Remove Applications Remove Examples Remove Load Balancer Remove Virtualization
article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Thanks for reading! This is a handy trick.

Linux 112
article thumbnail

Fountainhead: What Is Meant by a "Cloud-Ready" Application?

Fountainhead

Insights into Data Center Infrastructure, Virtualization, and Cloud Computing. What Is Meant by a "Cloud-Ready" Application? landscape will include many servers (often virtual machines) linked by. unique network topology (including load balancing, firewalls, etc.). They dont interact with the applications unique.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

VMworld 2013 – Network Virtualization: Moving Beyond the Obvious (My Notes)

Virtualized Greek

For example, the server virtualization value proposition is simple. Once server virtualization is in the door more of the operational advantages and efficiencies appear. An example is the ability to spin up a server within seconds vs. hours or days. Network virtualization allows for more powerful automation.

article thumbnail

Migrating to VoIP

Spearline Testing

This prominent evolution has been spurred largely by three factors - firstly, the increased use of cloud services and personnel who are more experienced and comfortable operating in a virtual arena. Many individuals utilize VoIP on a daily basis unbeknownst to themselves, for example in online gaming or through video calling applications.

VOIP 147
article thumbnail

Vendor-Side DevOps Practices Can Still Deliver Better Value While Client-Side Government Processes Catch Up

CTOvision

With the private sector making the cultural and technological shift to better DevOps practices, it was only a matter of time before private providers to government clients began to probe how DevOps practices can positively impact application delivery for DoD (and other) clients. This is where container technologies help out.

Devops 150
article thumbnail

How can such a small file do so much damage?

Dataconomy

This is natural in today’s world where data is more valuable than gold because every information is now in the virtual environment and there is nothing that black hat hackers will not do to obtain it. For example, a recursive zip bomb might contain a zip file containing another zip file, and so on. What is a Zip bomb?

article thumbnail

Technology Short Take 153

Scott Lowe

Xavier Avrillier walks readers through using Antrea (a Kubernetes CNI built on top of Open vSwitch—a topic I’ve touched on a time or two) to provide on-premise load balancing in Kubernetes. Here’s a set of 15 principles for designing and deploying scalable applications on Kubernetes. Virtualization.

Linux 74