Remove Firewall Remove Hardware Remove Linux Remove Network
article thumbnail

Product Review: Paessler PRTG Network Monitor

Galido

Information Technology Blog - - Product Review: Paessler PRTG Network Monitor - Information Technology Blog. PRTG Network Monitor from Paessler AG is a powerful network monitoring solution. This network software is not only powerful but also easy to use. Problems in the network cause emergencies in business.

Network 60
article thumbnail

Technology Short Take 136

Scott Lowe

Networking. This article by Joshua Fox outlines how and when to use each of the various types of firewalls offered by AWS. Servers/Hardware. Heidi Howard and Ittai Abraham illustrate some of the challenges of the Raft consensus protocol when there is a network partition. Linux may be coming to the Apple M1 chip.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

COMS002: Next Generation Cloud Infrastructure with Data Plane Virtualization

Scott Lowe

Verplanke believes that DPDK (Data Plane Development Kit) and virtualization are key to virtualizing workloads that move around lots and lots of packets, such as firewalls, routers, and other similar functions. Next, he discusses the evolution of network devices so far. Is the Linux bridge efficient enough?

article thumbnail

Technology Short Take #77

Scott Lowe

Networking. Michael Kashin has a great article on how Open Virtual Network (OVN, part of the Open vSwitch project) implements virtual networks in OpenStack. In a bit of an older post from late summer 2016, Matt Oswalt outlines why network engineers should care about the network software supply chain. Good advice.

Linux 60
article thumbnail

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

As many of you know, most firewalls today come with a default rule set permitting all outbound traffic to flow freely. You put the firewall in place, and traffic flows outbound unimpeded. This year number five is is Secure configurations for hardware and software on devices , and number 11 is Secure configuration for network devices.

article thumbnail

Technology Short Take #46

Scott Lowe

Networking. This post by Matt Oswalt—the first in a series, apparently—provides a great introduction to 5 development tools for network engineers. Matt also recently posted part 4 (of 5) in his series on SDN protocols; this post covers OpFlex and declarative networking. Servers/Hardware. Interesting thought.

Vmware 69
article thumbnail

Technology Short Take #84

Scott Lowe

Networking. Sjors Robroek describes his nested NSX-T lab that also includes some virtualized network equipment (virtualized Arista switches). Servers/Hardware. Anthony Burke gives a little bit of a sneak peek at some functionality from the upcoming v3 release of PowerNSX: searching NSX Distributed Firewall (DFW) rules.

Windows 60