Remove Applications Remove Firewall Remove Operating Systems Remove Storage
article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

This is the industry’s first universal kernel bypass (UKB) solution which includes three techniques for kernel bypass: a POSIX (Portable Operating System Interface) sockets-based API (Application Program Interface), TCP (Transmission Control Protocol) Direct and DPDK (Data Plane Development Kit).

Software 194
article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

This is the industry’s first universal kernel bypass (UKB) solution which includes three techniques for kernel bypass: a POSIX (Portable Operating System Interface) sockets-based API (Application Program Interface), TCP (Transmission Control Protocol) Direct and DPDK (Data Plane Development Kit).

Software 151
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How IT Can Deliver on the Promise of Cloud

CIO Business Intelligence

Public cloud providers such as AWS, Google, and Microsoft Azure publish shared responsibility models that push security of the data, platform, applications, operating system, network and firewall configuration, and server-side encryption, to the customer. These are just some of the security challenges IT faces.

Cloud 139
article thumbnail

Technology Short Take 143

Scott Lowe

I saw this blog post about Curiefense , an open source Envoy extension to add WAF (web application firewall) functionality to Envoy. This post on using SPIFFE/SPIRE, Kubernetes, and Envoy together shows how to implement mutual TLS (mTLS) for a simple application. Operating Systems/Applications.

article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

The CCA allows overarching enterprise functions and IT shared services to be assessed separately from the business unit’s products/applications that require PCI security compliance. Having segmentation between infrastructure providing data processing and data storage is an example of a broad IT security architectural pattern.

Financial 100
article thumbnail

Technology Short Take 139

Scott Lowe

In this post , Jakub Sitnicki digs way deep into the Linux kernel to uncover the answer to the question, “Why are there no entries in the conntrack table for SYN packets dropped by the firewall?” Patrick Kremer writes about using vRealize Log Insight Cloud to monitor for firewall changes in a VMware Cloud on AWS environment.

Vmware 60
article thumbnail

Technology Short Take 145

Scott Lowe

Ivan Pepelnjak shares some links and thoughts on configuring the NSX-T firewall with a CI/CD pipeline built on GitHub Actions and Terraform Cloud. Operating Systems/Applications. Networking. Adam Kotwasinski walks readers through deploying Envoy and Kafka to collect broker-level metrics. Thank you, Ben! Virtualization.