Remove Architecture Remove Linux Remove Storage Remove Transportation
article thumbnail

Free Courses at Linux Academy — August 2019

Linux Academy

Our free cloud training allows students to begin developing their Linux and Cloud skills. Visit the Linux Academy Booth at Black Hat or find Ell at any of the other Hacker Summer Camp events! AWS Security Essentials – This course prepares learners to be more security-minded with their architecture in AWS. Become a Master.

Course 25
article thumbnail

Technology Short Take 155

Scott Lowe

Isovalent—the company behind the Cilium project—has been talking a lot about how the use of eBPF will transform things, including the architecture of a service mesh. For relevant storage news, I’d recommend having a look at J Metz’ Storage Short Take 42. Networking. network virtualization). (Hat

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #37

Scott Lowe

A fan of network virtualization might also say that decomposing today’s complex physical networks into multiple simple logical networks on top of a simpler physical transport network—similar to Mike’s suggestion of converging on a smaller set of reference architectures—might also help. (Of Virtualization.

Vmware 60
article thumbnail

Free Courses at Linux Academy — August 2019

Linux Academy

Our free cloud training allows students to begin developing their Linux and Cloud skills. Visit the Linux Academy Booth at Black Hat or find Ell at any of the other Hacker Summer Camp events! AWS Security Essentials – This course prepares learners to be more security-minded with their architecture in AWS. Become a Master.

Course 12
article thumbnail

Technology Short Take #80

Scott Lowe

As opposed to just encrypting data at the transport level (although Acra does that between components of its architecture) or just encrypting data at the storage level (using an encrypted file system or similar), Acra targets encrypting data at the table/row/column level within a database. My takeaway? Virtualization.

article thumbnail

Learning NVP, Part 4: Adding Hypervisors to NVP

Scott Lowe

Just to quickly recap what’s happened so far, in part 1 I provided the high-level architecture of NVP and discussed the role of the components in broad terms. Create a Transport Zone. Before you can actually add the hypervisor to NVP, you first need to ensure that you have a transport zone defined. Click Save.

article thumbnail

Learning NSX, Part 11: Reviewing OpenStack Integration Basics

Scott Lowe

This network node thus provides DHCP services to the various logical networks (often using Linux network namespaces , if the Linux distribution supports them), routed connectivity in and out of logical networks (once again with network namespaces, Linux bridges, and iptables rules), and metadata service connectivity.

Vmware 69