Remove Applications Remove Company Remove Hardware Remove Load Balancer
article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

This is the industry’s first universal kernel bypass (UKB) solution which includes three techniques for kernel bypass: a POSIX (Portable Operating System Interface) sockets-based API (Application Program Interface), TCP (Transmission Control Protocol) Direct and DPDK (Data Plane Development Kit). Hardware Based Security (ServerLock).

Software 194
article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Thanks for reading! This is a handy trick.

Linux 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

This is the industry’s first universal kernel bypass (UKB) solution which includes three techniques for kernel bypass: a POSIX (Portable Operating System Interface) sockets-based API (Application Program Interface), TCP (Transmission Control Protocol) Direct and DPDK (Data Plane Development Kit). Hardware Based Security (ServerLock).

Software 151
article thumbnail

Why Kubernetes Is So Popular in the Tech World

Galido

For a start, it provides easy optimization of infrastructural resources since it uses hardware more effectively. Google was the company that originally created and owned Kubernetes. This tool automates deploying, scaling, and managing containerized applications on a cluster of servers (virtual or bare metal).

article thumbnail

VMworld 2013 – Network Virtualization: Moving Beyond the Obvious (My Notes)

Virtualized Greek

The network industry has focused on protocols for a long time because of the need interoperate hardware devices between vendors. The Second are is the higher level layers such as load balancing. Martin’s argument is that all the added functionality is already happening at the application level. Operations.

article thumbnail

Is Cisco fighting a losing battle over SDN?

Virtualized Greek

Basically, they are looking to provide programmability to the network via their Application-Centric Infrastructure. This is different from the current software first movement in that Cisco’s approach is based on their hardware first view of the network. F5 – Security/Load Balancing. Arista – Top of Rack. HP – Top of Rack.

Vmware 78
article thumbnail

Technology Short Take 115

Scott Lowe

David Holder walks through removing unused load balancer IP allocations in NSX-T when used with PKS. Servers/Hardware. Software company Agile Bits recently announced support for U2F-compatible hardware security keys in their 1Password product. Operating Systems/Applications. I haven’t tested it.).

Network 60