Remove Applications Remove Examples Remove Load Balancer Remove Storage
article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Thanks for reading! This is a handy trick.

Linux 112
article thumbnail

Fountainhead: What Is Meant by a "Cloud-Ready" Application?

Fountainhead

What Is Meant by a "Cloud-Ready" Application? unique network topology (including load balancing, firewalls, etc.). connected to differing forms of storage (not to mention storage tiering, backup etc.) They dont interact with the applications unique. solution if you really understand the specific application.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

The CCA allows overarching enterprise functions and IT shared services to be assessed separately from the business unit’s products/applications that require PCI security compliance. Having segmentation between infrastructure providing data processing and data storage is an example of a broad IT security architectural pattern.

Financial 105
article thumbnail

New Route 53 and ELB features: IPv6, Zone Apex, WRR and more.

All Things Distributed

I am excited that today both the Route 53 , the highly available and scalable DNS service, and the Elastic Load Balancing teams are releasing new functionality that has been frequently requested by their customers: Route 53 now GA : Route 53 is now Generally Available and will provide an availability SLA of 100%.

IPv6 114
article thumbnail

Vendor-Side DevOps Practices Can Still Deliver Better Value While Client-Side Government Processes Catch Up

CTOvision

With the private sector making the cultural and technological shift to better DevOps practices, it was only a matter of time before private providers to government clients began to probe how DevOps practices can positively impact application delivery for DoD (and other) clients. This is where container technologies help out.

Devops 150
article thumbnail

How can such a small file do so much damage?

Dataconomy

ZIP files are often used to reduce the size of files for easier storage or transmission. For example, a zip bomb file that is only a few kilobytes in size can expand to hundreds of gigabytes or even terabytes when decompressed. For example, a recursive zip bomb might contain a zip file containing another zip file, and so on.

article thumbnail

Technology Short Take 153

Scott Lowe

Xavier Avrillier walks readers through using Antrea (a Kubernetes CNI built on top of Open vSwitch—a topic I’ve touched on a time or two) to provide on-premise load balancing in Kubernetes. Here’s a set of 15 principles for designing and deploying scalable applications on Kubernetes. Servers/Hardware.

Linux 74