Category: Knowledgebase

Linux, Windows, Virtualization based technical articles, reviews, and How-TOs.

How to increase number of routes per router exceeding default 30 routes in Openstack Platform 15

The max_routes parameter in neutron.conf can be increased to accommodate more routes per router. # crudini --set /var/lib/config-data/puppet-generated/neutron/etc/neutron/neutron.conf DEFAULT max_routes 45 Restart the neutron_api service. # podman restart neutron_api This parameter must be set in neutron.conf after the service has been restarted, and then more than 30 routes can be added to a router. # …

Read more

containers

What are Containers?

This guide examines the role of containers in cloud computing, highlights key benefits, and takes a look at the growing ecosystem of related technologies, including Docker, Kubernetes, Istio, and Knative. Containers are executable software units in which application code, as well as its libraries and dependencies, are packaged in standard ways so that they can …

Read more

How to set a route metric for a specific route in AlmaLinux

Setup Route Metric for specific route Without Network Manager To add a route metric for a specific route, create or modify the route-<interface> file in the /etc/sysconfig/network-scripts/ directory, where <interface> is the name of the interface to which the route metric applies. Each route should be on a separate line and follow the basic format …

Read more

How to add a new network gateway or static route

How can I add an additional network gateway to an AlmaLinux and CentOS Linux host? Configure Using Network Manager Use nmcli, nmtui, or the GUI tools to change connection routes. Modify the ipv4.routes property of the connection with nmcli to add a route. For a connection named “external,” for example, to add a route to …

Read more

spear phishing

What is Spear Phishing?

Spear-phishing emails are responsible for over 90% of cyber attacks and data breaches. Spear phishing emails are similarly responsible for 95% of all attacks on enterprise networks. So, what is it about phishing emails in general, and spear-phishing emails in particular, that makes them so dangerous? And how can individuals and businesses guard against such …

Read more

nvidia A16 gpu

NVIDIA A16 GPU

With the NVIDIA A16, you can take remote work to the next level. It enables virtual desktops and workstations with the power and performance to tackle any project from anywhere when used with NVIDIA Virtual PC (vPC) or NVIDIA RTX Virtual Workstation (vWS) software. The NVIDIA Ampere architecture, designed specifically for high-density, graphics-rich virtual desktop …

Read more

nvidia A2

NVIDIA A2 TENSOR CORE GPU

The NVIDIA A2 Tensor Core GPU enables low-power, small-footprint inference for NVIDIA AI at the edge. With a low-profile PCIe Gen4 card and a configurable thermal design power (TDP) of 40-60W, the A2 accelerates inference in any server for large-scale deployment. Up to a 20-fold increase in inference performance AI inference is used to improve …

Read more

javascript

JavaScript Application Development: Getting Started

The first steps can be intimidating for many developers who have never built a JavaScript web application before. Our development team has the opportunity to work with both new students and seasoned developers who have extensive experience developing complex applications. Even seasoned back-end developers frequently inquire about where they can learn JavaScript. Invariably, our response …

Read more

Application Security

What is Application Security?

Applications are moving targets. They are everywhere, and they are always changing. This makes them hard to secure. If done right, application security should bridge the gap between teams responsible for building and managing applications. Secure applications require agility and insight into the behavior of applications, their network, workloads, and finally the users and devices …

Read more

seimaxim datacenters

What is a Bare Metal Server?

A secure, powerful, and reliable digital infrastructure can be built on top of a single tenant physical server, also known as a bare metal server. The bare metal environment eliminates many of the drawbacks of a shared virtual environment. Virtualization based on bare metal hardware provides the best possible performance. Root access is granted to …

Read more

SAP Hana DataBase

What is the SAP HANA

SAP HANA is an in-memory database that powers SAP’s ERP software. It makes use of random-access memory (RAM) to organize, analyze, and provide real-time data on large amounts of data. Multimodel processing, database management and administration, application development, and data virtualization are all features of SAP HANA. The Advanced Business Application Programming (ABAP) language is …

Read more

linux

What is Linux?

Linux is a free operating system that can be used by anyone (OS). It was first thought up and made as a hobby by Linus Torvalds in 1991. Linus tried to make an alternative version of the MINIX operating system that was free and open source while he was in college. The MINIX operating system …

Read more