article thumbnail

Lessons Learnt from Running a Container-Native Cloud

Scott Lowe

The cloud offers container-centric resources (floating IPs, security groups, etc.). The cloud offers container-based services (load balancing, scheduled jobs, functions, etc.). This means container-level APIs and the ability to launch containers without a VM. Billing is handled on a per-container level (not on a VM level).

Cloud 60
article thumbnail

Technology Short Take 153

Scott Lowe

This article contains some good information on IPv6 for those who are just starting to get more familiar with it, although toward the end it turns into a bit of an advertisement. Although Linux is often considered to be superior to Windows and macOS with regard to security, it is not without its own security flaws. Networking.

Linux 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Liveblog: IPv6 in the Cloud - Protocol and Service Overview

Scott Lowe

There are several ways to assign GUAs: manually, systematically (via Router Advertisements [RAs] and SLAAC [Stateless Address Autoconfiguration]), dynamically via DHCPv6 (materially different than DHCPv4), or randomly. Regarding security considerations, IPv6 is not on by default and must be enabled per interface.

IPv6 60
article thumbnail

Managing What Matters In the Cloud: The Apps » Data Center.

Data Center Knowledge

The user level elements that are managed within such an IaaS cloud are virtual servers, cloud storage and shared resources such as load balancers and firewalls. Security policies. Industry Perspectives. Managing What Matters In the Cloud: The Apps. Managing What Matters In the Cloud: The Apps. Cloud Application Management.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs. Hammond: As a security researcher, I am hierarchically in their Threat OPs department. What’s a good entry point for starting CTFs or information security for that matter? Vamosi: Wait.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs. Hammond: As a security researcher, I am hierarchically in their Threat OPs department. What’s a good entry point for starting CTFs or information security for that matter? Vamosi: Wait.