Remove page t
article thumbnail

Technology Short Take 158

Scott Lowe

Shank Mohan explains some details on NSX-T Tier-1 Service Router (SR) placement. See this page for instructions on how to enable BBR on Debian 10. Ivan Velichko takes readers on a journey of how Kubernetes reinvented virtual machines (in a good sense). Operating Systems/Applications. Virtualization.

Linux 90
article thumbnail

WWDC roundup: Top news and best tweets from Apple’s big developer conference

GeekWire

Apple rolled out a bevy of new product features today at its annual WWDC event, held virtually for the first time due to the global pandemic. I've been "hacking" Sleep Mode for years by putting Apple Watch in "Theater Mode" when going to sleep so it doesn't turn into a lighthouse every night at the slightest movement.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 153

Scott Lowe

This is an interesting approach that, honestly, I hadn’t considered. Operating Systems/Applications. Note that this page doesn’t seem to render properly in Firefox, although Chrome and Safari seem fine.). Speaking of JWTs: they don’t score so well in Thomas Ptacek’s survey of API tokens.

Linux 74
article thumbnail

Technology Short Take 124

Scott Lowe

Ronald de Jong takes readers through using the migration coordinator to migrate from NSX-v (NSX for vSphere) to NSX-T. There’s a security vulnerability , so don’t let your smart home get hacked. I recently found this page , and thought it was a great idea—trying to bring improved security to the masses.

Linux 60
article thumbnail

Technology Short Take 157

Scott Lowe

This multi-tenancy page was recently added to the Kubernetes documentation; I say it is a welcome addition. Operating Systems/Applications. Paul Johnston explains why he believes serverless systems aren’t software systems. Virtualization. Interested in understanding how NAT Traversal works?

System 79
article thumbnail

Incident Response Plan | Roadmap to Securing Your Infrastructure

Linux Academy

User: I think I just opened a file I shouldn’t have. Good, since we’re all on the same page, why is this such a bad situation? When isolating infected workstations, they should be left powered on with the network cables removed and all network adapters disabled within the operating system.

article thumbnail

Technology Short Take 89

Scott Lowe

Russell Bryant has a post on Open Virtual Network (OVN) , a project within the Open vSwitch (OVS) community. Hmm…I didn’t find anything again this time around. beta version of containerD (see this post by Docker , or visit the GitHub page for the cri-containerd plugin ). Operating Systems/Applications.