Optimize Your Applications & Data Centers with Load Balancing
Tech Republic Security
JULY 18, 2023
Request a demo of load balancing from Array Networks, purpose-built for the requirements of small and medium enterprises.
This site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country we will assume you are from the United States. View our privacy policy and terms of use.
Tech Republic Security
JULY 18, 2023
Request a demo of load balancing from Array Networks, purpose-built for the requirements of small and medium enterprises.
Network World
NOVEMBER 8, 2022
VMware has added more security features to its forthcoming on-demand multi-cloud networking and security service called Northstar that it previewed during its August VMware Explore 2022 conference. To read this article in full, please click here
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Scott Lowe
MARCH 31, 2023
The program I’ll share with you in this post is written in Go , but the process outlined in this post and the accompanying code is equally applicable in other languages supported by Pulumi. This load balancer is used only for Kubernetes API traffic.) TypeScript is a popular choice for lots of folks.)
Scott Lowe
MARCH 15, 2024
This Tech Short Take is a bit heavy on security-related links, but there’s still some additional content in a number of other areas, so you should be able to find something useful—or at least interesting—in here. Security In early February a vulnerability was uncovered in a key component of the Linux boot process.
CTOvision
JUNE 7, 2014
These are examples of consumer-oriented sensors and devices, but that has occurred in parallel with business, professional, infrastructure, government and military applications. You can opt-in to smart metering so that a utility can load balance energy distribution. Here are some examples…. Things aren’t necessarily so dire.
Scott Lowe
APRIL 17, 2017
This is a liveblog of the DockerCon 2017 Black Belt session led by Thomas Graf on Cilium , a new startup that focuses on using eBPF and XDP for network and application security. Why is it necessary to rethink how networking and security is handled? Why is it necessary to rethink how networking and security is handled?
CIO Business Intelligence
MARCH 19, 2024
With VCF, our customers will achieve a highly efficient cloud operating model that combines public cloud scale and agility with private cloud security and resiliency. VMware Cloud Foundation , or VCF, is our platform for innovation going forward. It’s more fully integrated, so our customers can reap the full value from our technology.
CIO Business Intelligence
NOVEMBER 8, 2023
However, it has also introduced new security challenges, specifically related to cloud infrastructure and connectivity between workloads as organizations have limited control over those connectivity and communications. 3 We have seen an increase of 15% in cloud security breaches as compared to last year. 8 Complexity.
CIO Business Intelligence
JANUARY 4, 2024
In the fast-evolving world of finance, data security is of paramount importance. The Payment Card Industry Data Security Standard (PCI DSS) is a crucial framework to which financial institutions must adhere. This is where a Common Controls Assessment (CCA) can play a pivotal role.
CTOvision
MAY 16, 2017
This is the industry’s first universal kernel bypass (UKB) solution which includes three techniques for kernel bypass: a POSIX (Portable Operating System Interface) sockets-based API (Application Program Interface), TCP (Transmission Control Protocol) Direct and DPDK (Data Plane Development Kit). Hardware Based Security (ServerLock).
All Things Distributed
APRIL 11, 2018
In our industry, four years is a long time, but I think we've only just started exploring how this combination of code packaging, well-designed workflows, and the cloud can reshape the ability of developers to quickly build applications and innovate. How do you define and group services into applications?
CTOvision
MAY 9, 2017
This is the industry’s first universal kernel bypass (UKB) solution which includes three techniques for kernel bypass: a POSIX (Portable Operating System Interface) sockets-based API (Application Program Interface), TCP (Transmission Control Protocol) Direct and DPDK (Data Plane Development Kit). Hardware Based Security (ServerLock).
Spearline Testing
JULY 21, 2022
The WebRTC application development process requires a cycle of repeat testing using powerful, expensive client machines. Traditional web testing is ineffective for WebRTC applications and can cause an over-reliance on time and resource-heavy manual testing. Because WebRTC is browser-based, you don’t control the whole tech stack.
CTOvision
DECEMBER 11, 2015
With the private sector making the cultural and technological shift to better DevOps practices, it was only a matter of time before private providers to government clients began to probe how DevOps practices can positively impact application delivery for DoD (and other) clients. This is where container technologies help out.
SecureWorld News
NOVEMBER 1, 2022
Distributed denial-of-service (DDoS) attacks aim to overwhelm a target's application or website, exhausting the system's resources and making the target inaccessible to legitimate users. Victims should not become so focused on defending against a DDoS attack that they ignore other security monitoring.". Which is why some U.S.
