Optimize Your Applications & Data Centers with Load Balancing
Tech Republic Security
JULY 18, 2023
Request a demo of load balancing from Array Networks, purpose-built for the requirements of small and medium enterprises.
This site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country we will assume you are from the United States. View our privacy policy and terms of use.
Tech Republic Security
JULY 18, 2023
Request a demo of load balancing from Array Networks, purpose-built for the requirements of small and medium enterprises.
Network World
NOVEMBER 8, 2022
VMware has added more security features to its forthcoming on-demand multi-cloud networking and security service called Northstar that it previewed during its August VMware Explore 2022 conference. To read this article in full, please click here
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Scott Lowe
MARCH 31, 2023
The program I’ll share with you in this post is written in Go , but the process outlined in this post and the accompanying code is equally applicable in other languages supported by Pulumi. This load balancer is used only for Kubernetes API traffic.) TypeScript is a popular choice for lots of folks.)
Scott Lowe
APRIL 17, 2017
This is a liveblog of the DockerCon 2017 Black Belt session led by Thomas Graf on Cilium , a new startup that focuses on using eBPF and XDP for network and application security. Graf starts by talking about how BPF (specifically, extended BPF or eBPF) can be used to rethink how the Linux kernel handles network traffic.
Scott Lowe
MARCH 15, 2024
This Tech Short Take is a bit heavy on security-related links, but there’s still some additional content in a number of other areas, so you should be able to find something useful—or at least interesting—in here. I also enjoyed Ivan’s realistic take on rollbacks in a network automation environment. (TL;DR:
CTOvision
JUNE 7, 2014
We’re seeing a glimmer of the future – the Internet of Things (IoT) – where anything and everything is or contains a sensor that can communicate over the network/Internet. You can opt-in to smart metering so that a utility can load balance energy distribution. By George Romas. Here are some examples….
CIO Business Intelligence
MARCH 19, 2024
It’s fully software-defined compute, networking, storage and management – all in one product with automated and simplified operations. With VCF, our customers will achieve a highly efficient cloud operating model that combines public cloud scale and agility with private cloud security and resiliency.
CIO Business Intelligence
NOVEMBER 8, 2023
However, it has also introduced new security challenges, specifically related to cloud infrastructure and connectivity between workloads as organizations have limited control over those connectivity and communications. 3 We have seen an increase of 15% in cloud security breaches as compared to last year. 8 Complexity.
CTOvision
MAY 16, 2017
Solarflare, a global leader in networking solutions for modern data centers, is releasing an Open Compute Platform (OCP) software-defined, networking interface card, offering the industry’s most scalable, lowest latency networking solution to meet the dynamic needs of the enterprise environment. Marty Meehan.
CTOvision
MAY 9, 2017
Solarflare, a global leader in networking solutions for modern data centers, is releasing an Open Compute Platform (OCP) software-defined, networking interface card, offering the industry’s most scalable, lowest latency networking solution to meet the dynamic needs of the enterprise environment.
Spearline Testing
JULY 21, 2022
The WebRTC application development process requires a cycle of repeat testing using powerful, expensive client machines. Traditional web testing is ineffective for WebRTC applications and can cause an over-reliance on time and resource-heavy manual testing. WebRTC network sensitivity is another headache. It’s as simple as that.
All Things Distributed
APRIL 11, 2018
In our industry, four years is a long time, but I think we've only just started exploring how this combination of code packaging, well-designed workflows, and the cloud can reshape the ability of developers to quickly build applications and innovate. How do you define and group services into applications?
CIO Business Intelligence
JANUARY 4, 2024
In the fast-evolving world of finance, data security is of paramount importance. The Payment Card Industry Data Security Standard (PCI DSS) is a crucial framework to which financial institutions must adhere. This is where a Common Controls Assessment (CCA) can play a pivotal role.
SecureWorld News
NOVEMBER 1, 2022
Distributed denial-of-service (DDoS) attacks aim to overwhelm a target's application or website, exhausting the system's resources and making the target inaccessible to legitimate users. Victims should not become so focused on defending against a DDoS attack that they ignore other security monitoring.". Which is why some U.S.
CTOvision
DECEMBER 11, 2015
With the private sector making the cultural and technological shift to better DevOps practices, it was only a matter of time before private providers to government clients began to probe how DevOps practices can positively impact application delivery for DoD (and other) clients. This is where container technologies help out.
