Remove Architecture Remove Hardware Remove Operating Systems Remove Retail
article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

This is the industry’s first universal kernel bypass (UKB) solution which includes three techniques for kernel bypass: a POSIX (Portable Operating System Interface) sockets-based API (Application Program Interface), TCP (Transmission Control Protocol) Direct and DPDK (Data Plane Development Kit). Hardware Based Security (ServerLock).

Software 194
article thumbnail

Modernizing the mainframe for the digital era

CIO Business Intelligence

I’m a banking technologist,” says the CIO for retail, business, and digital banking at M&T Bank. He’s doing just that on the bank’s IBM Z system mainframes, for which the bank has written some 10 million lines of code over the years. Sonny Sonnenstein, SVP & CIO for retail, business, and digital banking, M&T Bank.

IBM 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

This is the industry’s first universal kernel bypass (UKB) solution which includes three techniques for kernel bypass: a POSIX (Portable Operating System Interface) sockets-based API (Application Program Interface), TCP (Transmission Control Protocol) Direct and DPDK (Data Plane Development Kit). Hardware Based Security (ServerLock).

Software 151
article thumbnail

Broadcom’s Andy Nallappan on what cloud success really looks like

CIO Business Intelligence

Andy Nallappan has had a long career in IT, including CIO roles, but his current job at Broadcom is managing the company’s external cloud platform, DevOps, and SaaS operations across multiple software divisions. I saw this shift happening at Broadcom, so I decided to shift out of IT and into software operations. I govern the costs.

Cloud 98
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

When I started writing my first book when gadgets betray us, IoT was still known as hardware hacking, or embedded security. That's because early IoT systems consisted mostly of dumb sensors on embedded systems out in the field. Vamosi: For example, let's say you're a large retail organization with a number of physical locations.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

When I started writing my first book when gadgets betray us, IoT was still known as hardware hacking, or embedded security. That's because early IoT systems consisted mostly of dumb sensors on embedded systems out in the field. Vamosi: For example, let's say you're a large retail organization with a number of physical locations.

article thumbnail

Top Down, Bottom Up or a Bit of Both? Process and Deployment Considerations for AIOps

CIO Business Intelligence

To take one real-world example, retail giant Walgreens has 9,000 stores and 4,500 call center agents at four locations. Budget : Beyond the licensing, hardware, delivery, installation, and training costs associated with the platform of choice, the team should also consider wider organizational implications, such as change management.