VPN implementations offer an affordable alternative for locally connecting networks, as well as making network resources available for external devices. In contrast to corporate networks, no private communication network is required. Instead, like the internet, VPNs rely on networks, and protect sensitive data through a process known as tunneling.
Through KVM, the open-source operating system Linux provides a powerful integrated virtualization function. This makes it possible to run one or more operating systems as guest systems on a Linux computer. Being directly integrated into the operating system’s kernel, it ensures high stability and good performance. Since this virtualization solution is available free of charge, it’s worth checking...
The creation of virtual machines is of interest to all things that are server-related or involve the development of software. However, private users can also use virtualization to gain more security and flexibility. With Hyper-V, Microsoft has created a solution that is ideal in a professional environment and can also be used by beginners in the private sector.
If you are looking to perform an especially secure file transfer between two computers (e.g. uploading data to a web server), there are several options available. One of these options is the Secure Copy Protocol (SCP) which provides authentication and encryption via SSH. In this article, you will learn what this protocol is and how the SCP transfer works.
The setup of different devices in a home or small business network can be time-consuming. All network participants must be able to communicate with one another, and, for this reason, be aware of each other. Multicast DNS (mDNS) attempts to minimize this effort. With mDNS, devices can locate one another automatically. How does this work?
Virtualizing is becoming more and more important: Its basic concept is that one imposes a virtual, abstract system onto an actual real system. Both software and hardware can be depicted in this way. In order to create a connection between the actual and the virtual system, one requires an additional layer – the hypervisor.
Remote direct memory access technology makes it possible to transfer data at maximum speed, very low latency and without burdening the CPU. The RDMA transfer process does not utilize a computer’s processor nor its operating system, which results in a data transfer that is considerably quicker. Find out how it works in this article.
Ceph is a storage solution that enables the shared filing of data in a network, which ensures the redundancy, scalability, and maximum performance of the existing infrastructure. The system was released with a GNU General Public License and can be used free of charge.
GlusterFS is a well-established and free distributed file system. It can provide storage space from several servers on the same network as a single drive, which gives it several advantages: Available devices are used efficiently, network load is distributed, and the risk of failure for individual components is lowered.
It no longer makes sense to store large volumes of data, like those that accrue in big data applications, in conventional file systems. This is where solutions such as GlusterFS and Ceph come into play, which have easily scalable data memory and provide metadata with repeated redundancy. Using only a central directory, such as a classic hard drive, is no longer enough for this purpose.