Remove Construction Remove Linux Remove Network Remove Operating Systems
article thumbnail

Technology Short Take 175

Scott Lowe

Networking The good folks over at Packet Pushers have compiled a list of open source networking projects. The Linux kernel project has become a CVE Numbering Authority (CNA); Greg Kroah-Hartman wrote a blog post that discusses this in more depth. I hope you find something useful here!

article thumbnail

Technology Short Take #81

Scott Lowe

Networking. Matt Oswalt has a great post on the need for networking professionals to learn basic scripting skills—something he (rightfully) distinguishes from programming as a full-time occupation. Further, he follows that up with a post on how automation is more than just configuration management ; it’s about network services.

Vmware 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 169

Scott Lowe

Networking Navendu Pottekkat offers readers a comprehensive guide to API gateways, Kubernetes gateways, and service meshes. In the end, he comes up with using a general purpose programming language (via CDK in his article) to write higher-level constructs. OK, let’s get on to the content!

article thumbnail

Technology Short Take 151

Scott Lowe

Networking. Operating Systems/Applications. Dennis Felsing shares some thoughts on switching to macOS after 15 years on Linux. Running Docker on an M1 Max-based system? BIOS updates without a reboot , and under Linux first? And now for the content! This article may provide some useful information.

article thumbnail

Technology Short Take 138

Scott Lowe

Networking. Isovalent, the folks behind Cilium, recently unveiled the Network Policy Editor, a graphical way of editing Kubernetes Network Policies. Ivan Pepelnjak, the font of all networking knowledge, has been discussing cloud networking in some detail for a good while now. Operating Systems/Applications.

IPv6 60
article thumbnail

Technology Short Take 130

Scott Lowe

Networking. gNMI, by the way, stands for gRPC Network Management Interface (more information on gNMI can be found here ). This vulnerability, known as a Server-Side Request Forgery, allowed Harbor project owners to scan the TCP ports of hosts on the Harbor server’s internal network. Operating Systems/Applications.

article thumbnail

Technology Short Take 131

Scott Lowe

This time around the content is a tad heavy on the security side, but I’ve still managed to pull in articles on networking, cloud computing, applications, and some programming-related content. Networking. Here’s a review of targeted attacks and APTs (advanced persistent threats) on Linux. —isn’t perfect.

Linux 60