Remove Authentication Remove Linux Remove Load Balancer Remove Storage
article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Think Linux doesn’t have malware?

Linux 112
article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

Having segmentation between infrastructure providing data processing and data storage is an example of a broad IT security architectural pattern. All other needs, for example, authentication, encryption, log management, system configuration, would be treated the same—by using the architectural patterns available.

Financial 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #25

Scott Lowe

Erik Smith, notably known for his outstanding posts on storage and FCoE, takes a stab at describing some of the differences between SDN and network virtualization in this post. I came across this post on CloudFoundry’s User Account and Authentication Service (the UAA). Is Cisco’s Insieme effort producing a storage product?

Storage 92
article thumbnail

CoreOS Continued: Fleet and Docker

Scott Lowe

The fleetctl doesn’t expose any options to configure the SSH connection, and it assumes you’ll be using public key authentication. OS X provides an SSH agent by default, but on Linux systems you will probably have to manually run an SSH agent and add the appropriate SSH key: eval `ssh-agent -s` ssh-add ~/.ssh/keyfile.pem.

Linux 61