Thursday, December 19, 2019

Amazon stores struggle to move from the cloud to solid ground

 
Modern Infrastructure Digest

News and advice for creating tomorrow's data center | December 19, 2019

TechTarget
FEATURED STORY
Amazon stores struggle to move from the cloud to solid ground

By Ed Scannell, Senior Executive Editor

Looking for new kingdoms to conquer, Amazon is aggressively moving into physical retail locations. This time the e-commerce giant may face tougher competition.
Advertisement
NEWS
 
Cisco to acquire Exablaze for high-performance switching

Cisco plans to acquire Australia-based Exablaze and eventually use its technology in AI applicatons. The acquisition is similar to rival Arista's 2018 purchase of Metamoko.

 
AWS seeks niche in the cloud UC market

AWS could play a bigger role in the cloud UC market in 2020 and beyond by targeting developers and existing AWS customers.

EXPERT ADVICE
 
Deploy and configure a basic setup of Linux's LXD hypervisor

Admins looking to use Linux's hypervisor dedicated to container technology can use several commands to deploy and configure a basic setup of the hypervisor.

 
How to connect VMware Workstation virtual machines to the Internet

Learn how to configure VMware Workstation virtual networks, including connecting guest virtual machines to the Internet, use the Virtual Network Editor and more.

 
source code
Source code is the fundamental component of a computer program that is created by a programmer. It can be read and easily understood by a human being. When a programmer types a sequence of C programming language statements into Windows Notepad, for example, and saves the sequence as a text file, the text file is said to contain the source code.
 

Private cloud security risks and how to prevent them

Admins that rely on private clouds should not be drawn into a false sense of security. Outdated VM images, rogue admins and possible data loss are real security risks for private clouds.

 
Get back on the mend with Active Directory recovery methods

Administrators should have a few of these data protection techniques up their sleeves to keep Active Directory from a total breakdown.

 
program
In computing, a program is a specific set of ordered operations for a computer to perform. In the modern computer that John von Neumann outlined in 1945, the program contains a one-at-a-time sequence of instructions that the computer follows.
About This E-Newsletter
The Modern Infrastructure Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: