Remove Applications Remove Authentication Remove Google Remove Linux
article thumbnail

GeekWire Podcast: NY Times vs. Microsoft; Plus, Oren Etzioni on AI in 2023 and beyond

GeekWire

… And when you went from one application to the other, you had to redo it all from scratch. … It’s almost the love child of a search engine, like Google, which you can talk to about anything, with the somewhat limited but very real intelligence of AI systems.” ” AI2 technical director Oren Etzioni.

Microsoft 109
article thumbnail

Beginner’s Basics of Kubernetes

Linux Academy

You can set up and package everything that you need into an application, and execute that package without the virtual machine overhead that is normally rendered during that process. It does this by providing tools for deploying, scaling, and managing containerized applications. However, it can also be used to secure your applications.

Policies 159
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 141

Scott Lowe

Via Ivan Pepelnjak, I was pointed to Jon Langemak’s in-depth discussion of working with Linux VRFs. Sonia Cuff provides a set of links for detailed instructions on setting up VPN access from macOS to Microsoft Azure with Azure Active Directory authentication. Operating Systems/Applications. Networking. Career/Soft Skills.

Vmware 60
article thumbnail

Technology Short Take 122

Scott Lowe

Bruce Schneier writes about how some Chinese hackers are bypassing RSA software token authentication (the title is a bit more broad, implying other forms of two-factor authentication are affected, but the article focuses on attacks against the use of RSA software tokens). Operating Systems/Applications. Career/Soft Skills.

article thumbnail

Technology Short Take 155

Scott Lowe

Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. Via Teri Radichel , I saw this article from Google Project Zero about zero-click security vulnerabilities in Zoom. Operating Systems/Applications. Kubernetes 1.24 Programming.

article thumbnail

Technology Short Take #51

Scott Lowe

Welcome to Technology Short Take #51, another collection of posts and links about key data center technologies like networking, virtualization, cloud management, and applications/operating systems. Flavio Leitner has a nice article comparing OVS internal ports with Linux veth devices. Operating Systems/Applications. Networking.

Vmware 60
article thumbnail

Technology Short Take #59

Scott Lowe

Cumulus VX, if you aren’t aware, is a community-supported virtual appliance version of Cumulus Linux aimed at helping folks preview and test “full-blown” Cumulus Linux (which, of course, requires compatible hardware). Operating Systems/Applications. Good stuff Juan!

Vmware 60