Remove Applications Remove Licensing Remove Load Balancer Remove Security
article thumbnail

VMware by Broadcom: The First 100 Days

CIO Business Intelligence

And we’ve completed the software business-model transition that began to accelerate in 2019, from selling perpetual software to subscription licensing only – the industry standard. We’ve changed how and through whom we will sell our software. VMware Cloud Foundation , or VCF, is our platform for innovation going forward.

Vmware 89
article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

This is the industry’s first universal kernel bypass (UKB) solution which includes three techniques for kernel bypass: a POSIX (Portable Operating System Interface) sockets-based API (Application Program Interface), TCP (Transmission Control Protocol) Direct and DPDK (Data Plane Development Kit). Hardware Based Security (ServerLock).

Software 194
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

This is the industry’s first universal kernel bypass (UKB) solution which includes three techniques for kernel bypass: a POSIX (Portable Operating System Interface) sockets-based API (Application Program Interface), TCP (Transmission Control Protocol) Direct and DPDK (Data Plane Development Kit). Hardware Based Security (ServerLock).

Software 151
article thumbnail

Technology Short Take 153

Scott Lowe

Xavier Avrillier walks readers through using Antrea (a Kubernetes CNI built on top of Open vSwitch—a topic I’ve touched on a time or two) to provide on-premise load balancing in Kubernetes. Here’s a set of 15 principles for designing and deploying scalable applications on Kubernetes. Servers/Hardware.

Linux 74
article thumbnail

Technology Short Take 144

Scott Lowe

Teri Radichel uses some basketball analogies to explain why defensive (proactive) security strategies are more desirable than reactive security strategies. Operating Systems/Applications. Rudi Martinsen has an article on changing the Avi load balancer license tier (this is in the context of using it with vSphere with Tanzu).

Linux 90
article thumbnail

Technology Short Take 88

Scott Lowe

Romain Decker has an “under the hood” look at the VMware NSX load balancer. This graphical summary of the AWS Application Load Balancer (ALB) is pretty handy. Operating Systems/Applications. Servers/Hardware. Nothing this time (sorry!). Ben Evans has a four-part series (so far) on vSAN.

article thumbnail

Technology Short Take 144

Scott Lowe

Teri Radichel uses some basketball analogies to explain why defensive (proactive) security strategies are more desirable than reactive security strategies. Operating Systems/Applications. Rudi Martinsen has an article on changing the Avi load balancer license tier (this is in the context of using it with vSphere with Tanzu).

Linux 60