article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Rory McCune explains Kubernetes authentication.

Linux 112
article thumbnail

The Back-to-Basics Readings of 2012 - All Things Distributed

All Things Distributed

The Back-to-Basics Readings of 2012. By Werner Vogels on 18 December 2012 10:00 PM. Aug 11 - " On the Naming and Binding of Network Destinations ", Saltzer, J. Nov 9 - Using Encryption for Authentication in Large Networks of Computers , Roger M. All Things Distributed. Comments (). RFC 1498, August 1993.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

US and Europe will block some Russian banks from SWIFT

The Verge

The organization’s eponymous payments network does not actually exchange money but is used to authenticate payment instructions between banks. used to authenticate payment instructions between banks. Its services are used to process some 42 million exchanges in more than 200 countries each day. billion to $52 billion.

Banking 98
article thumbnail

There’s a better way to protect yourself from hackers and identity thieves

Vox

Authenticator apps like Google Authenticator might seem intimidating, but they’re easy to use and safer than texts. If you’re using texts for two-factor authentication, it’s time to change to an app. And you always use two-factor authentication, or 2FA. S3studio/Getty Images. Here’s what you need to know. No, “Passw0rd!”

article thumbnail

Using network perspectives to visualize changing culture and meaning

Trends in the Living Networks

I’m a big fan of Tim Stock ‘s work, which weaves together a deep network perspective with a rich view of how culture is changing informed by semiotic analysis. The slides to his presentation at SXSW today on Culture Networks and the codes that drive them are available below. Culture Networks (SXSW 2012).

Network 133
article thumbnail

Microsoft issues fixes for non-supported versions of Windows Server

Network World

CVE-2019-0708 is pre-authentication and requires no user interaction, meaning any future malware could self-propagate from one vulnerable machine to another. It does not impact Microsoft’s newest operating systems; Windows 8 through 10 and Windows Server 2012 through 2019 are not affected.

Windows 98
article thumbnail

Why former Microsoft exec Steven Sinofsky has been using PCs from the 1980s again

GeekWire

Steven Sinofsky’s forthcoming book tells inside stories and leadership lessons from his tenure at Microsoft, from the late 1980s through 2012. ” Other than that, he added, “I spent a lot of time on video and network drivers! ” Other than that, he added, “I spent a lot of time on video and network drivers!”