Remove Applications Remove Conference Remove Load Balancer Remove Software
article thumbnail

Is Cisco fighting a losing battle over SDN?

Virtualized Greek

Basically, they are looking to provide programmability to the network via their Application-Centric Infrastructure. This is different from the current software first movement in that Cisco’s approach is based on their hardware first view of the network. F5 – Security/Load Balancing. Arista – Top of Rack. HP – Top of Rack.

Vmware 78
article thumbnail

The O’Reilly Software Architecture Conference Call for Participation

CTOvision

Friends at O’Reilly Media have just alerted me to a call for participation in the O’Reilly Software Architecture Conference, which will be held 17-19 March in Boston MA (see: [link] ). More info is below: The O’Reilly Software Architecture Conference Call for Participation. Single-page web applications.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Transforming Development with AWS

All Things Distributed

In the hands of builders, the impact of these services has been to completely transform the way applications are developed, debugged, and delivered to customers. Amazon X-Ray : A new service to analyze, visualize, and debug distributed applications, allowing builders to identify performance bottlenecks and errors.

article thumbnail

Kubecon Liveblog: Opening Keynote

Scott Lowe

This is a liveblog of the opening keynote at the inaugural Kubernetes conference, Kubecon, taking place this week at the Palace Hotel in San Francisco. Brendan Burns, Senior Staff Software Engineer at Google, is delivering the opening keynote. HTTP load balancing. Burns is a co-founder of the Kubernetes project.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

They were breaking this kind of software target that they were hacking, and I was so amazed that you allowed to do that without getting, you know, getting legal issues with that. And after that, I invested almost all my waking hours into learning web application pen testing, because coming from the infrastructure side. Hacking away.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

They were breaking this kind of software target that they were hacking, and I was so amazed that you allowed to do that without getting, you know, getting legal issues with that. And after that, I invested almost all my waking hours into learning web application pen testing, because coming from the infrastructure side. Hacking away.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

They were breaking this kind of software target that they were hacking, and I was so amazed that you allowed to do that without getting, you know, getting legal issues with that. And after that, I invested almost all my waking hours into learning web application pen testing, because coming from the infrastructure side. Hacking away.