Tags: virtual machine

Today's CPU Vulnerability: What You Need to Know

Last year, Google’s Project Zero team discovered serious security flaws caused by “speculative execution,” a technique used by most modern processors (CPUs) to optimize performance.The Project Zero researcher, Jann Horn, demonstrated that malicious actors could take advantage of speculative...
Read 0 Comments

banner.png

IPv6 networks
To continue our series on IPv6 private addressing, this article shows how to use KVM to create networks for testing IPv6.

Testing IPv6 Networking in KVM: Part 2

When last we met, in Testing IPv6 Networking in KVM: Part 1, we learned about IPv6 private addressing. Today, we're going to use KVM to create networks for testing IPv6 to our heart's content. Should you desire a refresh in using KVM, see Creating Virtual Machines in KVM: Part 1 and Creating...
Read 0 Comments

Introducing Minishift - Run OpenShift Locally

We are happy to introduce you to Minishift, providing a better user experience than our original Atomic Developer Bundle (ADB). We have shifted our development effort from ADB to Minishift, both to improve user experience, and to address the issues caused by depending on Vagrant. We’ll explain this...
Read 0 Comments

How to Install LXD Container Hypervisor on Ubuntu 16.04 LTS Server

LXD is lxc on steroids with strong security on the mind. LXD is not a rewrite of LXC. Under the hood, LXD uses LXC through liblxc and its Go binding. LXD container “hypervisor” runs unmodified Debian/Ubuntu/CentOS/Arch and other Linux operating systems  ("distros") VM at incredible speed. In this...
Read 0 Comments

How to Deploy a Fault Tolerant Cluster with Continuous or High Availability

Some companies cannot allow having their services down. In case of a server outage a cellular operator might experience billing system downtime causing lost connection for all its clients. Admittance of the potential impact of such situations leads to the idea to always have a plan B. In this...
Read 0 Comments
Click Here!