Remove Architecture Remove Firewall Remove Linux Remove Storage
article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

CCA prerequisites Large organizations usually govern their IT portfolio via global architectural patterns, which can be thought of as building blocks, and include IT security patterns. In practice, IT architectural patterns give architects the building blocks to design any IT solution.

article thumbnail

DockerCon 2016 Vendor Meetings

Scott Lowe

I’d heard of Plumgrid, but wanted to take this time to better understand their architecture. As it turns out, their architecture is quite interesting. Using eBPF, Plumgrid has created in-kernel virtual network functions (VNFs) that do things like bridging, routing, network address translation (NAT), and firewalling.

Meeting 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #70

Scott Lowe

What will happen when you combine GPUs and persistent storage? According to this article , “It is hard to overstate what a sea change” this sort of architecture will create. It seems to me that the ever-increasing application of persistent storage technologies in lots of difference places is going to change lots and lots of things.

Vmware 60
article thumbnail

COMS002: Next Generation Cloud Infrastructure with Data Plane Virtualization

Scott Lowe

Verplanke believes that DPDK (Data Plane Development Kit) and virtualization are key to virtualizing workloads that move around lots and lots of packets, such as firewalls, routers, and other similar functions. In recent years, we’ve seen more devices running off-the-shelf software (like Linux).

article thumbnail

Technology Short Take #63

Scott Lowe

At DevOps Networking Forum 2016, I had the opportunity to share a presentation on some Linux networking options. Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall. I knew Microsoft was cozying up to Linux, but I honestly didn’t expect they would port SQL Server to Linux.

Vmware 60
article thumbnail

Technology Short Take #77

Scott Lowe

Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Flatpak is a (relatively) new application packaging/sandboxing mechanism for Linux applications. The post is a bit geeky but quite informative, and worth reading if SSH bastion hosts are a key part of your architecture.

Linux 60
article thumbnail

Technology Short Take #79

Scott Lowe

Tony Sangha took PowerNSX (a set of PowerShell cmdlets for interacting with NSX) and created a tool to help document the NSX Distributed Firewall configuration. Here’s a walkthrough to install Arch Linux on VirtualBox. Alan Renouf shows you how to retrieve NVMe storage device details using PowerCLI. What’s that? Virtualization.

Linux 60