All Things Distributed
MAY 24, 2011
I am excited that today both the Route 53 , the highly available and scalable DNS service, and the Elastic Load Balancing teams are releasing new functionality that has been frequently requested by their customers: Route 53 now GA : Route 53 is now Generally Available and will provide an availability SLA of 100%.
All Things Distributed
MAY 17, 2009
The Amazon Elastic Compute Cloud (Amazon EC2) embodies much of what makes infrastructure as a service such a powerful technology; it enables our customers to build secure, fault-tolerant applications that can scale up and down with demand, at low cost.
Scott Lowe
JANUARY 21, 2022
Aidan Steele examines how VPC sharing could potentially improve security and reduce cost. Nick Schmidt talks about using GitOps with the NSX Advanced Load Balancer. Orca Security discusses the “Superglue” vulnerability in AWS Glue. Sander Rodenhuis wrote an article on security policies in Kubernetes.
Scott Lowe
APRIL 15, 2022
Xavier Avrillier walks readers through using Antrea (a Kubernetes CNI built on top of Open vSwitch—a topic I’ve touched on a time or two) to provide on-premise load balancing in Kubernetes. Here’s a set of 15 principles for designing and deploying scalable applications on Kubernetes. Servers/Hardware.
Scott Lowe
AUGUST 6, 2021
Here’s a quick look at using Envoy as a load balancer in Kubernetes. I saw this blog post about Curiefense , an open source Envoy extension to add WAF (web application firewall) functionality to Envoy. Operating Systems/Applications. I hope this collection of links has something useful for you! Networking.
CTOvision
FEBRUARY 24, 2014
Cloudant’s JSON cloud-based data service allows mobile and web developers to quickly and easily store and access the explosion of mobile data using an application programming interface (API) that is significantly easier to use than alternatives. The acquisition of Cloudant is expected to close in 1Q14.
Linux Academy
FEBRUARY 1, 2019
Securing Storage with Access Keys and Shared Access Signatures in Microsoft Azure. Identity and security. Azure Storage Accounts: Configuration and Security. Create a Load Balanced VM Scale Set in Azure. Create and Configure an Application Gateway in Azure. Managing AD Identity Protection and objects.
Scott Lowe
JANUARY 17, 2020
Eric Sloof mentions the NSX-T load balancing encyclopedia (found here ), which intends to be an authoritative resource to NSX-T load balancing configuration and management. The next day, the Microsoft Security Response Center confirmed the vulnerability. Operating Systems/Applications. Networking.
Linux Academy
JUNE 3, 2019
In a nutshell, serverless computing lets you build and run applications without thinking about servers. Normally, when it comes to running an application from the cloud, you have to deal with setting it all up, which can take hours, days, or even weeks. Configure auto-scaling with load balancers.
Scott Lowe
SEPTEMBER 27, 2019
The “TL;DR” for those who are interested is that this solution bypasses the normal iptables layer involved in most Kubernetes implementations to load balance traffic directly to Pods in the cluster. Daniel Sagi of Aqua Security explains the mechanics behind a Pod escape using file system mounts. Servers/Hardware.
Scott Lowe
JUNE 18, 2021
The first is a post on Cilium and F5 load balancer integration , while the second discusses implementing Kubernetes network policies with Cilium and Linkerd. John Gruber’s post on “Secure Intent” on Apple devices was, for me at least, an informative read. Operating Systems/Applications.
Scott Lowe
AUGUST 27, 2021
Teri Radichel uses some basketball analogies to explain why defensive (proactive) security strategies are more desirable than reactive security strategies. Operating Systems/Applications. Rudi Martinsen has an article on changing the Avi load balancer license tier (this is in the context of using it with vSphere with Tanzu).
Cloud Musings
DECEMBER 11, 2015
PaaS provides a platform allowing customers to develop, run, and manage web applications without the complexity of building and maintaining the infrastructure. Its unique power is associated with developing and deploying applications.
Galido
OCTOBER 20, 2018
Technology advancements have made it necessary for retail stores to institute data security measures. As such, it is critical that the merchants comply with the Payment Card Industry Data Security Standards ( PCI DSS ) to protect the cardholder information using the Amazon Web Services as well as Amazon cloud. AWS PCI Compliance.
