Remove Hardware Remove Open Source Remove Storage Remove Virtualization
article thumbnail

Technology Short Take 176

Scott Lowe

Servers/Hardware Menno Finlay-Smits shares information on reducing fan noise on Intel NUCs. The vulnerability affects virtually all Linux distributions and allows attackers to bypass the secure boot protections and insert a low-level bootkit. Storage Gergely Imreh discusses ZFS on a Raspberry Pi.

Linux 112
article thumbnail

Inside our hybrid studio: GeekWire’s tech tips and tricks for the latest twist in virtual meetings

GeekWire

The last 18 months have been an audio-visual adventure, requiring many of us to improve and refine our at-home tech setups for virtual meetings and remote work. We’re sharing some of our hard-earned lessons on this behind-the-scenes episode of the GeekWire Podcast, including details on hardware and software.

Meeting 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 155

Scott Lowe

network virtualization). Is the relationship between network virtualization and service mesh closer than some folks might wish to admit? Servers/Hardware. marks the first release of the open source container orchestration platform that is signed using Sigstore (more details here ). Virtualization.

article thumbnail

How Open Hybrid Clouds Will Change Cloud Computing

CTOvision

If those options weren’t enough, here comes the open hybrid cloud. An open hybrid cloud leverages the benefits of accessing data and processes across private and public implementations, while facilitating open source development. Providers are now offering services that combine IT assets in an open hybrid cloud.

Cloud 150
article thumbnail

Technology Short Take 150

Scott Lowe

Servers/Hardware. Filippo Valsorda speculates on how open source maintainers need to evolve into professional maintainers. This is a topic that comes up every time a notable vulnerability or flaw is found in some piece of heavily-used open source software; the prompt this time, as far as I can tell, is the Log4j vulnerability.

article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

Hadoop offers petabytes of data storage and can handle multiple workloads. Data security segregates data from privileged user accounts including system administrators and protects storage from theft or improper disposal. The Navigator Key Trustee is a “virtual safe-deposit box” with built-in audit capabilities.

Big Data 150
article thumbnail

Technology Short Take 143

Scott Lowe

Servers/Hardware. I saw this blog post about Curiefense , an open source Envoy extension to add WAF (web application firewall) functionality to Envoy. I really enjoy these AWS open source news and updates posts. Virtualization. Jeremy Cowan shows how to use Cluster API to provision an AWS EKS cluster.