Remove Authentication Remove Comparison Remove Network Remove Storage
article thumbnail

Why you might want a secure file-sharing service now that you’re working from home

The Verge

When we were all at the office, many of us were connected to the office network. But if you are contemplating these services, everyone in your sharing circle should use two-factor authentication (such as Authy) to access them, not just a username and password. Illustration by Samar Haddad / The Verge. Additional login security.

article thumbnail

Technology Short Take #59

Scott Lowe

Networking. NAPALM (Network Automation and Programmability Layer with Multivendor support) looks like a really cool tool. Gabriele (the author of that post) also has a nice article on some resources to get you started with network automation. Here’s hoping you find something useful to you! Good stuff Juan! Virtualization.

Vmware 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 102

Scott Lowe

Networking. Ajay Chenampara has a post on using the Ansible network-engine command parser to parse the output of commands on network devices. Ajay Chenampara has a post on using the Ansible network-engine command parser to parse the output of commands on network devices. Here’s his latest piece.

article thumbnail

Technology Short Take #59

Scott Lowe

Networking. NAPALM (Network Automation and Programmability Layer with Multivendor support) looks like a really cool tool. Gabriele (the author of that post) also has a nice article on some resources to get you started with network automation. Here’s hoping you find something useful to you! Good stuff Juan! Virtualization.

Devops 60
article thumbnail

Technology Short Take 114

Scott Lowe

Networking. This article by Bob Killen provides a good foundation of information on understanding Kubernetes authentication (AuthN) and authorization (AuthZ; implemented via RBAC). Speaking of Pulumi, Kyle Galbraith wrote up a comparison of Pulumi and Terraform for infrastructure as code. Servers/Hardware. Virtualization.

Linux 60
article thumbnail

Amazon’s palm reading starts at the grocery store, but it could be so much bigger

The Verge

Whether it’s Amazon’s use of biased facial recognition algorithms or its ambitions to grow a network of home surveillance cameras , this is an organization that has proved many times that individual privacy is not always its biggest concern. Is it a good idea if Amazon knows exactly who you are from the palm of your hand?

Data 124
article thumbnail

VMworld 2014 Day 2 Keynote

Scott Lowe

Poonen uses an example of a rooftop infinity pool in Singapore as a metaphor for the “three foundations” of EUC: SDDC, workspace services (authentication and content collaboration, for example), and then the desktop/mobile/cloud experience. beta announced yesterday), storage (via VSAN), networking (via NSX—go VCDX-NV!),

Vmware 65