Remove Architecture Remove Firewall Remove Microsoft Remove Windows
article thumbnail

Liveblog: Hybrid Architectures, Bridging the Gap to the Cloud

Scott Lowe

This is a liveblog of the AWS re:Invent session titled “Hybrid Architectures: Bridging the Gap to the Cloud” (ARC208). The speaker for the session is Jamie Butler, Manager of Solutions Architecture at AWS (focused on state/local government). This leads Butler into a (recorded) demo of creating a Microsoft AD instance on AWS.

article thumbnail

Technology Short Take #79

Scott Lowe

Tony Sangha took PowerNSX (a set of PowerShell cmdlets for interacting with NSX) and created a tool to help document the NSX Distributed Firewall configuration. Microsoft recently added an overlay network driver with support for Docker in Windows 10; check out this Microsoft blog post for more information. What’s that?

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #68

Scott Lowe

In the event you accidentally locked yourself out of vCenter using NSX’s distributed firewall, this post by Roie Ben Haim provides a workaround for getting yourself out of this pickle. Angel Villar Garea also has a post on the same topic. Cloud Computing/Cloud Management. This would be one reason. Career/Soft Skills.

Linux 60
article thumbnail

Spotlight on Cybersecurity Leaders: Evgeniy Kharam

SecureWorld News

My work spanned from Linux and Windows to handling cables; essentially, anything the Navy required, whether below or above water, I was involved. Additionally, I earned my Microsoft Certified Systems Engineer (MCSE) certification for Windows in 2000 during my military service.

article thumbnail

CLDS006: Exploring New Xeon E5 Optimizations for 10 Gb Ethernet

Scott Lowe

Using 1 GbE would have required too many ports, too many cables, and too many switches; 10 GbE offered Expedient a 23% reduction in cables and ports, a 14% reduction in infrastructure costs, and offered a significant bandwidth improvement (compared to the previous 1 GbE architecture). Note that there are trade-offs as a result.)

Intel 109
article thumbnail

Technology Short Take #57

Scott Lowe

We all know that security is more than just a host-based firewall, but a host-based firewall can be part of an overall security strategy. This article provides a good introductory overview of Linux iptables commands for configuring host-based firewall rules on your Linux systems. Cloud Computing/Cloud Management.

Windows 60
article thumbnail

When least privilege is the most important thing

CIO Business Intelligence

In the early days of Windows operating systems up through Windows XP, almost any program a user would launch would have administrator-level privileges. When this no longer became tenable, Microsoft led the way and started its Trustworthy Computing initiative in 2002. In truth, we ignore least privilege at our peril.

Backup 128