Scott Lowe
AUGUST 6, 2021
Networking. Here’s a quick look at using Envoy as a load balancer in Kubernetes. Back in April of this year, Patrick Ogenstad announced Netrasp , a Go package for writing network automation tooling in Go. Operating Systems/Applications. I hope this collection of links has something useful for you!
Scott Lowe
APRIL 15, 2022
Networking. Want to understand kube-proxy , a key part of Kubernetes networking, a bit better? Xavier Avrillier walks readers through using Antrea (a Kubernetes CNI built on top of Open vSwitch—a topic I’ve touched on a time or two) to provide on-premise load balancing in Kubernetes. Start here.
Scott Lowe
JUNE 18, 2021
Networking. The first is a post on Cilium and F5 load balancer integration , while the second discusses implementing Kubernetes network policies with Cilium and Linkerd. Second, the content reflects—in my opinion—the changing nature of what it means to be a “networking professional.”
Scott Lowe
JANUARY 21, 2022
Networking. Aidan Steele examines how VPC sharing could potentially improve security and reduce cost. Nick Schmidt talks about using GitOps with the NSX Advanced Load Balancer. Orca Security discusses the “Superglue” vulnerability in AWS Glue. Operating Systems/Applications. Servers/Hardware.
CTOvision
FEBRUARY 24, 2014
To meet this growing demand, data must be always available and easily accessed by massive volumes and networks of users and devices. Five petabytes of data are created every day by mobile phone subscribers around the world. The acquisition of Cloudant is expected to close in 1Q14.
Linux Academy
FEBRUARY 1, 2019
Securing Storage with Access Keys and Shared Access Signatures in Microsoft Azure. Configuring Content Delivery Network (CDN) Endpoints in Microsoft Azure. Adding a Network Interface to a VM in Azure. Identity and security. Azure Storage Accounts: Configuration and Security. Create and Mount Azure File Shares.
Galido
OCTOBER 20, 2018
Technology advancements have made it necessary for retail stores to institute data security measures. As such, it is critical that the merchants comply with the Payment Card Industry Data Security Standards ( PCI DSS ) to protect the cardholder information using the Amazon Web Services as well as Amazon cloud. AWS PCI Compliance.
Linux Academy
JUNE 3, 2019
In a nutshell, serverless computing lets you build and run applications without thinking about servers. Normally, when it comes to running an application from the cloud, you have to deal with setting it all up, which can take hours, days, or even weeks. Configure auto-scaling with load balancers.
Scott Lowe
JANUARY 17, 2020
Networking. Eric Sloof mentions the NSX-T load balancing encyclopedia (found here ), which intends to be an authoritative resource to NSX-T load balancing configuration and management. The next day, the Microsoft Security Response Center confirmed the vulnerability. Operating Systems/Applications.
Scott Lowe
AUGUST 6, 2021
Networking. Here’s a quick look at using Envoy as a load balancer in Kubernetes. Back in April of this year, Patrick Ogenstad announced Netrasp , a Go package for writing network automation tooling in Go. Operating Systems/Applications. I hope this collection of links has something useful for you!
Cloud Musings
DECEMBER 11, 2015
PaaS provides a platform allowing customers to develop, run, and manage web applications without the complexity of building and maintaining the infrastructure. Its unique power is associated with developing and deploying applications.
Scott Lowe
SEPTEMBER 27, 2019
Networking. The “TL;DR” for those who are interested is that this solution bypasses the normal iptables layer involved in most Kubernetes implementations to load balance traffic directly to Pods in the cluster. Daniel Sagi of Aqua Security explains the mechanics behind a Pod escape using file system mounts.
Scott Lowe
AUGUST 27, 2021
Networking. Teri Radichel uses some basketball analogies to explain why defensive (proactive) security strategies are more desirable than reactive security strategies. Operating Systems/Applications. I hope you find something useful! And since Kevin didn’t define TDP—shame, shame!—see So useful.).
Virtualized Greek
SEPTEMBER 8, 2013
Basically, they are looking to provide programmability to the network via their Application-Centric Infrastructure. This is different from the current software first movement in that Cisco’s approach is based on their hardware first view of the network. F5 – Security/Load Balancing. Arista – Top of Rack.
Scott Lowe
JUNE 21, 2019
Networking. Mircea Ulinic shows readers how to use salt-sproxy to take a different approach to network automation using Salt. Michael Kashin has published a couple of posts on a project of his called NaaS (Network-as-a-Service). David Holder walks through removing unused load balancer IP allocations in NSX-T when used with PKS.
