Remove Applications Remove Fashion Remove Linux Remove Network
article thumbnail

Technology Short Take #81

Scott Lowe

Networking. Matt Oswalt has a great post on the need for networking professionals to learn basic scripting skills—something he (rightfully) distinguishes from programming as a full-time occupation. Further, he follows that up with a post on how automation is more than just configuration management ; it’s about network services.

Vmware 60
article thumbnail

Technology Short Take #83

Scott Lowe

Networking. I enjoyed Dave McCrory’s series on the future of the network (see part 1 , part 2 , part 3 , and part 4 —part 5 hadn’t gone live yet when I published this). Michael Kashin has a handy little tool that functions like ssh-copy-id on servers, but for network devices (leveraging Netmiko). Operating Systems/Applications.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #83

Scott Lowe

Networking. I enjoyed Dave McCrory’s series on the future of the network (see part 1 , part 2 , part 3 , and part 4 —part 5 hadn’t gone live yet when I published this). Michael Kashin has a handy little tool that functions like ssh-copy-id on servers, but for network devices (leveraging Netmiko). Operating Systems/Applications.

Linux 60
article thumbnail

Technology Short Take 92

Scott Lowe

Networking. Lindsay Hill walks through using Telegraf, InfluxDB, and Grafana to monitor network statistics. Via Ivan Pepelnjak, I found this article by Diane Patton at Cumulus Networks talking about container network designs. Christian Kellner talks about work done on Thunderbolt 3 security levels for GNU/Linux.

Linux 60
article thumbnail

Technology Short Take #83

Scott Lowe

Networking. I enjoyed Dave McCrory’s series on the future of the network (see part 1 , part 2 , part 3 , and part 4 —part 5 hadn’t gone live yet when I published this). Michael Kashin has a handy little tool that functions like ssh-copy-id on servers, but for network devices (leveraging Netmiko).

article thumbnail

Cloud Storage 2.0 Set To Dominate Market

Cloud Musings

Company employees managed information technology resources (compute, storage, network) and companies tightly controlled their data in facilities they managed. Many business processes are now expected to be dynamically executed in a parallel fashion (Agile business, Social Media Customer Service).

Storage 79
article thumbnail

A Heat Template for Docker Containers

Scott Lowe

Given that Docker is targeted at application deployment, then I felt that using Heat was a more appropriate way of leveraging Docker in an OpenStack environment as opposed to treating Docker as a form of a hypervisor. Any Docker hosts you’re running must have Docker configured to listen on a network-accessible socket.