Remove Architecture Remove Construction Remove Linux Remove Operating Systems
article thumbnail

Technology Short Take 169

Scott Lowe

As a side note, I am curious to know what other CPU architectures, if any, are affected. Will something like this spark a (larger) migration to ARM-based architectures? In the end, he comes up with using a general purpose programming language (via CDK in his article) to write higher-level constructs. Here we go again.

article thumbnail

Technology Short Take 151

Scott Lowe

Chris Evans revisits the discussion regarding Arm processor architectures in the public cloud. And, speaking of Arm processor architectures in the public cloud, here’s another look at Amazon’s Graviton2 and Graviton3 chips, as discussed in a pair of re:Invent talks. Operating Systems/Applications. Yes please!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 138

Scott Lowe

Operating Systems/Applications. Alex Gurbych discusses a microservices architecture, including adapting the concepts to actual services and offerings from AWS. Via TecMint, James Kiarie explains how to use VirtualBox VMs on KVM in Linux. Katie Gamanji shares some information on passing the CKAD. Virtualization.

IPv6 60
article thumbnail

Technology Short Take #25

Scott Lowe

This is an awesome overview of the OpenStack Folsom architecture , courtesy of Ken Pepple. Operating Systems/Applications. Only a true geek would be interested in this, but here’s some information on running OpenBSD in KVM on Linux. Cloud Computing/Cloud Management. Definitely worth reading, in my view.

Storage 92
article thumbnail

Technology Short Take #35

Scott Lowe

Kenneth Hui, formerly of VCE and now with Rackspace, does a great job of explaining how VMware vSphere fits into the OpenStack Nova architecture in this blog post. Operating Systems/Applications. More information on the use of the immutable server construct is also available here. x that involves booting on a Linux CD.

Vmware 60
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

These are all basically network attacks, enabled by poorly configured IoT devices for true IoT hacking, I'm thinking you're going to need a bit more than a Kali Linux box on your side. If you've never worked with embedded systems before well, they are different. But still, the Target breach the baby monitor the fish tank.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

These are all basically network attacks, enabled by poorly configured IoT devices for true IoT hacking, I'm thinking you're going to need a bit more than a Kali Linux box on your side. If you've never worked with embedded systems before well, they are different. But still, the Target breach the baby monitor the fish tank.