Remove Firewall Remove Linux Remove Operating Systems Remove Storage
article thumbnail

Technology Short Take #46

Scott Lowe

It was good to read this post on Cumulus Linux first impressions by Jeremy Stretch. I’m a fan of Cumulus, but I’m admittedly a Linux guy (see here ) so you might say I’m a bit biased. Jeremy is a “hard-core” networking professional, and so hearing his feedback on Cumulus Linux was, in my opinion, useful.

Vmware 69
article thumbnail

What is Virtual Network Computing (VNC)?

Dataconomy

This feature is particularly useful in environments where only HTTP traffic is allowed, such as in a web proxy or firewall. The VNC protocol is designed to be platform-independent, meaning that it can be used to access and control computers running on any operating system, including Windows, macOS, Linux, and others.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #77

Scott Lowe

Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Operating Systems/Applications. Flatpak is a (relatively) new application packaging/sandboxing mechanism for Linux applications. This looks really promising, IMHO—I’m excited to see it continue to develop.

Linux 60
article thumbnail

Technology Short Take 89

Scott Lowe

specifically, the new container network firewall functionality. When I was using Fedora, I needed some useful information on firewall-cmd , and found this article to be helpful. For what it’s worth, I’ve never tried NetBSD, but I have yet to run into any similar issues with any distribution of Linux I’ve tried.

article thumbnail

Technology Short Take #70

Scott Lowe

What will happen when you combine GPUs and persistent storage? It seems to me that the ever-increasing application of persistent storage technologies in lots of difference places is going to change lots and lots of things. Operating Systems/Applications. Is the era of the storage admin over ? Virtualization.

Vmware 60
article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

Having segmentation between infrastructure providing data processing and data storage is an example of a broad IT security architectural pattern. If the solution’s goal involves processing and storing data, the architect is constrained to place the pieces that will fulfill those tasks in the proper segments.

article thumbnail

Technology Short Take #84

Scott Lowe

Anthony Burke gives a little bit of a sneak peek at some functionality from the upcoming v3 release of PowerNSX: searching NSX Distributed Firewall (DFW) rules. Operating Systems/Applications. This is a space that’s going to see some pretty major changes over the next few years, in my humble opinion. RegEx tester. Enough said.

Windows 60