10. Servers/Hardware. Operating Systems/Applications. Virtualization.

Linux 90
article thumbnail

Technology Short Take 153

Scott Lowe

Servers/Hardware. Cabling is hardware, right? This is an interesting approach that, honestly, I hadn’t considered. Operating Systems/Applications. Note that this page doesn’t seem to render properly in Firefox, although Chrome and Safari seem fine.). Virtualization.

Linux 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 124

Scott Lowe

Ronald de Jong takes readers through using the migration coordinator to migrate from NSX-v (NSX for vSphere) to NSX-T. Servers/Hardware. This article is about hardware, just not the hardware I’d typically talk about in this section—instead, it’s about Philips Hue light bulbs. Don’t ask.).

Linux 60
article thumbnail

Technology Short Take #39

Scott Lowe

I can’t help but wonder if this is the right level at which to put the abstraction layer. For those customers who won’t use a cloud management platform, I would then ask: will they benefit from a CPAL? Don’t think this “software-defined networking” thing is going to take off? Servers/Hardware.

article thumbnail

Technology Short Take 89

Scott Lowe

Russell Bryant has a post on Open Virtual Network (OVN) , a project within the Open vSwitch (OVS) community. Servers/Hardware. Hmm…I didn’t find anything again this time around. beta version of containerD (see this post by Docker , or visit the GitHub page for the cri-containerd plugin ). Virtualization.

article thumbnail

Technology Short Take 106

Scott Lowe

Servers/Hardware. Serve The Home takes a critical look at the Bloomberg Supermicro stories, debunking or at least calling into question many details of the alleged hardware hack as reported by Bloomberg. This page has a list of ways to exploit (or hack) macOS. Operating Systems/Applications. Virtualization.

article thumbnail

Best IT and Tech Blogs – Must Read Information Technology Resources 2019

Galido

These areas of IT include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. We especially like the clean design of the page which makes it easy to read and share articles. CIO Dashboard. The Next Web.

Resources 113