All Things Distributed
MARCH 11, 2013
well suited for their web applications. to help developers easily deploy and manage these web applications on AWS. Elastic Beanstalk automates the provisioning, monitoring, and configuration of many underlying AWS resources such as Elastic Load Balancing, Auto Scaling, and EC2. . | Comments (). along with Git.
Linux Academy
NOVEMBER 19, 2019
Creating and configuring Secure AWS RDS Instances with a Reader and Backup Solution. By completing this lab, you will feel comfortable creating and securing relational databases with backup solutions. Setting Up an Application Load Balancer with an Auto Scaling Group and Route 53 in AWS. Difficulty: Intermediate.
Linux Academy
MAY 15, 2019
Application streams. Improved security. For the Red Hat Certified Specialist in Security Prep course , we have the following hands-on labs: Configuring Audit Settings on Red Hat. AWS Certified Solutions Architect – Associate level has two new labs: Building a Serverless Application. Red Hat Enterprise 8.
Scott Lowe
OCTOBER 14, 2017
Romain Decker has an “under the hood” look at the VMware NSX load balancer. This graphical summary of the AWS Application Load Balancer (ALB) is pretty handy. Operating Systems/Applications. Servers/Hardware. Nothing this time (sorry!).
Scott Lowe
AUGUST 6, 2021
Here’s a quick look at using Envoy as a load balancer in Kubernetes. I saw this blog post about Curiefense , an open source Envoy extension to add WAF (web application firewall) functionality to Envoy. Operating Systems/Applications. I hope this collection of links has something useful for you! Networking.
Dataconomy
NOVEMBER 7, 2023
To set up a web application firewall (WAF), you will need to: Choose a WAF solution. You should choose a solution that meets your specific needs, such as the types of attacks you want to protect against, the size and complexity of your web application, and your budget.
Scott Lowe
AUGUST 27, 2021
Teri Radichel uses some basketball analogies to explain why defensive (proactive) security strategies are more desirable than reactive security strategies. Operating Systems/Applications. Rudi Martinsen has an article on changing the Avi load balancer license tier (this is in the context of using it with vSphere with Tanzu).
ForAllSecure
SEPTEMBER 7, 2022
With the rapid development of modern web APIs, developers must balance quality, reliability and security with time to market. This means that there are any number of unknown issues of unknown severity hidden in every API that may lead to benign errors, or at worse, serious security holes. header 'Content-Type: application/json'.
ForAllSecure
SEPTEMBER 7, 2022
With the rapid development of modern web APIs, developers must balance quality, reliability and security with time to market. This means that there are any number of unknown issues of unknown severity hidden in every API that may lead to benign errors, or at worse, serious security holes. header 'Content-Type: application/json'.
Scott Lowe
AUGUST 17, 2018
Andrew Martin has a write-up with security recommendations for your Kubernetes clusters. Check out these articles talking about IPVS-based in-cluster load balancing , CoreDNS , dynamic kubelet configuration , and resizing persistent volumes in Kubernetes. Operating Systems/Applications. Servers/Hardware.
Virtualized Greek
SEPTEMBER 8, 2013
Basically, they are looking to provide programmability to the network via their Application-Centric Infrastructure. F5 – Security/Load Balancing. I’m wondering if Cisco is fighting a losing battle with their ACI approach to SDN. The list includes a who’s who of Cisco competitors. Arista – Top of Rack. HP – Top of Rack.
All Things Distributed
DECEMBER 1, 2016
In the hands of builders, the impact of these services has been to completely transform the way applications are developed, debugged, and delivered to customers. Amazon X-Ray : A new service to analyze, visualize, and debug distributed applications, allowing builders to identify performance bottlenecks and errors.
Galido
FEBRUARY 13, 2017
Application-based logs can be utilized to define the set of clusters (or disparate resources) that work with each other to yield a particular service or product. Role-based tags can be utilized to define either the owner or function of a specific node (load balancer, database server, web server etc). Use of AWS tags.
Scott Lowe
JUNE 8, 2018
Kamal Kyrala discusses a method for accessing Kubernetes Services without Ingress, NodePort, or load balancers. His points are spot-on: making the control plane highly available isn’t going to improve the availability or scalability of your applications. Operating Systems/Applications. Virtualization.
Scott Lowe
JUNE 21, 2019
David Holder walks through removing unused load balancer IP allocations in NSX-T when used with PKS. Software company Agile Bits recently announced support for U2F-compatible hardware security keys in their 1Password product. Operating Systems/Applications. I haven’t tested it.). Servers/Hardware.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content