Scott Lowe
FEBRUARY 24, 2018
Networking. The engineering team at Lyft recently discussed a new overlay-free networking approach they’ve been working on for Kubernetes: IPVLAN-based CNI stack for running within VPCs on AWS. (For VPCs, or Virtual Private Clouds, are Amazon’s software-defined networking mechanism for workloads running on AWS.).
Scott Lowe
OCTOBER 14, 2017
Networking. Romain Decker has an “under the hood” look at the VMware NSX load balancer. This graphical summary of the AWS Application Load Balancer (ALB) is pretty handy. Operating Systems/Applications. Sorry about that! Servers/Hardware. Nothing this time (sorry!).
Scott Lowe
AUGUST 17, 2018
Networking. Andrew Martin has a write-up with security recommendations for your Kubernetes clusters. Check out these articles talking about IPVS-based in-cluster load balancing , CoreDNS , dynamic kubelet configuration , and resizing persistent volumes in Kubernetes. Operating Systems/Applications.
Scott Lowe
JUNE 8, 2018
Networking. If you’re a networking pro and didn’t understand most of that last sentence, I’d content that you’ve got some learning to do. If you’re a networking pro and didn’t understand most of that last sentence, I’d content that you’ve got some learning to do. Servers/Hardware.
Scott Lowe
FEBRUARY 16, 2017
Networking. The rise of the disaggregated network operating system (NOS) marches on: this time, it’s Big Switch Networks announcing expanded hardware support in Open Network Linux (ONL) , upon which its own NOS is based. Mircea Ulinic has a nice article describing the combination of NAPALM and Salt for network automation.
Scott Lowe
APRIL 6, 2017
Networking. Matt Oswalt has a great post on the need for networking professionals to learn basic scripting skills—something he (rightfully) distinguishes from programming as a full-time occupation. Further, he follows that up with a post on how automation is more than just configuration management ; it’s about network services.
Scott Lowe
SEPTEMBER 22, 2017
Networking. Ivan Pepelnjak has a great article that tries to get to the kernel of truth in the middle of the intent-based networking hype. The company is VirTool Networks (catchy, eh?), Chris Binnie walks you through the process of using user namespaces to help secure your Docker hosts and containers. Servers/Hardware.
Scott Lowe
AUGUST 27, 2021
Networking. Teri Radichel uses some basketball analogies to explain why defensive (proactive) security strategies are more desirable than reactive security strategies. Operating Systems/Applications. I hope you find something useful! And since Kevin didn’t define TDP—shame, shame!—see So useful.).
Scott Lowe
JULY 13, 2018
Networking. Ajay Chenampara has a post on using the Ansible network-engine command parser to parse the output of commands on network devices. Ajay Chenampara has a post on using the Ansible network-engine command parser to parse the output of commands on network devices. Operating Systems/Applications.
ForAllSecure
SEPTEMBER 7, 2022
With the rapid development of modern web APIs, developers must balance quality, reliability and security with time to market. This means that there are any number of unknown issues of unknown severity hidden in every API that may lead to benign errors, or at worse, serious security holes. header 'Content-Type: application/json'.
ForAllSecure
SEPTEMBER 7, 2022
With the rapid development of modern web APIs, developers must balance quality, reliability and security with time to market. This means that there are any number of unknown issues of unknown severity hidden in every API that may lead to benign errors, or at worse, serious security holes. header 'Content-Type: application/json'.
Scott Lowe
NOVEMBER 9, 2018
Networking. Continuing on that Envoy theme, you may find this article by Matt Klein—one of the primary authors of Envoy—helpful in understanding some of the concepts behind modern load balancing and proxying. From an unknown author, we have this security rant on Flatpak. Operating Systems/Applications.
Scott Lowe
NOVEMBER 30, 2016
Before they started their journey to the public cloud, News Corp ran a “global application assessment”—and Caldwell believes that this was critical to the success News Corp/News UK has seen so far. Kinsella now takes a moment to define governance, particuarly in terms of controlling cost, security, and compliance. No tagging.
Scott Lowe
DECEMBER 17, 2015
Networking. Mustafa Akin has an article on Docker’s new overlay networking functionality. It says the the JET (Juniper Extension Toolkit) uses “open application programming interfaces”, but fails to provide any specifics. Here’s a post that claims to translate OVS and OpenStack Neutron to the network engineer’s language.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content