Remove Authentication Remove IPv6 Remove Operating Systems
article thumbnail

Networking terms and definitions

Network World

It includes the operating system, programming languages, database and other development tools. This gives users the most control over their cloud environment, but it also requires them to manage the operating system, applications, and other components.

Network 436
article thumbnail

Technology Short Take 166

Scott Lowe

Nick Buraglio discusses IPv6 Unique Local Addressing (ULA). William Lam shares news about higher-capacity SODIMMs available for small or ultra small form factor systems. Security Jeff Warren discusses a potential way for malicious players to bypass multi-factor authentication, aka the “Pass the Cookie” attack.

IPv6 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take #51

Scott Lowe

Welcome to Technology Short Take #51, another collection of posts and links about key data center technologies like networking, virtualization, cloud management, and applications/operating systems. Operating Systems/Applications. Eric Gray has a nice write-up on using Lightwave for authentication with Photon.

Vmware 60
article thumbnail

Technology Short Take #65

Scott Lowe

Mike Foley recently published a two-part series on two factor authentication (2FA) for vSphere ( part 1 is here ; part 2 is here ). Operating Systems/Applications. Want to run Docker Swarm with IPv6? Now you have no excuses for not using 2FA with your vSphere environment. Cloud Computing/Cloud Management.

Vmware 60