Remove Applications Remove Disaster Recovery Remove Firewall Remove Linux
article thumbnail

Linux Academy Monthly Update – October

Linux Academy

Hi, I’m Anna, COO of Linux Academy. Anthony is out on some much-needed vacation, but that’s not going to stop us from updating you on everything new in this Linux Academy Monthly Update. CompTIA Linux Plus XK0-004. Backup and Recovery Using RSync . Securing a Virtual Network with Azure Firewall . Platform Updates.

Linux 13
article thumbnail

Fountainhead: Infrastructure Orchestration in use within SPs.

Fountainhead

In the way virtualization abstracts & configures the software world (O/S, applications, etc.), Ive been pointing out applications for this technology in Healthcare as well as in the Financial sector , and I thought it would also be useful to illustrate value in the Service Provider / Hosting market.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #35

Scott Lowe

A discussion of “statefulness” brought me again to Ivan’s post on the spectrum of firewall statefulness. His follow-up article on disaster recovery of DCE VM with vCHS is also pretty good. Operating Systems/Applications. x that involves booting on a Linux CD. Very good stuff!

Vmware 60
article thumbnail

Technology Short Take 132

Scott Lowe

I think a fair number of folks may not be aware that the Nginx ingress controller for Kubernetes—both the community version and the Nginx-maintained open source version—do suffer from timeouts and errors resulting from changes in the back-end application’s list of endpoints (think pods being added or removed). Programming.

article thumbnail

Domains of Cybersecurity : A Brief Overview | Hacking into Cybersecurity

Linux Academy

Think about all the controls we have in place on our networks today: firewalls, authentication systems, intrusion detection and prevention systems (network- and host-based), router and switch security, operating system security, data encryption — the list goes on and on. It’s in this domain that we lump the following: Firewalls.