Remove Authentication Remove IPv6 Remove Linux Remove Network
article thumbnail

Technology Short Take #51

Scott Lowe

Welcome to Technology Short Take #51, another collection of posts and links about key data center technologies like networking, virtualization, cloud management, and applications/operating systems. Networking. Rick Sherman has an article on using Jinja2 templates for network automation , including a practical example.

Vmware 60
article thumbnail

Technology Short Take 166

Scott Lowe

Networking Kevin Jin’s post on the APNIC blog about network automation tools is a great read. He discusses Netmiko, NAPALM, and Nornir in some detail, and provides some guidance around which network automation tool may be right for you. Anton Kuliashov writes about why Palark uses Cilium for Kubernetes networking.

IPv6 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #65

Scott Lowe

Networking. Michael Ryom has a nice (but short) article on using Log Insight along with a NetFlow proxy to help provide more detailed visibility into traffic flows between VMs on NSX logical networks. BGP seems to be emerging as an early front-runner for a standards-based control plane for software networking. Servers/Hardware.

Vmware 60
article thumbnail

The Hacker Mind Podcast: Scanning the Internet

ForAllSecure

Perhaps there was a bulletin board behind it, or perhaps there was a corporate network. We try to understand as much as possible about the network protocol and the malicious activity that this particular malware does. So we have far less users for Mac and Linux than we have on Windows. Vamosi: In many cases.