article thumbnail

What’s Free at Linux Academy — March 2019

Linux Academy

By adding free cloud training to our Community Membership, students have the opportunity to develop their Linux and cloud skills further. Each month, we will kick off our community content with a live study group, allowing members of the Linux Academy community to come together and share their insights in order to learn from one another.

Linux 80
article thumbnail

Weekly Update 5-20-2019

Linux Academy

Great news for all of our Linux Academy students; Red Hat Enterprise is already available to try out in Linux Academy’s Cloud Playground! We have more information on t he release in general and all the new features in our podcast Linux Action News and episode 105. Inserting data. Viewing and Sorting Data in MySQL.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

DockerCon 2017 Black Belt Session: Cilium for Network and Application Security

Scott Lowe

Graf starts by talking about how BPF (specifically, extended BPF or eBPF) can be used to rethink how the Linux kernel handles network traffic. BPF can reject unauthorized connections before the Linux kernel even starts building TCP packets and moving them among various components within the kernel. What is XDP?

article thumbnail

Vendor-Side DevOps Practices Can Still Deliver Better Value While Client-Side Government Processes Catch Up

CTOvision

Each cloud computing provider has “opinionated” ways of handling things such as load balancing, elastic scaling, service discovery, data access, and security to name just a few. Additionally, how one would deploy their application into these environments can vary greatly. This is where container technologies help out.

Devops 150
article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

In the fast-evolving world of finance, data security is of paramount importance. Financial institutions must ensure the protection of sensitive personal information, most commonly payment card data, to maintain, trust and meet various regulatory requirements.

article thumbnail

Technology Short Take #81

Scott Lowe

I have another collection of links, articles, and thoughts about key data center technologies, and hopefully I’ve managed to include something here that will prove useful or thought-provoking. Here’s a handy list of deprecated Linux network commands and their replacements. Welcome to Technology Short Take #81! Networking.

Vmware 60
article thumbnail

Technology Short Take 88

Scott Lowe

Romain Decker has an “under the hood” look at the VMware NSX load balancer. This graphical summary of the AWS Application Load Balancer (ALB) is pretty handy. Abdullah Abdullah shares some thoughts on design decisions regarding NSX VXLAN control plane replication modes. Servers/Hardware. Virtualization.