Perhaps you’re a Windows admin who is interested in making the jump to Linux, or perhaps you are a Mac OS user who may soon be administering a Linux-based network. Either way, you need to know some of the basics of Linux, just to get started gaining some hands-on experience. In this post, that’s exactly what you’ll get!
To get started with Linux, you need to download a Linux distribution, such as RedHat Enterprise Linux, Ubuntu, Debian, Fedora, openSUSE, CentOS or Cumulus Linux. You want to make sure that you obtain a Linux distribution that is compatible with your hardware. For example, you might select a 32-bit i386 image or a 64-bit amd64 image.
For example, if you want to start with the Debian distribution, you can download an ISO-formatted image that you would use to install Debian Linux.
While some people will want to run Linux directly on a physical server, desktop or laptop, many people start learning Linux for the first time by running it inside of a virtual machine. With a VM option, you can run Linux inside your existing Microsoft Windows or Apple macOS operating system using virtualization tools such as Continue reading
In this excerpt from "Mastering AWS Security," learn how to configure a Virtual Private Cloud in Amazon Web Services.
There's a good reason businesses of all kinds are embracing the open source container clustering technology.
The post Tier 1 carrier performance report: December, 2017 appeared first on Noction.
2018 has barely started and we’re already crazily busy:
The last week of January is Cisco Live Europe week. I’ll be there as part of the Tech Field Day Extra event – drop by or send me an email if you’ll be in Barcelona during that week.
Read more ... It's surprising how quickly 5G is moving from a nebulous concept to reality.
ETA is designed to help enterprises inspect encrypted traffic for malicious activity without having to decrypt it first.
The upgrade is targeted at 5G, cloud services, and data center interconnections.
The company is providing security patches.
Organizations that embark on the journey of building our virtual desktop environments, are taking traditionally external endpoints and bringing them into the data center. These endpoints are now closer and most times, reside on the same networking infrastructure as the backend application servers that they may access. These endpoints run Windows or even Linux desktop operating systems with multiple end-users that can access them. Malicious attacks that would traditionally take place outside the data center should an end-user find their desktop or laptop machine infected, could now take place on their virtual desktops inside the data center. With physical equipment, it’s easy to isolate the physical desktop or laptop and remediate the attack. Securing virtual desktop environments requires a different approach, but not one that’s unattainable. Securing an end user computing deployments is one of the primary security use cases for VMware NSX and can help provide a layered approach to securing virtual desktop workloads in the data center.
The NSX platform covers several business cases for securing an end user computing deployment. Each of these use cases, helps provide a multi-layered approach to ensure end user endpoints are as secure as possible in the Continue reading
Key components include network slicing management and container architecture.
As storage and security companies turn to software, they’ll need data centers to deploy the stacks.