Remove Applications Remove Linux Remove Load Balancer Remove Policies
article thumbnail

DockerCon 2017 Black Belt Session: Cilium for Network and Application Security

Scott Lowe

This is a liveblog of the DockerCon 2017 Black Belt session led by Thomas Graf on Cilium , a new startup that focuses on using eBPF and XDP for network and application security. Graf starts by talking about how BPF (specifically, extended BPF or eBPF) can be used to rethink how the Linux kernel handles network traffic. What is XDP?

article thumbnail

Weekly Update 5-20-2019

Linux Academy

Application streams. Great news for all of our Linux Academy students; Red Hat Enterprise is already available to try out in Linux Academy’s Cloud Playground! We have more information on t he release in general and all the new features in our podcast Linux Action News and episode 105. Configure an Account Lockout Policy.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 151

Scott Lowe

Nick Schmidt talks about using GitOps with the NSX Advanced Load Balancer. Sander Rodenhuis wrote an article on security policies in Kubernetes. The post focuses on Otomi, which in turn leverages Open Policy Agent and Gatekeeper. Operating Systems/Applications. BIOS updates without a reboot , and under Linux first?

article thumbnail

Technology Short Take 144

Scott Lowe

I have a fairly diverse set of links for readers this time around, covering topics from microchips to improving your writing, with stops along the way in topics like Kubernetes, virtualization, Linux, and the popular JSON-parsing tool jq. Michael Kashin shares the journey of containerizing NVIDIA Cumulus Linux. Networking. So useful.).

Linux 90
article thumbnail

Azure Training Courses | New January Releases

Linux Academy

Linux Academy is the only way to get exam-like training for multiple Microsoft Azure certifications. Configuring resource policies and alerts. Create a Load Balanced VM Scale Set in Azure. Create and Configure an Application Gateway in Azure. Creating and managing alerts. Creating and configuring storage accounts.

Course 80
article thumbnail

Technology Short Take 144

Scott Lowe

I have a fairly diverse set of links for readers this time around, covering topics from microchips to improving your writing, with stops along the way in topics like Kubernetes, virtualization, Linux, and the popular JSON-parsing tool jq along the way. Michael Kashin shares the journey of containerizing NVIDIA Cumulus Linux.

Linux 60
article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

The CCA allows overarching enterprise functions and IT shared services to be assessed separately from the business unit’s products/applications that require PCI security compliance. The business teams would also be evaluated for PCI security compliance yearly, but only for the requirements applicable to their product and scope.