Remove Applications Remove Comparison Remove Hardware Remove Network
article thumbnail

Technology Short Take 167

Scott Lowe

Networking Jeff McLaughlin discusses what he calls the “war on expertise.” ” Ivan Pepelnjak has some very useful and very applicable information on VRF-aware DHCP relaying. Servers/Hardware Manoj Kumar provides a beginner’s guide to Trusted Platform Module (TPM). and Kong API Gateway 3.0. (Be

article thumbnail

Meet the 5 finalists for CEO of the Year at the 2023 GeekWire Awards

GeekWire

CEO of the Year finalists in the 2022 GeekWire Awards, clockwise from upper left: François Locoh-Donou, of F5 Networks; Maria Colacurcio of Syndio; Luis Ceze of OctoML; Chris Diorio of Impinj; and Xiao Wang of Boundless. The UW spinout uses machine learning to help enterprises build their own machine learning and AI models and applications.

Meeting 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 160

Scott Lowe

For example, did you know about the secret macOS network quality tool? Networking. Servers/Hardware. What I’d like to find—but haven’t yet—is a good, in-depth comparison of fundamental concepts between AWS, Azure, and GCP. Operating Systems/Applications. You didn’t? Programming.

Cloud 87
article thumbnail

Can OpenStack Beat AWS in Price

Scott Lowe

The “trilogy” refers to the third iteration of this presentation; each time the comparison has been done in a different geographical region (first in Europe, then in North America, and finally here in Asia-Pacific). Lago takes over now to set some assumptions for the comparisons.

article thumbnail

Breaking Down User Activity Monitoring Tools: Security and HR Perspectives

SecureWorld News

A User Activity Monitoring (UAM) tool is a software solution designed to track and record the activities and interactions of users on computers or networks for security, compliance, or management purposes. This agent gathers data about the user's actions, such as keystrokes, mouse clicks, application usage, and internet activity.

Tools 96
article thumbnail

Technology Short Take 135

Scott Lowe

Networking. Arthur Chiao cracks open kube-proxy , a key part of Kubernetes networking, to expose the internals, and along the way exposes readers to a few different technologies. This is a good read if you’re trying to better understand some aspects of Kubernetes networking. Servers/Hardware. Now, on to the content!

Linux 60
article thumbnail

IDF 2013: Virtualizing the Network to Enable SDI

Scott Lowe

This is session EDCS008, “Virtualizing the Network to Enable a Software-Defined Infrastructure (SDI).” This naturally leads to a discussion of software-defined networking (SDN) as a means whereby the network can evolve to keep up the rapid pace of change and innovation in other areas of the data center.