Remove Applications Remove Article Remove Licensing Remove Virtualization
article thumbnail

COMS002: Next Generation Cloud Infrastructure with Data Plane Virtualization

Scott Lowe

This is session COMS002, titled “Next Generation Cloud Infrastructure with Data Plane Virtualization.” Verplanke believes that DPDK (Data Plane Development Kit) and virtualization are key to virtualizing workloads that move around lots and lots of packets, such as firewalls, routers, and other similar functions.

article thumbnail

Technology Short Take 153

Scott Lowe

This article contains some good information on IPv6 for those who are just starting to get more familiar with it, although toward the end it turns into a bit of an advertisement. Warning: I’m not sure the configuration as described in the article will actually work, but the concept is sound.) Operating Systems/Applications.

Linux 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Google: Innovating in AI but can they catch up with cloud leaders?

CTOvision

Its technical infrastructure and Virtual Reality are also included in Google segment. Google segment is engaged in advertising, sales of digital content, applications and cloud services, as well as sale of Google branded hardware. Related articles. For more see: Google.com.

Google 150
article thumbnail

Emulating USB Dongle – Introducing HASP Dongle Emulator Software

Galido

Over the years the methods used by software developers and producers to limit the amount of users to a specific number in a licensing agreement have become more complex. A software USB emulator means that a user can take a virtual copy of a security key. You can share the key with multiple users and access devices virtually.

article thumbnail

Technology Short Take 114

Scott Lowe

There will be a longer gap than usual before the next Tech Short Take (more details to come on Monday), but in the meantime here’s some articles and links to feed your technical appetite. Michael Allen published an article on weaponizing the Yubikey. Operating Systems/Applications. Networking. Servers/Hardware.

Linux 60
article thumbnail

Technology Short Take 144

Scott Lowe

I have a fairly diverse set of links for readers this time around, covering topics from microchips to improving your writing, with stops along the way in topics like Kubernetes, virtualization, Linux, and the popular JSON-parsing tool jq. A bunch of home Wi-Fi routers are suspectible to attack; see this article for more details.

Linux 90
article thumbnail

Technology Short Take 170

Scott Lowe

This is a slightly older article (from January of this year) in which Josh Saul of Hedgehog pays homage to the achievements of Cumulus Networks in the open networking movement. As detailed in this article , it turns out BitLocker can be bypassed—assuming physical access to the hardware—with a cheap logic analyzer.

Vmware 74